Black Box Adder QIG for ACR500VG-T Owner Manual

Black Box Adder QIG for ACR500VG-T Owner Manual

USER GUIDE

ACR500DP-T ACR500DV-T ACR500VG-T 24/7 TECHNICAL SUPPORT AT 1.877.877.2269 OR VISIT BLACKBOX.COM

TRADEMARKS USED IN THIS MANUAL

Black Box and the Double Diamond logo are registered trademarks of BB Technologies, Inc.

Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark owners.

TECHNICAL 1.877.877.2269

2

We‘re here to help! If you have any questions about your application or our products, contact Black Box Tech Support at

877-877-2269

or go to

blackbox.com

and click on “Talk to Black Box.” You’ll be live with one of our technical experts in less than 60 seconds.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

FEDERAL COMMUNICATIONS COMMISSION AND INDUSTRY CANADA RADIO FREQUENCY INTERFERENCE STATEMENTS

This equipment generates, uses, and can radiate radio-frequency energy, and if not installed and used properly, that is, in strict accordance with the manufacturer’s instructions, may cause inter ference to radio communication. It has been tested and found to comply with the limits for a Class A computing device in accordance with the specifications in Subpart B of Part 15 of FCC rules, which are designed to provide reasonable protection against such interference when the equipment is operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his own expense will be required to take whatever measures may be necessary to correct the interference.

Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.

This digital apparatus does not exceed the Class A limits for radio noise emis sion from digital apparatus set out in the Radio Interference Regulation of Industry Canada.

Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la classe A prescrites dans le Règlement sur le brouillage radioélectrique publié par Industrie Canada.

Disclaimer: Black Box Network Services shall not be liable for damages of any kind, including, but not limited to, punitive, consequential or cost of cover damages, resulting from any errors in the product information or specifications set forth in this document and Black Box Network Services may revise this document at any time without notice.

1.877.877.2269

BLACKBOX.COM

3

4

TECHNICAL 1.877.877.2269

INSTRUCCIONES DE SEGURIDAD (NORMAS OFICIALES MEXICANAS ELECTRICAL SAFETY STATEMENT)

1. Todas las instrucciones de seguridad y operación deberán ser leídas antes de que el aparato eléctrico sea operado.

2. Las instrucciones de seguridad y operación deberán ser guardadas para referencia futura.

3. Todas las advertencias en el aparato eléctrico y en sus instrucciones de operación deben ser respetadas.

4. Todas las instrucciones de operación y uso deben ser seguidas.

5. El aparato eléctrico no deberá ser usado cerca del agua—por ejemplo, cerca de la tina de baño, lavabo, sótano mojado o cerca de una alberca, etc.

6. El aparato eléctrico debe ser usado únicamente con carritos o pedestales que sean recomendados por el fabricante. 7. El aparato eléctrico debe ser montado a la pared o al techo sólo como sea recomendado por el fabricante.

8. Servicio—El usuario no debe intentar dar servicio al equipo eléctrico más allá a lo descrito en las instrucciones de operación. Todo otro servicio deberá ser referido a personal de servicio calificado. 9. El aparato eléctrico debe ser situado de tal manera que su posición no interfiera su uso. La colocación del aparato eléctrico sobre una cama, sofá, alfombra o superficie similar puede bloquea la ventilación, no se debe colocar en libreros o gabinetes que impidan el flujo de aire por los orificios de ventilación.

10. El equipo eléctrico deber ser situado fuera del alcance de fuentes de calor como radiadores, registros de calor, estufas u otros aparatos (incluyendo amplificadores) que producen calor.

11. El aparato eléctrico deberá ser connectado a una fuente de poder sólo del tipo descrito en el instructivo de operación, o como se indique en el aparato.

12. Precaución debe ser tomada de tal manera que la tierra fisica y la polarización del equipo no sea eliminada.

13. Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por objetos colocados sobre o contra ellos, poniendo particular atención a los contactos y receptáculos donde salen del aparato.

14. El equipo eléctrico debe ser limpiado únicamente de acuerdo a las recomendaciones del fabricante.

15. En caso de existir, una antena externa deberá ser localizada lejos de las lineas de energia.

16. El cable de corriente deberá ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo.

17. Cuidado debe ser tomado de tal manera que objectos liquidos no sean derramados sobre la cubierta u orificios de ventilación.

18. Servicio por personal calificado deberá ser provisto cuando: A: El cable de poder o el contacto ha sido dañado; u B: Objectos han caído o líquido ha sido derramado dentro del aparato; o C: El aparato ha sido expuesto a la lluvia; o D: El aparato parece no operar normalmente o muestra un cambio en su desempeño; o E: El aparato ha sido tirado o su cubierta ha sido dañada.

1.877.877.2269

BLACKBOX.COM

CONTENTS

TECHNICAL 1.877.877.2269

CONTENTS ................................................................................................................................. 5

CHAPTER 1: SPECIFICATIONS ..................................................................................................... 6

CHAPTER 2: WELCOME .............................................................................................................. 7

CHAPTER 3: INSTALLATION ....................................................................................................... 8

3.1 Connections ..........................................................................................................................................................................................8

3.1.1 Video link ............................................................................................................................................................................................9

3.1.2 Network link ....................................................................................................................................................................................... 9

3.1.3 USB and power connections ...........................................................................................................................................................10

CHAPTER 4: CONFIGURATION .................................................................................................. 11

4.1 Direct linking ....................................................................................................................................................................................... 11 4.2 Networked linking ............................................................................................................................................................................... 11

4.3 Browser-based configuration utility ................................................................................................................................................. 12

4.4 Restoring a backup firmware image ................................................................................................................................................. 14

4.5 Performing an upgrade ...................................................................................................................................................................... 15

CHAPTER 5: OPERATION .......................................................................................................... 16

5.1 Status indicators ................................................................................................................................................................................ 16

5.2 Resetting .............................................................................................................................................................................................17

APPENDIX A - SUPPORTED VIDEO MODES ............................................................................... 20

APPENDIX B - CONFIGURATION PAGES .................................................................................... 21

System Configuration ..............................................................................................................................................................................22

Video Configuration ................................................................................................................................................................................24

Analogue video configuration .................................................................................................................................................................26

USB Settings ............................................................................................................................................................................................33

Security ....................................................................................................................................................................................................34

iPATH Manager ........................................................................................................................................................................................35

System Messages ...................................................................................................................................................................................36

Statistics ..................................................................................................................................................................................................37

Firmware Upgrade ....................................................................................................................................................................................37

Reboot .......................................................................................................................................................................................................38

About ........................................................................................................................................................................................................38

APPENDIX C - DIMENSIONS ..................................................................................................... 39

APPENDIX D - TIPS FOR SUCCESS WHEN NETWORKING .......................................................... 40

APPENDIX E - TROUBLESHOOTING .......................................................................................... 43

APPENDIX F - GLOSSARY ......................................................................................................... 46

APPENDIX G - OPEN SOURCE LICENSES .................................................................................. 50

APPENDIX H - SAFETY INFORMATION ...................................................................................... 67

1.877.877.2269

BLACKBOX.COM

5

CHAPTER 1: SPECIFICATIONS

Approvals: CE, FCC Hardware Compatibility: All computers with DVI-D or DisplayPort digital video and USB interfaces Software Compatibility: Operates with all known software and operating systems including Windows ® , Linux ® , Unix ® , BSD, all Sun ® OS, all Mac ® OS, NetWare ® , etc. Operating Temperature: 32 to 104°F (0 to 40°C) TECHNICAL 1.877.877.2269

6 1.877.877.2269

BLACKBOX.COM

CHAPTER 2: WELCOME

TECHNICAL 1.877.877.2269

Thank you for choosing the Black Box Agility family of high capacity digital extenders/switches. By encoding high quality video, digital audio and USB data into Internet Protocol (IP) messages, Agility units offer flexible ways to link peripherals and systems via standard networks.

This guide covers the Agility Zero U Transmitter, a highly compact dongle which can be attached to its host computer and transfer high quality video (single link DVI-D, DisplayPort™ or VGA - according to the chosen model) and USB signals across your network. One-to-one configuration The simplest configuration links one remote unit to a single local unit, either by a direct link or over much greater distances via a high speed network. Agility

Zero U TX

Agility

RX

One-to-many configuration Using multicast techniques, an unlimited number of remote units* can receive video and audio data streams from a single local unit. Agility

Zero U TX Gigabit Ethernet

Agility

RX

Agility

RX

Agility

RX

* A maximum of thirteen concurrent USB inputs (via multiple remote units) are permitted to a single local unit.

2.1 AGILITY UNITS AND THE BLACK BOX IPATH MANAGER

Where multiple Agility units are used on a network, we have developed the Black Box iPATH Manager to allow comprehensive and secure central control of all Agility units and users.

A g i l i t y H i g h - P e r f o r m a n c e K V M

i P A T H C O N T R O L L E R

When using a Black Box iPATH Manager to configure Agility units, it is vital that all Agility units that you wish to locate and control are set to their factory default settings. Otherwise they will not be located by the Black Box iPATH Manager. If necessary, perform a

factory reset

on each Agility unit.

Notes: • If you are using one or more Agility Zero U Transmitter units within an installation managed by a Black Box iPATH Manager, the Black Box iPATH Manager must be running firmware version 4.7 or above.

• If you are using the VGA equipped variant of the Agility Zero U Transmitter, then the iPATH server must be running firmware version 4.8 or above.

Please also see

Appendix D - Tips for success when networking

1.877.877.2269

BLACKBOX.COM

7

8

CHAPTER 3: INSTALLATION

TECHNICAL 1.877.877.2269

3.1 CONNECTIONS

Installation involves linking the Agility Zero U Transmitter to various ports on the host computer, while the Agility remote unit is attached to your peripherals: Cable tie mounting slot Status indicators

(page 16)

WWW .BLACKBOX.COM

Reset button

(page 11)

Ethernet port

(page 9)

Optional external power input

(page 10)

Red USB plug provides power only when the external power adapter is not present Black USB plug provides USB signals (plus power if the external power adapter is not present)

(page 10)

DisplayPort or DVI-D or VGA Connector input

(page 9)

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

3.1.1 VIDEO LINK

Each Agility Zero U Transmitter is supplied with either a DVI-D (single link), a DisplayPort™ or VGA video connector. Video signals at pixel clocks up to 165MHz (equivalent to a maximum resolution of 1920 x 1200 at 60Hz) are permissible.

TO MAKE A VIDEO LINK

Š Š Connect the Agility Zero U Transmitter video connector to the DVI-D, DisplayPort™ or VGA socket of the host computer:

Agility Zero U Transmitter DVI-D model

Host computer DVI-D video port

Agility Zero U Transmitter DP model

Host computer DisplayPort connector

Agility Zero U Transmitter VGA model

Host computer VGA video port

3.1.2 NETWORK LINK

Agility local and remote units can either be connected directly to each other or via a high speed network. A single Gigabit Ethernet port is located on the front panel. For direct links via Ethernet cable, the length of cable should not exceed 100 metres (328 feet). Network cables used for connections may be category 5, 5e, 6 or 7 twisted-pair cable. The Agility Zero U Transmitter has an autosensing capability on its network interfaces, so for direct point-to-point connections, no ‘crossover’ Ethernet cable is required.

TO LINK THE AGILITY ZERO U TRANSMITTER

1 Connect a CAT 5, 5e, 6, or 7 cable to the Gigabit Ethernet socket on the front panel of the Agility Zero U Transmitter. 2 Connect the other end of the cable either directly to an Agility remote unit or to a Gigabit Ethernet switch, as appropriate.

3 [For connections via a network] repeat steps 1 and 2 for the other Agility unit(s). WW W.B

LAC KB OX .CO

M CAT 5, 5e, 6, or 7 link either directly from the other Agility unit or from a Gigabit Ethernet switch Please see

Appendix D

for important tips about networking Agility units.

1.877.877.2269

BLACKBOX.COM

9

10

TECHNICAL 1.877.877.2269

3.1.3 USB AND POWER CONNECTIONS

The Agility Zero U Transmitter is designed to be as flexible as possible. It can either operate using an optional external power adapter or derive all of its power from its two USB plugs. The main advantage offered by using an external power adapter is that it allows the Agility Zero U Transmitter to be active before the host computer; thus allowing a remote user to access the host’s initial boot up and access the BIOS menu, when required.

If powered by USB only, then both the black and red USB plugs need to be connected.

If powered by external power adapter, only the black USB plug needs to be connected, for signal purposes. Whenever the external power adapter is attached and operating, then power will be taken from it rather than the USB plugs. There is no problem if the red USB plug remains connected while the power adapter is used.

This is summarized as follows:

Power adapter

û ü ü

Black USB

ü ü ü

Red USB

ü û ü

Power sourcing behavior

Power taken from both USB plugs.

Power taken from power adapter only.

Power taken from power adapter only, unless it becomes unavailable, in which case power will be taken from both USB plugs after a short interruption.

Note: The USB plugs do not operate as a seamless failover for the external power adapter; there will be a short interruption as operation switches from one power source to the other.

Black USB plug provides USB signals (plus power if the external power adapter is not present) Host computer USB ports Red USB plug provides power only when the external power adapter is not present WW W.B

LAC KB OX .CO

M

1.877.877.2269

From the optional external power adapter

BLACKBOX.COM

CHAPTER 4: CONFIGURATION

TECHNICAL 1.877.877.2269

Agility units are designed to be as flexible as possible and this principle extends also to their configuration.

4.1 DIRECT LINKING

Where Agility local and remote units are directly linked to each other, very little configuration action is required, provided that they have their factory default settings in place. If the standard settings have been changed in a previous installation, you merely need to perform a factory reset on each unit.

4.2 NETWORKED LINKING

Where Agility units are connected via networked links, you can either configure them individually, or configure them collectively using a Black Box iPATH Manager: Š Š

Configuring networked Agility units individually

- You need to specify the network addresses of the Agility units so that they can locate each other. This is done by running the Agility units.

Browser-based configuration utility on

a computer system linked to the same network as the Š

Š Configuring Agility units collectively

from a single application.

- The Black Box iPATH Manager allows you to configure, control and coordinate any number of Agility local and remote units Š Š

Note: If you are using one or more Agility Zero U Transmitter units within an installation managed by a Black Box iPATH Manager, the Black Box iPATH Manager must be running firmware version 4.7 or above.

Š Š

Note: If you are using the VGA equipped variant of the

Agility Zero U Transmitter

, then the iPATH server must be running firmware version 4.8 or above.

Š Š

IMPORTANT: When using Black Box iPATH to configure Agility units, it is vital that all units that you wish to locate and control are set to their factory default settings. Otherwise they will not be located by the Black Box iPATH Manager. If necessary, perform a factory reset on each Agility unit.

Š Š

Please also see Appendix D - Tips for success when networking

MANUAL FACTORY RESET

A factory reset returns the Agility Zero U Transmitter to its default configuration. You can perform factory resets using the

Browser-based configuration utility

or by using this direct manual method.

TO PERFORM A MANUAL FACTORY RESET

1 Power on the Agility Zero U Transmitter.

2 Use a narrow implement (e.g. a straightened-out paper clip) to press-and-hold the recessed reset button on the front panel for roughly fifteen seconds, until the indicators turn

blue

(Note: alternating red/green indications will occur during the fifteen second period while the button is still pressed).

WWW .BLACKBOX.COM

Use a straight clip to press for roughly 5 seconds ened-out paper the reset button 3 Release the reset switch. The indicators will remain

blue

for a short while (less than ten seconds) while the Agility Zero U Transmitter configures itself and should then change to

green

if all connections are correct; or

orange

if one or more of the video, USB and/or network links are missing.

1.877.877.2269

BLACKBOX.COM

11

TECHNICAL 1.877.877.2269

4.3 BROWSER-BASED CONFIGURATION UTILITY

The browser-based configuration utility within all Agility units requires a network connection between the Agility Zero U Transmitter and a computer on the same network. The configuration utility allows you to perform many important functions. Please see

Appendix B

.

TO CONNECT A COMPUTER TO ACCESS THE CONFIGURATION UTILITY

1 Connect a CAT 5, 5e, 6, or 7 link cable to the network port on the front panel. The port automatically configures itself, so no cross-over cable is required (but is supported if you do use one). WW W.B

LAC KB OX .CO

M Temporary link from your computer to the Agility Zero U Transmitter network port 2 Connect the other end of the link cable directly to the network port of your computer.

12 1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

TO ACCESS THE BROWSER-BASED CONFIGURATION UTILITY

1 Temporarily connect the Agility Zero U Transmitter and your computer, as discussed left. 2 Run a web browser on your computer and enter the default IP address of the Agility Zero U Transmitter:

169.254.1.33

Note: If the IP address of the Agility Zero U Transmitter has been changed and is not known, providing it is appropriate to do so, perform a

manual factory reset

to restore the default address.

The opening page of the Agility configuration utility should be displayed: Use the menu options to choose the required configuration page You can find further information about the configuration pages later in this guide: Š

Š Appendix B - Configuration pages

1.877.877.2269

BLACKBOX.COM

13

TECHNICAL 1.877.877.2269

4.4 RESTORING A BACKUP FIRMWARE IMAGE

The Agility Zero U Transmitter retains a backup image of the previous firmware version in order to provide a fallback in case of any issues with the primary image. The backup image has no video or USB functionality; once invoked, you will need to load an upgrade file using the web interface or via a Black Box iPATH Manager to load a new primary image - see Performing an upgrade (shown right).

TO RESTORE THE BACKUP FIRMWARE IMAGE

1 Power on the Agility Zero U Transmitter.

2 Use a narrow implement (e.g. a straightened-out paper clip) to press-and-hold the recessed reset button for roughly ten seconds until the indicators flash

green

/

red

. WWW .BLACKBOX.COM

Use a straightened-out paper clip to press the reset button for roughly 10 seconds 3 Release the reset switch. The Agility Zero U Transmitter will switch to the backup firmware image. Once complete, the Agility Zero U Transmitter will then continually flash

green

/

red

.

4 Perform an upgrade to reinstate a fresh primary firmware image - see next page.

14 1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

4.5 PERFORMING AN UPGRADE

Agility Zero U Transmitter modules are flash upgradeable using the method outlined here. However, for larger installations we recommend that you use the Black Box iPATH Manager to upgrade multiple Agility units. When using the method below, the Agility Zero U Transmitter will be upgraded in sequence.

IMPORTANT: Upgrades must be performed equally on all Agility units within an installation. Mixed firmware operation is not supported.

WARNING: During the upgrade process, ensure that power is not interrupted as this may leave the Agility Zero U Transmitter in an inoperable state.

If the upgrade process is interrupted and fails, it may be necessary to switch to the backup firmware image in order to regain operation. See left for details.

TO UPGRADE A SINGLE AGILITY ZERO U TRANSMITTER VIA THE NETWORK LINK

1 Download the latest upgrade file from Black Box Technical Support.

Note: Upgrade files containing “txd” are only suitable for DVI/DP variants; files containing “txf” are required for VGA variants.

2 Temporarily connect the Agility Zero U Transmitter and a computer via a network (see

Browser-based configuration utility

section for details). 3 Run a web browser on your computer and enter the IP address of the Agility Zero U Transmitter to be upgraded.

4 Click the Firmware Upgrade link. Within the Firmware Upgrade page, click the Choose File button. In the subsequent file dialog, locate the downloaded upgrade file - check that the file is correct for the Agility Zero U Transmitter being upgraded. The file contains main and backup images, you can choose to upgrade either the Main or the Backup.

5 Click the Upgrade Now button. A progress bar will be displayed (however, if your screen is connected to the Agility Zero U Transmitter being upgraded then video may be interrupted) and the status indicators on the Agility Zero U Transmitter will flash while the upgrade is in progress. 6 The indicators should stop flashing in less than one minute, after which the Agility Zero U Transmitter will automatically reboot itself. The upgrade process is complete.

FINDING THE LATEST UPGRADE FILES

Firmware files for the Agility Zero U Transmitter are available from Black Box Technical Support.

Note: It is possible to downgrade the Agility firmware. After installing the older firmware, perform a factory reset on each Agility unit in order to clear the configuration file.

1.877.877.2269

BLACKBOX.COM

15

16

CHAPTER 5: OPERATION

TECHNICAL 1.877.877.2269

In operation, many Agility installations require no intervention once configured. The Agility units take care of all connection control behind the scenes so that you can continue to work unhindered.

5.1 STATUS INDICATORS

The two top panel indicators on the Agility Zero U Transmitter provide a useful guide to operation: Main status indicators WW W.B

LAC KB OX .CO

M

Main status indicators

Š Š Off Š Š Green Š Š Orange Š Š Red Š Š Red/green flashing Š Š Blue Š Š Red/blue flashing Š Š Fast green flash

Network specific indicators

Š Š Orange Š Š Green Network specific indicators No power Operating - Video, USB and network link all present Operating - But video, USB and/or network link missing.

(momentarily) Unit is booting up, or (consistently) Unit has failed, try rebooting.

Unit is in backup mode. Factory reset has been activated.

Unit is in upgrade mode.

Unit is in identify mode (see page 22).

Off: No link Off: No link On: Link established Flashing: Network activity On: Quiescent link

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

5.2 RESETTING

The recessed reset button provides a way to take control of the Agility Zero U Transmitter if normal operation is affected. You will need a thin implement, such as a straightened out paper clip to press and hold the button. Depending on when you release the button, one of three functions will occur:

REQUIRED FUNCTION

Š Š To reboot to the primary firmware version

RELEASE TIME

less than 10s

INDICATORS red

Š Š To boot to the backup firmware version* 10 to 14s

green

/

red

flash Š Š To restore factory settings and reboot more than 15s

blue

* The backup firmware version has no video or USB functionality. Once invoked, you will need to load an upgrade file to restore

normal operation - see page 14.

TO RESET THE AGILITY ZERO U TRANSMITTER

1 Power on the Agility Zero U Transmitter.

2 Use a narrow implement (e.g. a straightened-out paper clip) to press-and-hold the recessed reset button. The status indicators will immediately turn

red

: WWW .BLACKBOX.COM

Use a straightened-out paper clip to press the reset button for roughly 10 seconds 3 Release the reset switch at the appropriate time (see the table above).

NOTE: If you are performing a factory reset and intend to disconnect the power immediately after the reset, you must wait at least 30 seconds after you have released the reset button for it to complete the process.

1.877.877.2269

BLACKBOX.COM

17

18 1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

APPENDICES

This chapter contains a variety of information, including the following: Š

Š Appendix A

- Supported video modes Š Š

Appendix B

- Configuration pages Š Š

Appendix C

- Dimensions Š Š

Appendix D

- Tips for success when networking Agility units Š Š

Appendix E

- Troubleshooting Š Š

Appendix F

- Glossary Š Š

Appendix G

- Open source licenses Š Š

Appendix H

- Safety information TECHNICAL 1.877.877.2269

1.877.877.2269

BLACKBOX.COM

19

20

APPENDIX A - SUPPORTED VIDEO MODES

The following video modes are supported and can be automatically configured by the Agility Zero U Transmitter. If a recognized video mode cannot be found, contact Technical Support for help. cvt reduced 640 x 480 @ 60Hz vesa 640 x 480 @ 60Hz vesa 640 x 480 @ 72Hz cvt reduced 1280 x 960 @ 60Hz vesa 1280 x 960 @ 60Hz cvt reduced 1280 x 1024 @ 60Hz vesa 640 x 480 @ 75Hz vesa 1280 x 1024 @ 60Hz ibm 640 x 480 @ 75Hz cvt reduced 800 x 600 @ 60Hz vesa 800 x 600 @ 56Hz ibm 1280 x 1024 @ 67Hz vesa 1280 x 1024 @ 75Hz cvt reduced 1360 x 768 @ 60Hz vesa 800 x 600 @ 60Hz vesa 1360 x 768 @ 60Hz vesa 800 x 600 @ 72Hz vesa 800 x 600 @ 75Hz cvt 1024 x 600 @ 60Hz vesa 1366 x 768 @ 60Hz vesa reduced 1366 x 768 @ 60Hz vesa 1400 x 1050 @ 60Hz cvt reduced 1024 x 600 @ 60Hz vesa reduced 1400 x 1050 @ 60Hz cvt reduced 1024 x 768 @ 60Hz vesa 1024 x 768 @ 60Hz vesa 1024 x 768 @ 70Hz cvt reduced 1600 x 900 @ 60Hz vesa reduced 1600 x 900 @ 60Hz cvt reduced 1600 x 1200 @ 60Hz ibm 1024 x 768 @ 70Hz vesa 1600 x 1200 @ 60Hz vesa 1024 x 768 @ 75Hz ibm 1024 x 768 @ 75Hz cvt reduced 1152 x 864 @ 60Hz vesa 1680 x 1050 @ 60Hz vesa reduced 1680 x 1050 @ 60Hz cvt reduced 1920 x 1080 @ 50Hz vesa 1152 x 864 @ 70Hz cvt 1920 x 1080 @ 50Hz vesa 1152 x 864 @ 75Hz cvt 1280 x 720 @ 60Hz vesa 1280 x 720 @ 60Hz vesa 1920 x 1080 @ 60Hz vesa reduced 1920 x 1200 @ 60Hz sun 1024 x 768 @ 77Hz vesa 1280 x 768 @ 60Hz sun 1152 x 900 @ 66Hz vesa reduced 1280 x 786 @ 60Hz vesa 1280 x 786 @ 75Hz vesa 1280 x 786 @ 85Hz sun 1152 x 900 @ 76Hz sun 1024 x 1024 @ 61Hz sun 1280 x 1024 @ 67Hz vesa 1280 x 800 @ 60Hz sun 1280 x 1024 @ 76Hz TECHNICAL 1.877.877.2269

1.877.877.2269

BLACKBOX.COM

APPENDIX B - CONFIGURATION PAGES

TECHNICAL 1.877.877.2269

This section covers the browser-based configuration utility for the Agility Zero U Transmitter. The pages are titled as follows: Š Š

System Configuration

Š Š

Video Configuration

Š

Š Analogue Video Configuration

Š Š

USB Settings

Š Š

Security

Š Š

iPATH Manager

Š Š

System Messages

Š

Š Statistics

Š

Š Firmware Upgrade

Š

Š Reboot

Š

Š About

1.877.877.2269

BLACKBOX.COM

21

SYSTEM CONFIGURATION

TECHNICAL 1.877.877.2269

22

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

System Configuration

link.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

SYSTEM CONFIGURATION

UNIT NAME

Name details that you can alter to distinguish this unit from all others. The name entered here will be read by Black Box iPATH units (if used) for administration purposes.

UNIT DESCRIPTION

Allows you to optionally add a description of the Agility Zero U Transmitter, such as its location. Useful when many Agility units are being used.

SYSTEM PORT

This section determines the IP Address, Netmask and Gateway details for the Gigabit Ethernet port located on the front panel. The default IP address is 169.254.1.33 which is the zero config IP address that allows the Agility Zero U Transmitter to work immediately in point-to-point mode. You are recommended to change this to an appropriate address in the private IP range 192.168.xxx.xxx The default netmask is 255.255.0.0. If you change the IP address to the private range, you are recommended to change this to 255.255.255.0 The default gateway address is 0.0.0.0

FORCE MULTICAST

By default, the Agility Zero U Transmitter will use unicast transmission when only a single remote unit is connected. This would then be upgraded to multicast when one or more other remote units are added. By ticking this option, the Agility Zero U Transmitter will always use multicast. This option should be ticked for most installations as it provides the most efficient way to deliver video and audio to multiple destinations.

ENABLE OPTIONS

These checkboxes allow you to determine which peripheral options will be used: Video, audio and USB.

IDENTIFY UNIT

When clicked, these buttons cause the top indicators to flash to assist with identifying the Agility Zero U Transmitter within a rack. Š Š The Identify Unit (short) button flashes the indicators for five seconds. Š Š The Identify Unit (long) button flashes the indicators for one hour but can be overridden by clicking the Identify Unit (short) button.

TARGET MULTICAST CONFIGURATION

This option allows you to configure an IP address to which this local unit can send multicast data, and from which multiple remote units can tap into it.

Note: The multicast addresses for each service endpoint must be unique across the whole Agility installation.

1.877.877.2269

BLACKBOX.COM

23

VIDEO CONFIGURATION

TECHNICAL 1.877.877.2269

24

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

Video Configuration

link.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

VIDEO CONFIGURATION

PEAK BANDWIDTH LIMITER PERCENTAGE

The Agility Zero U Transmitter will employ a ‘best effort’ strategy in sending video and other data over the IP network. This means it will use as much of the available network bandwidth as necessary to achieve optimal data quality, although typically the Agility Zero U Transmitter will use considerably less than the maximum available. In order to prevent the Agility Zero U Transmitter from ‘hogging’ too much of the network capacity, you can reduce this setting to place a tighter limit on the maximum bandwidth permissible to the Agility Zero U Transmitter. Range: 0 to 95%.

BACKGROUND REFRESH

The Agility Zero U Transmitter sends portions of the video image only when they change. In order to give the best user experience, the Agility Zero U Transmitter also sends the whole video image, at a lower frame rate, in the background. The Background Refresh parameter controls the rate at which this background image is sent. The default value is ‘every 32 frames’, meaning that a full frame is sent in the background every 32 frames. Reducing this to ‘every 64 frames’ or more will reduce the amount of bandwidth that the Agility Zero U Transmitter consumes. On a high-traffic network this parameter should be reduced in this way to improve overall system performance. Options: every 32 frames, every 64 frames, every 128 frames, every 256 frames or disabled.

ENABLE MAGIC EYE

Note: This check box is not present on VGA variants as the Magic Eye feature is always enabled on those models.

This feature, enabled as standard, aims to reduce the effect of dithering - a technique used by some graphics cards to improve the perceived quality and color depth of images by diffusing or altering the color of pixels between video frames. The Magic Eye feature increases the frame rate and eliminates unnecessary network traffic by ignoring the color dithering where it occurs. If the video source is not noisy or dithered then you can switch off Magic Eye to enable full color accuracy.

USE DEFAULT DDC AND CHOOSE DEFAULT DDC

When the

Use Default DDC

option is unticked, the Agility Zero U Transmitter will use the EDID that is reported by the monitor connected to the remote unit. However, if you tick the

Use Default DDC

option, you can then select from a range of preset video resolutions from the

Choose Default DDC

drop down box. Once selected, the Agility Zero U Transmitter will report itself capable of only supporting this one video resolution. Please note that all of the listed video resolutions are single link DVI with a maximum pixel clock of 165MHz and a 60Hz refresh rate.

ENABLE HOT PLUG DETECT

When this option is ticked, every time the monitor is changed at the remote unit, a hot plug detect message will be sent to the graphics card of the PC attached to the Agility Zero U Transmitter.

Note: VGA adapters do not have a Hot Plug Detect (HPD) contact, the VGA variant of the Agility Zero U Transmitter will use other methods to detect sudden changes in EDID data, however, some hosts may not be able to detect on-the-fly changes.

PERIOD OF HOT PLUG DETECT SIGNAL

This is the length of time that the hot-plug detect signal is de-asserted. The default of 100ms (3s for the VGA variant) is sufficient for the majority of DVI/DP++ graphics cards, however, a small minority may need to be given a longer a period and all VGA graphics cards will require a longer period.

FRAME SKIPPING PERCENTAGE

Frame Skipping involves ‘missing out’ video frames between those captured by the Agility Zero U Transmitter. For video sources that update only infrequently or for those that update very frequently but where high fidelity is not required, frame skipping is a good strategy for reducing the overall bandwidth consumed by the system. Range: 0 to 100%.

COMPRESSION

Determines the (AFZ and AFZ+) compression method used for video transmission. Choices are: Š Š ‘Pixel perfect’ - only uses pixel perfect AFZ, Š Š ‘Adaptive’ - guarantees frame rate, builds to pixel perfect, Š Š ‘Smoothest video’ - forces the maximum compression, or Š Š ‘Advanced’ - allows you to choose a fixed compression mode: • ‘AFZ only (pixel perfect), • ‘AFZ+ Minimum compression’, • ‘AFZ+ Middle compression’, or • ‘AFZ+ Maximum compression’.

1.877.877.2269

BLACKBOX.COM

25

ANALOGUE VIDEO CONFIGURATION

TECHNICAL 1.877.877.2269

26

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

Analogue Video Configuration

link.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

ANALOGUE VIDEO CONFIGURATION

This page is available on Agility Zero U Transmitter VGA variants only and allows screen adjustment for the video position, contrast and brightness.

VIDEO POSITION

This setting allows you to re-center the video output to the screen if the system fails to automatically make the adjustment itself. Each digit represents a 1 pixel shift; the total range is dependent on the video input.

CONTRAST

Allows you to adjust the contrast separately for color.

Note: This setting defaults to 100 for all three colors.

BRIGHTNESS

Allows you to adjust the brightness separately for color.

Note: This setting defaults to 0 for all three colors.

ENABLE GTF DETECTION

When ticked, if a suitable video mode match has not been located within the stored Custom or Standard details, the Agility Zero U Transmitter unit will attempt to use the closest match available within the list of

Generalized Timing Formula (GTF)

best case modes determined by VESA. If this option is not ticked, then no attempt will be made to match a GTF mode and, following a failure to find a suitable Custom or Standard mode, the last used video mode will endure.

DETAILED TIMINGS

Click this button to confirm which video mode is currently being used to match the video input being received from the host

computer. This information may be requested by Technical Support when investigating video issues. See "Analogue video configuration > Detailed timings" on page 28.

CONFIGURE CUSTOM MODES

Click this button to create up to three custom video modes to serve hardware not supported by standard configurations. See

"Analogue video configuration > Custom mode timings" on page 29.

UPDATE NOW

Click to take another snapshot of the incoming video signal and analyze its attributes. This button has combined reload, re identify and save functions.

1.877.877.2269

BLACKBOX.COM

27

ANALOGUE VIDEO CONFIGURATION > DETAILED TIMINGS

TECHNICAL 1.877.877.2269

This page is available on Agility Zero U Transmitter VGA variants only and provides information that may be requested by Technical Support when investigating video issues.

DETAILED TIMINGS / SYNC INFO

This entry confirms which video mode is currently being used to match the video input being received from the host computer and lists the primary horizontal and vertical criteria.

28

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

Analogue Video Configuration

link and then click the

Detailed Timings

button.

1.877.877.2269

BLACKBOX.COM

ANALOGUE VIDEO CONFIGURATION > CUSTOM MODE TIMINGS

TECHNICAL 1.877.877.2269

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

Analogue Video Configuration

link and then click the

Custom Mode Timings

button.

1.877.877.2269

BLACKBOX.COM

29

TECHNICAL 1.877.877.2269

ANALOGUE VIDEO CONFIGURATION > CUSTOM MODE TIMINGS

This page is available on Agility Zero U Transmitter VGA variants only and allows you to create custom video modes to serve hardware not supported by standard configurations.

IMPORTANT: The Custom Mode Timings feature is designed for advanced users who have experience of working with VGA video timings. If you are at all unsure, then please contact Black Box Support for assistance. You will need to provide the signal measurements shown on the Detailed Timings page.

CUSTOM MODE 1 - 3

These three entries provide access to the various configuration details for each Custom Mode. You can optionally use the

Custom Mode Name

field to enter a meaningful name for each Custom Mode.

MEASURED POLARITIES

Indicates the respective polarities of the current horizontal and vertical sync signals. These polarities must match those in the measured values in order for a custom mode to be considered a suitable candidate.

TIMINGS / CALCULATED / MEASURED

The table lists the primary horizontal and vertical criteria as time measurements. It also offers a comparison between the entries within the fields in the section below (shown in the

Calculated

column) and the video input that is currently being received from the host computer (shown in the

Measured

column).

Note: The measured values present a snapshot of the incoming video stream. It is advisable to click the

Update Now

button in the lower right corner of the page to make successive samples of the video signal.

The

Error

value provides an important metric to determine whether a set of entered custom values should be used for the video signal. The figures within the

Calculated

column will be shaded using one of three colors to signify the accuracy of the Calculated and Measured values: • Less than 2.5% difference

Green

• Between 2.5 and 10% difference • Greater than 10% difference

Orange Red

The

Error

entry itself will be colored either green (error less than 1) or red (error equal to or greater than 1). Only custom modes with an error less than 1 will be considered. If more than one enabled custom mode fulfils the criteria, the one with the lowest overall Error value will be chosen.

continued on next page

30

TO BEGIN CREATING A CUSTOM MODE

• There are two mains ways to begin: • If you know all of the required timing attributes, enter them in the various fields and click

Update Now

. • To gain values automatically, select a valid • Adjust the • Adjust the

Back Porch

and

Front Porch Horizontal Active Width

and

Aspect Ratio Pixel Clock

and click

Auto Detect

. The system will use heuristic methods to obtain values for the various attributes as close as possible to the incoming video signal. attributes to move the Active Video Area up/down and/or left/right. The aim is to eradicate any cropping of the video image and/or black borders.

to stretch/squash image, if necessary.

• If the

Error

value is shown in green and is sufficiently small (ie less than 1) and the video image shows clearly, check the

Enable Mode

tickbox and optionally enter a

Custom Mode Name

for your new entry.

• See also "Fine tuning after an Auto Detect procedure" on page 32.

• IMPORTANT: Click the

Update Now

button to save current settings, refresh timings and re-trigger mode detection (the page does not respond to attribute changes until the button is clicked).

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

ANALOGUE VIDEO CONFIGURATION > CUSTOM MODE TIMINGS

ENABLE MODE

When this option is ticked (and the entered details have been saved), the currently selected Custom Mode is available for selection and use.

CUSTOM MODE NAME

Allows you to enter a meaningful name for the currently selected Custom Mode. A maximum of 20 alphanumeric characters can be used per name.

PIXEL CLOCK

This is a key setting for each video mode as it is the primary timing element. The Pixel Clock range is 25MHz to 170MHz with a granularity of 0.001MHz. It is important to get this setting as close as possible to the correct value for the video signal. However, it is not essential to enter the precise value because subsequent automatic adjustments will be made to fine tune to the correct value.

If the Pixel Clock setting is incorrect the image may be blurred or have artefacts.

HORIZONTAL AND VERTICAL DIMENSIONS

Eight fields are used to define the various horizontal and vertical attributes of the video signal, as summarized in this diagram: Vertical Sync Width (eg: 5 lines) Vertical Back Porch (eg: 20 lines) Vertical Active Height (eg 720 lines)

Active Video Area

Vertical Front Porch (eg: 3 lines) Total Horizontal Pixels = H. Sync Width + H. Back Porch + H.Active Width + H. Front Porch Each axis comprises four attributes:

Sync Width + Back Porch + Active Width/Height + Front Porch

Horizontal attributes are measured in pixels; vertical attributes are measured in lines.

The

Horizontal Active Width

and

Vertical Active Height

attributes determine how much of the

Active Video Area

is shown. However, these attributes must work in close harmony with the

Sync Width

plus the

Back

and

Front Porch

settings to achieve a coherent video image in the correct location. In particular, if the should be no border or clipping of the image.

Porch

values are incorrect, the image will be offset with a black border on one side and cropping on the opposite side. When the active video area and its position are correctly selected, there Using all eight of the attributes in combination, it is important to achieve the correct total number of horizontal pixels and vertical lines, otherwise you will see artefacts in the resulting video feed.

Selecting the correct image resolution can have a significant effect on the display of the image. Video display screens (and projectors) have native resolutions. If the images sent to a display are not native for that device, it will probably try adapt the incoming image; and the adaptation will depend greatly on the capabilities of the display. Providing the image resolution is correct, the Agility receiver should automatically create appropriate timings for the display or projector.

1.877.877.2269

BLACKBOX.COM

31

TECHNICAL 1.877.877.2269

ANALOGUE VIDEO CONFIGURATION > CUSTOM MODE TIMINGS

FINE TUNING AFTER AN AUTO DETECT PROCEDURE

The

Auto Detect

mechanism relies on a series of heuristics to make a best estimation of the video parameters. Polarity settings The horizontal and vertical polarity values are extracted directly from the VGA signal and in all standard video cases the detected val ues will be correct.

Vertical settings • The vertical line values are usually generated with a reasonable degree of certainty. The total vertical and sync lines will usually be accurate and there should not be a reason to adjust these.

• The

Vertical Active Height

is calculated from the detection of the mode and so long as the mode is correctly guessed it should be accurate. However, if you do need to adjust the

Vertical Active Height

value then you will also need to change the

Vertical Front Porch

and/or

Vertical Back Porch

values (which control the vertical positioning of the

Active Video Area

) accordingly to maintain the ‘Total Vertical Lines’.

Horizontal settings • The

Horizontal Active Width

and

Pixel Clock

values are chosen by the Auto Detect mechanism to best fit the combined measure tal configuration values is a more involved process than for the vertical ones.

• The primary considerations are the ‘Total Horizontal Pixels’ and the

Pixel Clock

increase in one must be compensated for by a decrease in the other. Once the correct total value and

Pixel Clock

ments. The calculations then result in a set of values which allow the detection of the mode. Adjustment of the generated horizon frequency. These share an inverse relationship: an have been deter mined, the individual pixel values can be adjusted while taking care to maintain a constant horizontal total.

• The

Horizontal Sync Width

value is important for mode detection and the

Horizontal Back Porch

attribute is key to determining the horizontal image position. Any changes to the

Horizontal Back Porch

attribute must be inversely reflected in the

Horizontal Front Porch

setting in order to maintain a constant horizontal total. • If the

Pixel Clock

determination is too inaccurate for automatic adjustment it is likely that artefacts will occur in the video stream.

32 1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

USB SETTINGS

ENABLE DUMMY BOOT KEYBOARD

When ticked, the Agility Zero U Transmitter will report a virtual dummy boot keyboard to the attached PC to ensure that a keyboard is always reported when the PC boots up. The dummy boot keyboard uses one of the 13 USB endpoints, therefore if all 13 endpoints are required elsewhere for USB devices (or a KVM switch only supports two HID devices) then it can be disabled by deselecting this option. See also

Reserved Port Range

below.

HUB SIZE

Using this option you can select whether the Agility Zero U Transmitter should report itself as a 13 or a 7 port USB hub. Some USB hosts are only able to support 7 port USB hubs. If this option is set to 7, then only 7 USB devices are supported by the PC.

RESERVED PORT RANGE

For some devices, e.g. touch screens, you may wish to ensure that they are always reported to the same USB port number so that the USB driver will always find the device. This option allows you reserve up to 8 ports for certain devices. At the remote unit, the devices are assigned to the reserved ports. If a port reservation is to be applied, then the dummy boot keyboard should be disabled. The default value for this option is ‘0’, i.e.

disabled

.

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

USB settings

link.

1.877.877.2269

BLACKBOX.COM

33

TECHNICAL 1.877.877.2269

SECURITY

34

USB ENCRYPTION

This setting determines whether encryption should be applied to the USB data passed across the link. Note that video data is never encrypted.

CONTROL ENCRYPTION

This setting determines whether encryption should be applied to the control data passed across the link. The “Prefer off” setting means that control encryption is enabled if the remote unit at the other end of the link has “always on” selected, otherwise it is disabled.

Note: video data is never encrypted.

SECURE WEB PAGES WITH PASSWORD

When ticked, this option enables https security so that the configuration pages are only accessible to the admin user with a password.

CHANGE/CONFIRM PASSWORD

These options allow you to change the admin password for the system.

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

Security

link.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

IPATH MANAGER

ENABLE IPATH CONTROL

Click this button to allow a Black Box iPATH Manager to take control of this local unit. When the button is clicked, the Agility Zero U Transmitter will be rebooted to allow the iPATH Manager to discover and control it.

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

iPATH Manager

link.

1.877.877.2269

BLACKBOX.COM

35

TECHNICAL 1.877.877.2269

SYSTEM MESSAGES

36

ENABLE SYSTEM MESSAGES

Tick to allow the creation of status and error messages by the Agility Zero U Transmitter.

SEND SYSTEM MESSAGES TO REMOTE LOG SERVER

Choose this option to send the system messages to a remote server via the network. Provide the IP address of a suitable server here also.

Note: Agility units use the User Datagram Protocol (UDP) for all Syslog traffic.

STORE SYSTEM MESSAGES IN UNIT

When ticked, this option will store system messages within the memory of the Agility Zero U Transmitter. Click the

View messages

button to view the list or the

Clear messages

button to delete the list.

UPDATE NOW

Click to save and implement any changes that you make.

TO GET HERE

1

Connect your computer to the network port

on the front panel.

2 Run a web browser and enter the IP address of the unit.

If the address is unknown, perform a

manual factory reset to

http://169.254.1.33

3 If necessary, click the

System Messages

link.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

STATISTICS

ENABLE COLLECTION OF BANDWIDTH STATISTICS

Agility units can record data transfer statistics from the System port and plot them on a graph for troubleshooting and optimization purposes. When you enable this option, you will first be presented with a pop up from which you can choose which aspects you would like to graph: Data throughput, various packet rates and/or frame rates.

SUBMIT

Click this button after ticking the above checkbox to plot the chosen statistics on a pop up graph.

FIRMWARE UPGRADE

UPGRADE

Use this page to upgrade the main or backup firmware image on the Agility Zero U Transmitter. Please see the section Performing an upgrade

for details.

1.877.877.2269

BLACKBOX.COM

37

REBOOT ABOUT

TECHNICAL 1.877.877.2269

REBOOT

Use this page to perform a reboot or a factory reset. Please see the section

Manual factory reset

for details.

ABOUT

This page displays key information about the Agility Zero U Transmitter that may be requested by Black Box Technical Support.

38 1.877.877.2269

BLACKBOX.COM

APPENDIX C - DIMENSIONS

0.2” (5mm) 1.3” (33mm) 0.98” (25mm) 4 x M3 holes 1.97” (50mm) 2.2” (56mm) 2.95” (75mm) 4.33” (110mm) 0.91” (23mm) TECHNICAL 1.877.877.2269

1.877.877.2269

BLACKBOX.COM

39

40

APPENDIX D - TIPS FOR SUCCESS WHEN NETWORKING

TECHNICAL 1.877.877.2269

Agility units use multiple strategies to minimise the amount of data that they send across networks. However, data overheads can be quite high, particularly when very high resolution video is being transferred, so it is important to take steps to maximise network efficiency and help minimise data output. The tips given in this section have been proven to produce very beneficial results.

C.1 SUMMARY OF STEPS

Š Š Choose the right kind of switch.

Š Š Create an efficient network layout.

Š Š Configure the switches and devices correctly.

C.2 CHOOSING THE RIGHT SWITCH

Layer 2 switches are what bind all of the hosts together in the subnet. However, they are all not created equally, so choose

carefully. In particular look for the following: Š Š Gigabit (1000Mbps) or faster Ethernet ports, Š Š Support for

IGMP v2

(or v3) snooping, Š Š Support for

Jumbo frames up to 9216-byte size,

Š Š High bandwidth connections between switches, preferably Fiber Channel.

Š Š

Look for switches that perform their most onerous tasks (e.g. IGMP snooping

) using multiple dedicated processors (ASICS).

Š Š Ensure the maximum number of concurrent ‘snoopable groups’ the switch can handle meets or exceeds the number of ServSwitch Agility local units that will be used to create multicast groups. Š Š Check the throughput of the switch: Full duplex, 1Gbps up- and down- stream speeds per port. Š Š Use the same switch make and model throughout a single subnet.

Š Š You also need a

Layer 3

switch. Ensure that it can operate efficiently as an IGMP Querier

.

C.2.1 LAYER 2 (AND LAYER 3) SWITCHES KNOWN TO WORK

Š Š Black Box EMS1G48 Š Š Cisco 2960 Š Š Cisco 3750 Š Š Cisco 4500 Š Š Cisco 6500 Š Š Extreme Networks X480 Š Š HP Procurve 2810 Š Š HP Procurve 2910 Š Š H3C 5120 Š Š HuaWei Quidway s5328c-E1 (Layer 3)

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

C.3 CREATING AN EFFICIENT NETWORK LAYOUT

Network layout is vital. The use of IGMP snooping also introduces certain constraints, so take heed:

Š Š Keep it flat. Use a basic line-cascade structure rather than a pyramid or tree arrangement (see below).

Š Š Keep the distances between the switches as short as possible.

Š Š Ensure sufficient bandwidth between switches to eliminate bottlenecks.

Š Š Where the ServSwitch iPATH manager is used to administer multiple ServSwitch Agility transceivers, ensure the ServSwitch iPATH manager and all ServSwitch Agility units reside in the same subnet. Š Š Do not use VGA to DVI converters, instead replace VGA video cards in older systems with suitable DVI replacements. Converters cause ServSwitch Agility local units to massively increase data output.

Š Š Wherever possible, create a private network.

C.3.1 THE RECOMMENDED LAYOUT

The layout shown in Figure B-1 below has been found to provide the most efficient network layout for rapid throughput when using IGMP snooping: Figure B-1. Recommended layout for networking ServSwitch Agility units where IGMP snooping is used

Layer 3 Switch (Querier)

20GB link

Layer 2 Switch

10GB link

Layer 2 Switch

1GB links Note: From firmware version 3.1, tree and hierarchical structures of network switches are also supported. The local unit now joins its own multicast group so there is always a route from the querier to the local unit which was previously missing in earlier firmware versions.

Š Š Use no more than two cascade levels.

Š Š Ensure high bandwidth between the two L2 switches and very high bandwidth between the top L2 and the L3. Typically 10GB and 20GB, respectively for 48 port L2 switches.

1.877.877.2269

BLACKBOX.COM

41

TECHNICAL 1.877.877.2269

C.4 CONFIGURING THE SWITCHES AND DEVICES

The layout is vital but so too is the configuration: Š Š

Enable IGMP Snooping

on all L2 switches.

Š Š

Ensure that IGMP Fast-Leave

is enabled on all switches with ServSwitch Agility units connected directly to them.

Š Š

Enable the L3 switch as an IGMP Querier .

Š Š

Enable Spanning Tree Protocol (STP)

on all switches and importantly also enable portfast (only) on all switch ports that have ServSwitch Agility units connected. Š Š

If any hosts will use any video resolutions using 2048 horizontal pixels (e.g. 2048 x 1152), ensure that Jumbo Frames are

enabled on all switches.

Š Š Choose an appropriate forwarding mode on all switches. Use

Cut-through

if available, otherwise

Store and forward

.

Š Š Optimize the settings on the ServSwitch Agility local units: Š Š If moving video images are being shown frequently, then leave Frame Skipping at a low percentage and instead reduce the Peak bandwidth limiter.

Š Š Where screens are quite static, try increasing the Background Refresh interval and/or increasing the Frame skipping percentage setting.

Š Š Make changes to the ServSwitch Agility local units one at a time, in small steps, and view typical video images so that you can attribute positive or negative results to the appropriate control.

Š Š Ensure that all ServSwitch Agility units are fully updated to the latest firmware version (at least v2.1).

42 1.877.877.2269

BLACKBOX.COM

APPENDIX E - TROUBLESHOOTING

TECHNICAL 1.877.877.2269

PROBLEM: THE VIDEO IMAGE OF THE AGILITY REMOTE UNIT SHOWS HORIZONTAL LINES ACROSS THE SCREEN.

This issue is known as

Blinding

because the resulting video image looks as though you’re viewing it through a venetian blind. When video is transmitted by Agility units, the various lines of each screen are divided up and transmitted as separate data packets. If the reception of those packets is disturbed, then blinding is caused. The lines are displayed in place of the missing video data packets. There are several possible causes for the loss of data packets: Š Š Incorrect switch configuration. The problem could be caused by multicast flooding, which causes unnecessary network traffic. This is what IGMP snooping is designed to combat, however, there can be numerous causes of the flooding. Š Š Speed/memory bandwidth issues within one or more switches. The speed and capabilities of different switch models varies greatly. If a switch cannot maintain pace with the quantity of data being sent through it, then it will inevitably start dropping packets.

Š Š One or more Agility units may be outputting Jumbo frames due to the video resolution (2048 horizontal pixels) being used. If jumbo frames are output by an Agility unit, but the network switches have not been configured to use jumbo frames, the switches will attempt to break the large packets down into standard packets. This process introduces a certain latency and could be a cause for dropped packets.

Š Š One or more Agility units may be using an old firmware version. Firmware versions prior to v2.1 exhibited an issue with the timing of IGMP join and leave commands that caused multicast flooding in certain configurations.

REMEDIES:

Š Š

Ensure that IGMP snooping is enabled on all switches within the subnet.

Š Š Where each Agility unit is connected as the sole device on a port connection to a switch, enable

IGMP Fast-Leave (aka Immediate Leave)

to reduce unnecessary processing on each switch. Š Š Check the video resolution(s) being fed into the Agility local units. If resolutions using 2048 horizontal pixels are unavoidable

then ensure that Jumbo frames are enabled on all switches.

Š Š Check the

forwarding mode

on the switches. If

Store and forward

is being used, try selecting

Cut-through

as this mode causes reduced latency on lesser switch designs. Š Š Ensure that one device within the subnet is correctly configured as an

IGMP Querier , usually a layer 3 switch or multicast

router.

Š Š Ensure that the firmware in every Agility unit is version 2.1 or greater.

Š Š Try adjusting the local unit settings on each Agility to make the output data stream as efficient as possible. See

Agility local unit video settings

for details.

Š Š

continued

1.877.877.2269

BLACKBOX.COM

43

44

TECHNICAL 1.877.877.2269

PROBLEM: THE MOUSE POINTER OF THE AGILITY REMOTE UNIT IS SLOW OR SLUGGISH WHEN MOVED ACROSS THE SCREEN.

This issue is often related to either using dithering on the video output of one or more transmitting computers or using VGA-to DVI video converters.

Dithering is used to improve the perceived quality and color depth of images by diffusing or altering the color of pixels between video frames. This practice is commonly used on Apple Mac computers using ATI or Nvidia graphics cards. VGA-to-DVI converters unwittingly produce a similar issue by creating high levels of pixel background noise.

Agility units attempt to considerably reduce network traffic by transmitting only the pixels that change between successive video frames. When dithering is enabled and/or VGA-to-DVI converters are used, this can have the effect of changing almost every pixel between each frame, thus forcing the Agility local unit to send the whole of every frame: resulting in greatly increased network traffic and what’s perceived as sluggish performance.

REMEDIES:

Š Š Linux PCs Š Š Check the video settings on the PC. If the Dither video box option is enabled, disable it.

Š Š Apple Mac with Nvidia graphics Š Š Use the utility for Mac’s – Contact technical support.

Š Š Apple Mac with ATI graphics Š Š Enable the Magic Eye dither removal feature.

Š Š Windows PCs Š Š If you suspect these issues with PC’s, contact technical support for assistance.

Š Š Replace old VGA adapters on host computers with DVI video cards.

PROBLEM: MY MONITOR IS DISPLAYING A PINK SCREEN

It is possible that the source computer and Agility local unit are sending a high resolution Dual Link signal in response to a request from your Dual Link monitor. However, your Agility remote unit is unable to correctly process the signal, causing the pink screen issue (DVI resolutions above 1920 x 1200 are generally Dual Link). Agility Dual (ACR1002A-T) and Agility Dual VNC (ACR1012A-T) local units are able to send Dual Link video when requested, however, an Agility Dual (ACR1002A-R) remote unit is required to process the higher resolution signal fully at the other end. Other remote units, such as the Agility, and Agility Dual-Head units cannot process Dual Link DVI as they are Single Link devices.

Ensure that the Agility local unit is set to supply a Single Link EDID to the graphics card. When the video source is changed to a Single Link video resolution, the pink screen should disappear and the video should be displayed normally. Alternatively, change the monitor to a Single Link DVI monitor.

It is important not to mix Dual Link Local units with Single Link Remote units.

On an iPATH controlled system, ensure that the Video compatibility check is enabled as this ensures that the correct video mode is displayed for the monitor being used.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

PROBLEM: THE AUDIO OUTPUT OF THE AGILITY REMOTE UNIT SOUNDS LIKE A SCRATCHED RECORD.

This issue is called Audio crackle and is a symptom of the same problem that produces blinding (see previous page). The issue is related to missing data packets.

REMEDIES:

As per blinding discussed previously.

PROBLEM: BLACK BOX IPATH CANNOT LOCATE WORKING AGILITY UNITS.

There are a few possible causes: Š Š The Agility units must be reset back to their zero config IP addresses for Black Box iPATH discovery. If you have a working network of Agility’s without Black Box iPATH and then add Black Box iPATH to the network Black Box iPATH will not discover the Agilitys until they are reset to the zero config IP addresses. Š Š This could be caused by Layer 2 Cisco switches that have

Spanning Tree Protocol (STP) enabled but do not also have

zero config IP address at reboot and Black Box iPATH will only acquire them one at a time on a random basis.

portfast

enabled on the ports to which Agility units are connected. Without portfast enabled, Agility units will all be assigned the same Š Š You can easily tell whether portfast is enabled on a switch that is running STP: When you plug the link cable from a working Agility unit into the switch port, check how long it takes for the port indicator to change from orange to green. If it takes roughly one second, portfast is on; if it takes roughly thirty seconds then portfast is disabled.

REMEDIES:

Š Š Ensure that the Agility units and the Black Box iPATH Manager are located within the same subnet because Black Box iPATH cannot cross subnet boundaries.

Š

Š Manually reset

the Agility units to their zero config IP addresses. Š Š Enable portfast on all switch ports that have Agility units attached to them or try temporarily disabling STP on the switches while Black Box iPATH is attempting to locate Agility units.

1.877.877.2269

BLACKBOX.COM

45

46

APPENDIX F - GLOSSARY

TECHNICAL 1.877.877.2269

E.1 INTERNET GROUP MANAGEMENT PROTOCOL

Where an ServSwitch Agility local unit is required to stream video to two or more remote units, multicasting is the method used. Multicasting involves the delivery of identical data to multiple remote units simultaneously without the need to maintain individual links. When multicast data packets enter a subnet, the natural reaction of the switches that bind all the hosts together within the subnet, is to spread the multicast data to all of their ports. This is referred to as Multicast flooding and means that the hosts (or at least their network interfaces) are required to process plenty of data that they didn’t request. IGMP offers a partial solution.

The Internet Group Management Protocol (IGMP) is designed to prevent multicast flooding by allowing

Layer 3 switches to

check whether host computers within their care are interested in receiving particular multicast transmissions. They can then direct multicast data only to those points that require it and can shut off a multicast stream if the subnet has no recipients.

There are currently three IGMP versions: 1, 2 and 3, with each version building upon the capabilities of the previous one: Š Š IGMPv1 allows host computers to opt into a multicast transmission using a Join Group message, it is then incumbent on the router to discover when they no longer wish to receive; this is achieved by polling them (see IGMP Querier below) until they no longer respond.

Š Š IGMPv2 includes the means for hosts to opt out as well as in, using a Leave Group message. Š Š IGMPv3 encompasses the abilities of versions 1 and 2 but also adds the ability for hosts to specify particular sources of multicast data. ServSwitch Agility units make use of IGMPv2 when performing multicasts to ensure that no unnecessary congestion is caused.

E.1.2 IGMP SNOOPING

The IGMP messages are effective but only operate at

pass on multicast data to those hosts.

layer 2

- intended for routers to determine whether multicast data should enter a subnet. A relatively recent development has taken place within the switches that glue together all of the hosts within each subnet: IGMP Snooping. IGMP snooping means these layer 2 devices now have the ability to take a peek at the IGMP messages. As a result, the switches can then determine exactly which of their own hosts have requested to receive a multicast – and only

E.1.3 IGMP QUERIER

When IGMP is used, each subnet requires one

(IGMPv2) messages are received).

Layer 3

switch to act as a Querier. In this lead role, the switch periodically sends out IGMP Query messages and in response all hosts report which multicast streams they wish to receive. The Querier device and all snooping Layer 2 switches, then update their lists accordingly (the lists are also updated when Join Group and Leave Group

E.1.4 IGMP FAST-LEAVE (AKA IMMEDIATE LEAVE)

When a device/host no longer wishes to receive a multicast transmission, it can issue an IGMP Leave Group message as mentioned above. This causes the switch to issue an IGMP Group-Specific Query message on the port (that the Leave Group was received on) to check no other remote units exist on that connection that wish to remain a part of the multicast. This process has a cost in terms of switch processor activity and time. Where ServSwitch Agility units are connected directly to the switch (with no other devices on the same port) then enabling IGMP Fast-Leave mode means that switches can immediately remove remote units without going through a full checking procedure. Where multiple units are regularly joining and leaving multicasts, this can speed up performance considerably.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

E.2 JUMBO FRAMES (JUMBO PACKETS)

Since its commercial introduction in 1980, the Ethernet standard has been successfully extended and adapted to keep pace with the ever improving capabilities of computer systems. The achievable data rates, for instance, have risen in ten-fold leaps from the original 10Mbit/s to a current maximum of 100Gbit/s. While data speeds have increased massively, the standard defining the number of bytes (known as the Payload) placed into each data packet has remained resolutely stuck at its original level of 1500 bytes. This standard was set during the original speed era (10Mbits/s) and offered the best compromise at that speed between the time taken to process each packet and the time required to resend faulty packets due to transmission errors. But now networks are much faster and files/data streams are much larger; so time for a change? Unfortunately, a wholesale change to the packet size is not straightforward as it is a fundamental standard and changing it would mean a loss of backward compatibility with older systems.

Larger payload options have been around for a while, however, they have often been vendor specific and at present they remain outside the official standard. There is, however, increased consensus on an optional ‘Jumbo’ payload size of 9000 bytes and this is fully supported by the ServSwitch Agility units.

Jumbo frames (or Jumbo packets) offer advantages for ServSwitch Agility units when transmitting certain high resolution video signals across a network. This is because the increased data in each packet reduces the number of packets that need to be transferred and dealt with - thus reducing latency times.

The main problem is that for jumbo frames to be possible on a network, all of the devices on the network must support them.

E.3 SPANNING TREE PROTOCOL (STP)

In order to build a robust network, it is necessary to include certain levels of redundancy within the interconnections between switches. This will help to ensure that a failure of one link does not lead to a complete failure of the whole network.

The danger of multiple links is that data packets, especially multicast packets, become involved in continual loops as neighbouring switches use the duplicated links to send and resend them to each other.

To prevent such bridging loops from occurring, the Spanning Tree Protocol (STP), operating at

discovered links until it can discover the nature of the link: is it a new host or a new switch?

layer 2

, is used within each switch. STP encourages all switches to communicate and learn about each other. It prevents bridging loops by blocking newly The problem with this is that the discovery process can take up to 50 seconds before the block is lifted, causing problematic timeouts.

The answer to this issue is to enable the portfast variable for all host links on a switch. This will cause any new connection to go immediately into forwarding mode. However, take particular care not to enable portfast on any switch to switch connections as this will result in bridging loops.

1.877.877.2269

BLACKBOX.COM

47

48

TECHNICAL 1.877.877.2269

E.4 FORWARDING MODES

In essence, the job of a layer 2 switch is to transfer as fast as possible, data packets arriving at one port out to another port as determined by the destination address. This is known as data forwarding and most switches offer a choice of methods to achieve this. Choosing the most appropriate forwarding method can often have a sizeable impact on the overall speed of switching: Š Š

Store and forward

is the original method and requires the switch to save each entire data packet to buffer memory, run an error check and then forward if no error is found (or otherwise discard it).

Š Š

Cut-through

process. was developed to address the latency issues suffered by some store and forward switches. The switch begins interpreting each data packet as it arrives. Once the initial addressing information has been read, the switch immediately begins forwarding the data packet while the remainder is still arriving. Once all of the packet has been received, an error check is performed and, if necessary, the packet is tagged as being in error. This checking ‘on-the-fly’ means that cut-through switches cannot discard faulty packets themselves. However, on receipt of the marked packet, a host will carry out the discard Š Š

Fragment-free

is a hybrid of the above two methods. It waits until the first 64 bits have been received before beginning to forward each data packet. This way the switch is more likely to locate and discard faulty packets that are fragmented due to collisions with other data packets. Š Š

Adaptive

switches automatically choose between the above methods. Usually they start out as a cut-through switches and change to store and forward or fragment-free methods if large number of errors or collisions are detected. So which one to choose? The

Cut-through

method has the least latency so is usually the best to use with Agility units. However, if the network components and/or cabling generate a lot of errors, the

Store and forward

method should probably be used. On higher end store and forward switches, latency is rarely an issue.

E.5 LAYER 2 AND LAYER 3: THE OSI MODEL

When discussing network switches, the terms Layer 2 and Layer 3 are very often used. These refer to parts of the Open System Interconnection (OSI) model, a standardized way to categorize the necessary functions of any standard network. There are seven layers in the OSI model (see Figure D-1) and these define the steps needed to get the data created by you (imagine that you are Layer 8) reliably down onto the transmission medium (the cable, optical fiber, radio wave, etc.) that carries the data to another user; to complete the picture, consider the transmission medium is Layer 0. In general, think of the functions carried out by the layers at the top as being complex, becoming less complex as you go lower down.

LAYER 7 LAYER 6 LAYER 5 LAYER 4 LAYER 3 LAYER 2 LAYER 1

Application Presentation Session Transport Network Data Link Physical

LAYER 7 LAYER 6 LAYER 5 LAYER 4 LAYER 3 LAYER 2 LAYER 1

Network connection

Figure E-1. A representation of the seven layers defined by the OSI Model

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

As your data travel down from you towards the transmission medium (the cable), they are successively encapsulated at each layer within a new wrapper (along with a few instructions), ready for transport. Once transmission has been made to the intended destination, the reverse occurs: Each wrapper is stripped away and the instructions examined until finally only the original data are left.

So why are Layer 2 and Layer 3 of particular importance when discussing ServSwitch Agility? Because the successful transmission of data relies upon fast and reliable passage through network switches – and most of these operate at either Layer 2 or Layer 3.

The job of any network switch is to receive each incoming network packet, strip away only the first few wrappers to discover the intended destination then rewrap the packet and send it in the correct direction. In simplified terms, the wrapper that is added at Layer 2 (by the sending system) includes the physical address of the intended recipient system, i.e. the unique MAC address (for example, 09:f8:33:d7:66:12) that is assigned to every networking device at manufacture. Deciphering recipients at this level is more straightforward than at Layer 3, where the address of the recipient is represented by a logical IP address (e.g. 192.168.0.10) and requires greater knowledge of the surrounding network structure. Due to their more complex circuitry, Layer 3 switches are more expensive than Layer 2 switches of a similar build quality and are used more sparingly within installations.

1.877.877.2269

BLACKBOX.COM

49

APPENDIX G - OPEN SOURCE LICENSES

TECHNICAL 1.877.877.2269

50

This product includes binaries that are derived from the open source community. The modules listed below are licenced under the GNU General Public License v2 and must be provided, in source form, on request: dtc u-boot-xlnx linux-xlnx busybox util-linux udev termcap mtd-utils libpbe haserl The software included in this product contains copyrighted software that is licensed under the GPL. You may obtain the complete Corresponding Source code from Black Box for a period of three years after the last shipment of this product, which will be no earlier than 2028, by contacting the Technical Support department. Please write “Source for product XXXXXXXX ” in the subject line (where XXXXXX is the model and version number). This offer is valid to anyone in receipt of this information.

This product includes binaries that are derived from the open source community. The modules listed below are licenced under the GNU Lesser General Public License v2.1 and must be provided, in source form, on request: kmod libdaemon avahi libgpg-error nettle libgcrypt gnutls libmicrohttpd In addition to the GPL modules listed, this product also includes binaries derived from 3rd party open sources that have their own license requirements. Each module is listed below with their required Copyright statement and distribution conditions. ---------------------------------------------------------------------------- - - Module: openssl - ---------------------------------------------------------------------------- LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

OpenSSL License --------------- /* ==================================================================== Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)” 4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)” THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ============================================================= This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). */

1.877.877.2269

BLACKBOX.COM

51

52

TECHNICAL 1.877.877.2269

Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. * This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. * This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). * Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. * Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)” The word ‘cryptographic’ can be left out if the rouines from the library being used are not cryptographic related :-).

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)” * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

*/ ---------------------------------------------------------------------------- - - Module: libev - ---------------------------------------------------------------------------- All files in libev are Copyright (c)2007,2008,2009,2010,2011,2012,2013 Marc Alexander Lehmann. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---------------------------------------------------------------------------- - - Module: libaes - ---------------------------------------------------------------------------- Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved. LICENSE TERMS The redistribution and use of this software (with or without changes) is allowed without the payment of fees or royalties provided that: 1. source code distributions include the above copyright notice, this list of conditions and the following disclaimer;

1.877.877.2269

BLACKBOX.COM

53

54

2. binary distributions include the above copyright notice, this list of conditions and the following disclaimer in their documentation; 3. the name of the copyright holder is not used to endorse products built using this software without specific written permission. DISCLAIMER This software is provided ‘as is’ with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. ---------------------------------------------------------------------------- - - Module: libgcrypt - ---------------------------------------------------------------------------- Additional license notices for Libgcrypt. -*- org -*- This file contains the copying permission notices for various files in the Libgcrypt distribution which are not covered by the GNU Lesser General Public License (LGPL) or the GNU General Public License (GPL). These notices all require that a copy of the notice be included in the accompanying documentation and be distributed with binary distributions of the code, so be sure to include this file along with any binary distributions derived from the GNU C Library. * BSD_3Clause For files: - cipher/sha256-avx-amd64.S - cipher/sha256-avx2-bmi2-amd64.S - cipher/sha256-ssse3-amd64.S - cipher/sha512-avx-amd64.S - cipher/sha512-avx2-bmi2-amd64.S - cipher/sha512-ssse3-amd64.S #+begin_quote Copyright (c) 2012, Intel Corporation All rights reserved.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

TECHNICAL 1.877.877.2269

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. #+end_quote * X License For files: - install.sh #+begin_quote Copyright (C) 1994 X Consortium Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

1.877.877.2269

BLACKBOX.COM

55

56

TECHNICAL 1.877.877.2269

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE X CONSORTIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of the X Consortium shall not be used in advertising or otherwise to promote the sale, use or other deal- ings in this Software without prior written authorization from the X Consor- tium. #+end_quote * Public domain For files: - cipher/arcfour-amd64.S #+begin_quote Author: Marc Bevand Licence: I hereby disclaim the copyright on this code and place it in the public domain. #+end_quote * OCB license 1 For files: - cipher/cipher-ocb.c #+begin_quote OCB is covered by several patents but may be used freely by most software. See http://web.cs.ucdavis.edu/~rogaway/ocb/license.htm . In particular license 1 is suitable for Libgcrypt: See http://web.cs.ucdavis.edu/~rogaway/ocb/license1.pdf for the full license document; it basically says: License 1 — License for Open-Source Software Implementations of OCB (Jan 9, 2013) Under this license, you are authorized to make, use, and distribute open-source software implementations of OCB. This license terminates for you if you sue someone over their open-source software implementation of OCB claiming that you have a patent covering their implementation.

1.877.877.2269

BLACKBOX.COM

License for Open Source Software Implementations of OCB January 9, 2013 1 Definitions 1.1 “Licensor” means Phillip Rogaway. 1.2 “Licensed Patents” means any patent that claims priority to United States Patent Application No. 09/918,615 entitled “Method and Apparatus for Facilitating Efficient Authenticated Encryption,” and any utility, divisional, provisional, continuation, continuations-in-part, reexamination, reissue, or foreign counterpart patents that may issue with respect to the aforesaid patent application. This includes, but is not limited to, United States Patent No. 7,046,802; United States Patent No. 7,200,227; United States Patent No. 7,949,129; United States Patent No. 8,321,675 ; and any patent that issues out of United States Patent Application No. 13/669,114. 1.3 “Use” means any practice of any invention claimed in the Licensed Patents. 1.4 “Software Implementation” means any practice of any invention claimed in the Licensed Patents that takes the form of software executing on a user-programmable, general-purpose computer or that takes the form of a computer-readable medium storing such software. Software Implementation does not include, for example, application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), embedded systems, or IP cores. 1.5 “Open Source Software” means software whose source code is published and made available for inspection and use by anyone because either (a) the source code is subject to a license that permits recipients to copy, modify, and distribute the source code without payment of fees or royalties, or (b) the source code is in the public domain, including code released for public use through a CC0 waiver. All licenses certified by the Open Source Initiative at opensource.org as of January 9, 2013 and all Creative Commons licenses identified on the creativecommons.org website as of January 9, 2013, including the Public License Fallback of the CC0 waiver, satisfy these requirements for the purposes of this license. 1.6 “Open Source Software Implementation” means a Software Implementation in which the software implicating the Licensed Patents is Open Source Software. Open Source Software Implementation does not include any Software Implementation in which the software implicating the Licensed Patents is combined, so as to form a larger program, with software that is not Open Source Software.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

57

58

TECHNICAL 1.877.877.2269

2 License Grant 2.1 License. Subject to your compliance with the term s of this license, including the restriction set forth in Section 2.2, Licensor hereby grants to you a perpetual, worldwide, non-exclusive, non-transferable, non-sublicenseable, no-charge, royalty-free, irrevocable license to practice any invention claimed in the Licensed Patents in any Open Source Software Implementation. 2.2 Restriction. If you or your affiliates institute patent litigation (including, but not limited to, a cross-claim or counterclaim in a lawsuit) against any entity alleging that any Use authorized by this license infringes another patent, then any rights granted to you under this license automatically terminate as of the date such litigation is filed. 3 Disclaimer YOUR USE OF THE LICENSED PATENTS IS AT YOUR OWN RISK AND UNLESS REQUIRED BY APPLICABLE LAW, LICENSOR MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE LICENSED PATENTS OR ANY PRODUCT EMBODYING ANY LICENSED PATENT, EXPRESS OR IMPLIED, STATUT ORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL LICENSOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM OR RELATED TO ANY USE OF THE LICENSED PATENTS, INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR SPECIAL DAMAGES, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES PRIOR TO SUCH AN OCCURRENCE. #+end_quote ---------------------------------------------------------------------------- - - Module: freebsd-libc - ---------------------------------------------------------------------------- # @(#)COPYRIGHT 8.2 (Berkeley) 3/21/94 All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by The Regents of the University of California. Copyright 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors.

4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The Institute of Electrical and Electronics Engineers and the American National Standards Committee X3, on Information Processing Systems have given us permission to reprint portions of their documentation. In the following statement, the phrase ``this text’’ refers to portions of the system documentation. Portions of this text are reprinted and reproduced in electronic form in the second BSD Networking Software Release, from IEEE Std 1003.1-1988, IEEE Standard Portable Operating System Interface for Computer Environments (POSIX), copyright C 1988 by the Institute of Electrical and Electronics Engineers, Inc. In the event of any discrepancy between these versions and the original IEEE Standard, the original IEEE Standard is the referee document. In the following statement, the phrase ``This material’’ refers to portions of the system documentation. This material is reproduced with permission from American National Standards Committee X3, on Information Processing Systems. Computer and Business Equipment Manufacturers Association (CBEMA), 311 First St., NW, Suite 500, Washington, DC 20001-2178. The developmental work of Programming Language C was completed by the X3J11 Technical Committee. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the Regents of the University of California. ---------------------------------------------------------------------------- - - Module: strace

1.877.877.2269

BLACKBOX.COM

59

60

TECHNICAL 1.877.877.2269

- ---------------------------------------------------------------------------- Copyright (c) 1991, 1992 Paul Kranenburg Copyright (c) 1993 Branko Lankester Copyright (c) 1993 Ulrich Pegelow Copyright (c) 1995, 1996 Michael Elizabeth Chastain Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey Copyright (C) 1998-2001 Wichert Akkerman Copyright (C) 2001-2017 The strace developers. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---------------------------------------------------------------------------- - - Module: libpcap - ---------------------------------------------------------------------------- Copyright (C) 1993-2008 The Regents of the University of California. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

1.877.877.2269

BLACKBOX.COM

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS’’ AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ---------------------------------------------------------------------------- - - Module: tcpdump - ---------------------------------------------------------------------------- Licensed under the 3-clause BSD license: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS’’ AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Some files in this package are licensed under the 4-clause BSD license, the copyright on most of them belongs to The Regents of the University of California. Since the license was retroactively changed in 1999 to remove the advertising clause, they are effectively under the 3-clause license even if the text of the license in the files hasn’t been updated. See the following document for more details: ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

61

62

Other files under the 4-clause BSD license and whose copyright doesn’t belong to the The Regents of the University of California are listed below: - aodv.h, Copyright (c) 2003 Bruce M. Simpson - atmuni31.h, Copyright (c) 1997 Yen Yen Lim and North Dakota State University - ieee802_11.h, Copyright (c) 2001 Fortress Technologies and Charlie Lenahan - print-802_11.c, Copyright (c) 2001 Fortress Technologies and Charlie Lenahan - print-aodv.c, Copyright (c) 2003 Bruce M. Simpson - print-ascii.c, Copyright (c) 1997, 1998 The NetBSD Foundation, Inc. - print-cnfp.c, Copyright (c) 1998 Michael Shalayeff - print-gre.c, Copyright (c) 2002 Jason L. Wright - print-mobile.c, Copyright (c) 1998 The NetBSD Foundation, Inc. - print-sunatm.c, Copyright (c) 1997 Yen Yen Lim and North Dakota State University - print-telnet.c, Copyright (c) 1997, 1998 The NetBSD Foundation, Inc. - print-timed.c, Copyright (c) 2000 Ben Smithurst - missing/inet_aton.c, Copyright (c) 1995, 1996, 1997 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm, - missing/inet_ntop.c, Copyright (c) 1995, 1996, 1997 Kungliga Tekniska Sweden). Högskolan (Royal Institute of Technology, Stockholm, - missing/inet_pton.c, Copyright (c) 1995, 1996, 1997 Kungliga Tekniska Sweden). Högskolan (Royal Institute of Technology, Stockholm, Sweden). ---------------------------------------------------------------------------- - - Module: dhcp - ---------------------------------------------------------------------------- # Copyright (c) 2004-2017 by Internet Systems Consortium, Inc. (“ISC”) # Copyright (c) 1995-2003 by Internet Software Consortium # # Permission to use, copy, modify, and distribute this software for any # purpose with or without fee is hereby granted, provided that the above # copyright notice and this permission notice appear in all copies. # # THE SOFTWARE IS PROVIDED “AS IS” AND ISC DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY # DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, # WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS # ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. #

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

# Internet Systems Consortium, Inc. # 950 Charter Street # Redwood City, CA 94063 # # https://www.isc.org/ ---------------------------------------------------------------------------- - - Module: ntp - ---------------------------------------------------------------------------- _________________________________________________________________ The following copyright notice applies to all files collectively called the Network Time Protocol Version 4 Distribution. Unless specifically declared otherwise in an individual file, this entire notice applies as if the text was explicitly included in the file. *********************************************************************** * * * Copyright (c) University of Delaware 1992-2015 * * * * Permission to use, copy, modify, and distribute this software and * * its documentation for any purpose with or without fee is hereby * * granted, provided that the above copyright notice appears in all * * copies and that both the copyright notice and this permission * * notice appear in supporting documentation, and that the name * * University of Delaware not be used in advertising or publicity * * pertaining to distribution of the software without specific, * * written prior permission. The University of Delaware makes no * * representations about the suitability this software for any * * purpose. It is provided “as is” without express or implied * * warranty. * * * *********************************************************************** Content starting in 2011 from Harlan Stenn, Danny Mayer, and Martin Burnicki is: *********************************************************************** * * * Copyright (c) Network Time Foundation 2011-2017 * * * * All Rights Reserved * * *

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

63

64

* Redistribution and use in source and binary forms, with or without * * modification, are permitted provided that the following conditions * * are met: * * 1. Redistributions of source code must retain the above copyright * * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above * * copyright notice, this list of conditions and the following * * disclaimer in the documentation and/or other materials provided * * with the distribution. * * * * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS’’ AND ANY EXPRESS * * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT * * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR * * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE * USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH * * DAMAGE. * *********************************************************************** The following individuals contributed in part to the Network Time Protocol Distribution Version 4 and are acknowledged as authors of this work. 1. [1]Takao Abe Clock driver for JJY receivers 2. [2]Mark Andrews Leitch atomic clock controller 3. [3]Bernd Altmeier hopf Elektronik serial line and PCI-bus devices 4. [4]Viraj Bais and [5]Clayton Kirkwood port to WindowsNT 3.5 5. [6]Michael Barone GPSVME fixes 6. [7]Karl Berry syslog to file option 7. [8]Greg Brackley Major rework of WINNT port. Clean up recvbuf and iosignal code into separate modules. 8. [9]Marc Brett Magnavox GPS clock driver 9. [10]Piete Brooks MSF clock driver, Trimble PARSE support 10. [11]Nelson B Bolyard update and complete broadcast and crypto features in sntp 11. [12]Jean-Francois Boudreault IPv6 support 12. [13]Reg Clemens Oncore driver (Current maintainer) 13. [14]Steve Clift OMEGA clock driver

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

14. [15]Casey Crellin vxWorks (Tornado) port and help with target configuration 15. [16]Sven Dietrich Palisade reference clock driver, NT adj. residuals, integrated Greg’s Winnt port. 16. [17]John A. Dundas III Apple A/UX port 17. [18]Torsten Duwe Linux port 18. [19]Dennis Ferguson foundation code for NTP Version 2 as specified in RFC-1119 19. [20]John Hay IPv6 support and testing 20. [21]Dave Hart General maintenance, Windows port interpolation rewrite 21. [22]Claas Hilbrecht NeoClock4X clock driver 22. [23]Glenn Hollinger GOES clock driver 23. [24]Mike Iglesias DEC Alpha port 24. [25]Jim Jagielski A/UX port 25. [26]Jeff Johnson massive prototyping overhaul 26. [27]Hans Lambermont or [28] ntpsweep 27. [29]Poul-Henning Kamp Oncore driver (Original author) 28. [30]Frank Kardel [31] PARSE (driver 14 reference clocks), STREAMS modules for PARSE, support scripts, syslog cleanup, dynamic interface handling 29. [32]Johannes Maximilian Kuehn Rewrote sntp to comply with NTPv4 specification, ntpq saveconfig 30. [33]William L. Jones RS/6000 AIX modifications, HPUX modifications 31. [34]Dave Katz RS/6000 AIX port 32. [35]Craig Leres 4.4BSD port, ppsclock, Magnavox GPS clock driver 33. [36]George Lindholm SunOS 5.1 port 34. [37]Louis A. Mamakos MD5-based authentication 35. [38]Lars H. Mathiesen adaptation of foundation code for Version 3 as specified in RFC-1305 36. [39]Danny Mayer Network I/O, Windows Port, Code Maintenance 37. [40]David L. Mills Version 4 foundation, precision kernel; clock drivers: 1, 3, 4, 6, 7, 11, 13, 18, 19, 22, 36 38. [41]Wolfgang Moeller VMS port 39. [42]Jeffrey Mogul ntptrace utility 40. [43]Tom Moore i386 svr4 port 41. [44]Kamal A Mostafa SCO OpenServer port 42. [45]Derek Mulcahy and [46]Damon Hart-Davis ARCRON MSF clock driver

1.877.877.2269

BLACKBOX.COM

TECHNICAL 1.877.877.2269

65

43. [47]Rob Neal Bancomm refclock and config/parse code maintenance 44. [48]Rainer Pruy monitoring/trap scripts, statistics file handling 45. [49]Dirce Richards Digital UNIX V4.0 port 46. [50]Wilfredo Sánchez added support for NetInfo 47. [51]Nick Sayer SunOS streams modules 48. [52]Jack Sasportas Saved a Lot of space on the stuff in the html/pic/ subdirectory 49. [53]Ray Schnitzler Unixware1 port 50. [54]Michael Shields USNO clock driver 51. [55]Jeff Steinman Datum PTS clock driver 52. [56]Harlan Stenn GNU automake/autoconfigure makeover, various other bits (see the ChangeLog) 53. [57]Kenneth Stone HP-UX port 54. [58]Ajit Thyagarajan IP multicast/anycast support 55. [59]Tomoaki TSURUOKA TRAK clock driver 56. [60]Brian Utterback General codebase, Solaris issues 57. [61]Loganaden Velvindron Sandboxing (libseccomp) support 58. [62]Paul A Vixie TrueTime GPS driver, generic TrueTime clock driver 59. [63]Ulrich Windl corrected and validated HTML documents according to the HTML DTD _________________________________________________________________ TECHNICAL 1.877.877.2269

66 1.877.877.2269

BLACKBOX.COM

APPENDIX H - SAFETY INFORMATION

TECHNICAL 1.877.877.2269

Š Š For use in dry, oil free indoor environments only.

Š Š The units and their power supplies generate heat when in operation and will become warm to the touch. Do not enclose them or place them locations where air cannot circulate to cool the equipment. Do not operate the equipment in ambient temperatures exceeding 40 degrees Centigrade. Do not place the products in contact with equipment whose surface temperature exceeds 40 degrees Centigrade.

Š Š Warning - live parts contained within power adapter.

Š Š No user serviceable parts within power adapter - do not dismantle.

Š Š Plug the power adapter into a socket outlet close to the module that it is powering.

Š Š Replace the power adapter with a manufacturer approved type only. Š Š Do not use the power adapter if the power adapter case becomes damaged, cracked or broken or if you suspect that it is not operating properly.

Š Š If you use a power extension cord with a unit, make sure the total ampere rating of the devices plugged into the extension cord does not exceed the cord’s ampere rating. Also, make sure that the total ampere rating of all the devices plugged into the wall outlet does not exceed the wall outlet’s ampere rating.

Š Š Do not attempt to service the units yourself.

1.877.877.2269

BLACKBOX.COM

67

NEED HELP?

LEAVE THE TECH TO US

1.877.877.2269

ACR500, rev. 1.2 RC2 © COPYRIGHT 2019 BLACK BOX CORPORATION. ALL RIGHTS RESERVED.

877-877-2269 | blackbox.com

Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement