AdderView DDX CAM Manual
Have a look at the manual AdderView DDX CAM Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 78 ADDER manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

40 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX APPENDIX 1 - LINK CABLE INTERFERENCE PROTECTION Name Overall Screening Pair Shielding U/UTP û û F/UTP ü û U/FTP û ü S/FTP ü ü or S/STP or PiMF U/UTP F/UTP U/FTP S/FTP S/STP PiMF Pair shielding Overall screening Outer sheath General cable anatomy Overall screening Pair shielding Twisted Pair While the Category rating (e.g. CAT 5e, CAT 6a, CAT 7, etc.) determines the electrical performance of a cable, another vital part of the overall cable specification is its protection from interference. As cabling distances and data rates increase, so too does the susceptibility to interference, from both external and internal sources. Proximity to other electromagnetic sources are the main external threat and these can be subdued using overall screening that surrounds all four of the cable pairs. However, interference is also possible from neighbouring twisted pairs within the same cable and this can be just as hazardous to data integrity. Such crosstalk is countered by shielding each cable pair separately. Within each Category rating, you can specify different combinations of external screening and internal shielding to suit the environment into which the link is being placed. Interference protection codes Interference protection is classified in the following manner: U/UTP where U = unshielded F = foil shielding S = braided shielding PiMF = Pairs in Metal Foil Note: Do not use unshielded cables with the DDX modules.

41 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX APPENDIX 2 - FIRMWARE UPGRADES FOR BASIC EXTENDER INSTALLATIONS Extender systems (or individual DDX-USR units) can be upgraded using a USB stick if required. This is carried out as follows: 1 Connect the DDX-USR to a compatible display and keyboard; optionally connect to a DDX-CAM module using a Shielded CAT6a or CAT7 data cable to upgrade it at the same time. 2 On the DDX-USR unit, insert a FAT32-formatted USB stick containing the extender firmware upgrade file into one of the front USB ports. Note: The extender firmware upgrade file must be in the root folder. 3 Apply power to the DDX-USR unit and DDX-CAM modules. IMPORTANT: Ensure power remains uninterrupted throughout the upgrade process. 4 Press-and-hold the recessed reset button for ten seconds until the PWR indicator begins to flash quickly, then release the reset button. 5 When prompted, type in the name of the extender firmware upgrade file and press Enter. 6 Type Y or N as appropriate, when asked if an attached (DDX-CAM) transmitter unit should also be upgraded. 7 The display will show the upgrade progress and confirmation message. 8 If successful the DDX-USR and DDX-CAM modules will automatically be rebooted and the USB stick can be removed. APPENDIX 3 - GPL LICENSE This product includes binaries that are derived from the open source community. The modules listed below are licenced under the GNU General Public License v2 and must be provided, in source form, on request: • u-boot • linux-arm-freescale • busybox • termcap • iproute • hotplug • udev • kobs-ng • freetype • i2c-tools This product includes binaries that are derived from the open source community. The modules listed below are licenced under the GNU Lesser General Public License v2.1 and must be provided, in source form, on request: • libconfig • directfb • libdaemon • nss-mdns • avahi In addition to the GPL modules listed, this product also includes binaries derived from 3rd party open sources that have their own license requirements. Each module is listed below with their required copyright statement and distribution conditions. Module: iperf “iperf, Copyright (c) 2014-2016, The Regents of the University of California, through Lawrence Berkeley National Laboratory (subject to receipt of any required approvals from the U.S. Dept. of Energy). All rights reserved.” Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: (1) Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. (2) Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/ or other materials provided with the distribution. (3) Neither the name of the University of California, Lawrence Berkeley National Laboratory, U.S. Dept. of Energy nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

42 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. You are under no obligation whatsoever to provide any bug fixes, patches, or upgrades to the features, functionality or performance of the source code (“Enhancements”) to anyone; however, if you choose to make your Enhancements available either publicly, or directly to Lawrence Berkeley National Laboratory, without imposing a separate written license agreement for such Enhancements, then you hereby grant the following license: a non-exclusive, royalty-free perpetual license to install, use, modify, prepare derivative works, incorporate into other computer software, distribute, and sublicense such enhancements or derivative works thereof, in binary and source code form. ==== This software contains source code (src/cjson.{c,h}) that is: Copyright (c) 2009 Dave Gamble Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ==== This software contains source code (src/net.{c,h}) that is: This software was developed as part of a project at MIT. Copyright (c) 2005-2007 Russ Cox, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ==== Contains parts of an earlier library that has: The authors of this software are Rob Pike, Sape Mullender, and Russ Cox Copyright (c) 2003 by Lucent Technologies. Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software. THIS SOFTWARE IS BEING PROVIDED “AS IS”, WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHORS NOR LUCENT TECHNOLOGIES MAKE ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.

43 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX ===== This software contains source code (src/queue.h) that is: Copyright (c) 1991, 1993 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. @(#)queue.h 8.5 (Berkeley) 8/20/94 ===== This software contains source code (src/tcp_window_size.{c,h}) that is: --------------------------------------------------------------- Copyright (c) 1999,2000,2001,2002,2003 The Board of Trustees of the University of Illinois All Rights Reserved. --------------------------------------------------------------- Permission is hereby granted, free of charge, to any person obtaining a copy of this software (Iperf) and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimers. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimers in the documentation and/or other materials provided with the distribution. Neither the names of the University of Illinois, NCSA, nor the names of its contributors may be used to endorse or promote products derived from this Software without specific prior written permission. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ________________________________________________________________ National Laboratory for Applied Network Research National Center for Supercomputing Applications University of Illinois at Urbana-Champaign http://www.ncsa.uiuc.edu ________________________________________________________________ tcp_window_size.c by Mark Gates ------------------------------------------------------------------- set/getsockopt ------------------------------------------------------------------- ===== This software contains source code (src/units.{c.h}) that is: --------------------------------------------------------------- Copyright (c) 1999,2000,2001,2002,2003 The Board of Trustees of the University of Illinois All Rights Reserved. --------------------------------------------------------------- Permission is hereby granted, free of charge, to any person obtaining a copy of this software (Iperf) and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimers. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimers in the documentation and/or other materials provided with the distribution.

44 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX Neither the names of the University of Illinois, NCSA, nor the names of its contributors may be used to endorse or promote products derived from this Software without specific prior written permission. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE CONTIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ________________________________________________________________ National Laboratory for Applied Network Research National Center for Supercomputing Applications University of Illinois at Urbana-Champaign http://www.ncsa.uiuc.edu ________________________________________________________________ stdio.c by Mark Gates and Ajay Tirumalla ------------------------------------------------------------------- input and output numbers, converting with kilo, mega, giga ------------------------------------------------------------------- ===== This software contains source code (src/portable_endian.h) that is: // “License”: Public Domain // I, Mathias Panzenböck, place this file hereby into the public domain. Use it at your own risk for whatever you like. ===== Module: openssl LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact [email protected]. OpenSSL License ============================================================= Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)” 4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)” THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ============================================================

45 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX This product includes cryptographic software written by Eric Young (eay@cryptsoft. com). This product includes software written by Tim Hudson ([email protected]). Original SSLeay License Copyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved. This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]). Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft. com)” The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson ([email protected])” THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] Module: libupnp Copyright (c) 2000-2003 Intel Corporation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: • Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. • Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. • Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Module: tzdata Original TZdata License This is the Debian prepackaged version of the Time Zone and Daylight Saving Time Data. It was downloaded from http://www.iana.org/time-zones Upstream Author: The Internet Assigned Numbers Authority (IANA) Commentary should be addressed to [email protected] Copyright: This database is in the public domain.

46 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX WARRANTY Adder Technology Ltd warrants that this product shall be free from defects in workmanship and materials for a period of two years from the date of original purchase. If the product should fail to operate correctly in normal use during the warranty period, Adder will replace or repair it free of charge. No liability can be accepted for damage due to misuse or circumstances outside Adder’s control. Also Adder will not be responsible for any loss, damage or injury arising directly or indirectly from the use of this product. Adder’s total liability under the terms of this warranty shall in all circumstances be limited to the replacement value of this product. If any difficulty is experienced in the installation or use of this product that you are unable to resolve, please see the Getting assistance section. SAFETY INFORMATION • For use in dry, oil free indoor environments only. • Warning - live parts contained within power adapter(s). • No user serviceable parts within power adapter(s) - do not dismantle. • Plug the power adapter(s) into socket outlets close to the module that they are powering. • Do not use an unearthed power socket or extension cable. • Do not use a power adapter if its case becomes damaged, cracked or broken or if you suspect that it is not operating properly. • Replace the power adapter(s) with a manufacturer approved type only. • If you use a power extension cord with the module, make sure the total ampere rating of the devices plugged into the extension cord does not exceed the cord’s ampere rating. Also, make sure that the total ampere rating of all the devices plugged into the wall outlet does not exceed the wall outlet’s ampere rating. • Do not attempt to service the modules yourself.

47 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX RADIO FREQUENCY ENERGY A Category 5e (or better) twisted pair cable must be used to connect the units in order to maintain compliance with radio frequency energy emission regulations and ensure a suitably high level of immunity to electromagnetic disturbances. All cables used with this equipment must be shielded in order to maintain compliance with radio frequency energy emission regulations and ensure a suitably high level of immunity to electromagnetic disturbances. European EMC directive 2004/108/EC This equipment has been tested and found to comply with the limits for a class A computing device in accordance with the specifications in the European standard EN55032. These limits are designed to provide reasonable protection against harmful interference. This equipment generates, uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio or television reception. However, there is no guarantee that harmful interference will not occur in a particular installation. If this equipment does cause interference to radio or television reception, which can be determined by turning the equipment on and off, the user is encouraged to correct the interference with one or more of the following measures: (a) Reorient or relocate the receiving antenna. (b) Increase the separation between the equipment and the receiver. (c) Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. (d) Consult the supplier or an experienced radio/TV technician for help. FCC Compliance Statement (United States) This equipment generates, uses and can radiate radio frequency energy and if not installed and used properly, that is, in strict accordance with the manufacturer’s instructions, may cause interference to radio communication. It has been tested and found to comply with the limits for a class A computing device in accordance with the specifications in Subpart J of part 15 of FCC rules, which are designed to provide reasonable protection against such interference when the equipment is operated in a commercial environment. Operation of this equipment in a residential area may cause interference, in which case the user at his own expense will be required to take whatever measures may be necessary to correct the interference. Changes or modifications not expressly approved by the manufacturer could void the user’s authority to operate the equipment. Canadian Department of Communications RFI statement This equipment does not exceed the class A limits for radio noise emissions from digital apparatus set out in the radio interference regulations of the Canadian Department of Communications. Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la classe A prescrites dans le règlement sur le brouillage radioélectriques publié par le ministère des Communications du Canada.

48 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX www.ctxd.com Documentation by: © 2016 Adder Technology Limited All trademarks are acknowledged. Part No. MAN-DDX-ADDER • Release 1.3a Web: www.adder.com Contact: www.adder.com/contact-details Support: www.adder.com/support

49 INSTALLATION CONFIGURATION OPERATION FURTHERINFORMATION INDEX HT Index A Access permissions 3 Add EDID 22 Audio 36 Audio connections console 14 Auto Refresh 33 B Backup 32 C Cable types 40 Category rating 40 Computer choosing 35 Computer link connecting 10 switch 10 Computers configure 26 Configure pages 20 Consoles configure 23 Control page 19 Crosstalk 40 D Dashboard page 17 Data link console 14 Data link connection computer 9 DDX-CAM 9 DDX Matrix accessing 16 DDX-USR switches 13 DHCP 20 Diagnostics 31 DisplayPort 9 DVI-D 9 E EDID applying 28 EDID management 13 Exclusive 19 F Firmware upgrade extenders 41 via switch 32 FTP 40 G Gateway 20 H Headphone connection 14 Hotkeys 35 HTTPS 16 HTTP Server 20 I IEC connector 12 Ignore Firmware Mismatch 20 Indicators 37 modules 38 switch 37 Interference protection 40 IP Address 20 M MAC Address 20 Maintenance pages 31 Manage EDIDs 22 Microphone connection 14 Mode switches 16 N Net Mask 20 Network link connecting 11 switch 11 Network port temporary connection 16 Network settings 20 O OSD viewing 35 OSD Settings 21 P Password default 16 PiMF 40 Port designations 4 reallocation 29 Power connection console 15 switch 12 Power disconnect 12 Primary console 23,24,26,27 Private 19 R Reallocating ports 29 Reboot System 32 Receivers configure 25 Recover failed upgrade 34 receiver 25 transmitter 28 Recovering a receiver 25 Resetting 34 Restore 32 RJ-45 socket 10 S Safety information 46 Screening 40 Settings 33 Shared access 19 Shielding 40 STP 40 Switches DDX-USR 13 Sync Tx/Rx Firmware 32 System Default EDID 20 System Operations 32 T Thumbnails 21,26 Transmitters configure 28 U Unique ID 25,28 Upgrade firmware 32,41 UPnP 16 USB remote module 13 USB connection computer 9 console 13 User console link switch 10 Username deafult 16 UTP 40 V Video remote module 13 Video connection computer 9 console 13 View only 19 W Warranty 46 Web UI Mode 33