background image

Notices

© Keysight Technologies 2009-2014

No part of this manual may be 

reproduced in any form or by any 

means (including electronic storage 

and retrieval or translation into a 

foreign language) without prior 

agreement and written consent from 

Keysight Technologies, as governed 

by United States and international 

copyright laws.

Manual Part Number

N5105-90014

Print Date

August 2014

Supersedes: November 2012

Printed in USA

Keysight Technologies Inc.

1400 Fountaingrove Parkway

Santa Rosa, CA 95403

Warranty

The material contained in this 

document is provided “as is,” and is 

subject to being changed, without 

notice, in future editions. Further, to 

the maximum extent permitted by 

applicable law, Keysight disclaims 

all warranties, either express or 

implied, with regard to this manual 

and any information contained 

herein, including but not limited to 

the implied warranties of 

merchantability and fitness for a 

particular purpose. Keysight shall not 

be liable for errors or for incidental or 

consequential damages in 

connection with the furnishing, use, 

or performance of this document or 

of any information contained herein. 

Should Keysight and the user have a 

separate written agreement with 

warranty terms covering the material 

in this document that conflict with 

these terms, the warranty terms in 

the separate agreement shall control.

Technology Licenses

The hardware and/or software 

described in this document are 

furnished under a license and may be 

used or copied only in accordance 

with the terms of such license.

Restricted Rights Legend

If software is for use in the 

performance of a US Government 

prime contract or subcontract, 

Software is delivered and licensed as 

“Commercial computer software” as 

defined in DFAR 252.227-7014 (June 

1995), or as a “commercial item” as 

defined in FAR 2.101(a) or as 

“Restricted computer software” as 

defined in FAR 52.227-19 (June 1987) 

or any equivalent agency regulation or 

contract clause. Use, duplication or 

disclosure of Software is subject to 

Keysight Technologies’ standard 

commercial license terms, and 

non-DOD Departments and Agencies 

of the US Government will receive no 

greater than Restricted Rights as 

defined in FAR 52.227-19(c)(1-2) 

(June 1987). US Government users 

will receive no greater than Limited 

Rights as defined in FAR 52.227-14 

(June 1987) or DFAR 252.227-7015 

(b)(2) (November 1995), as applicable 

in any technical data.

Safety Notices

CAUTION

CAUTION

 notice denotes a hazard. It 

calls attention to an operating 

procedure, practice, or the like that, if 

not correctly performed or adhered to, 

could result in damage to the product 

or loss of important data. Do not 

proceed beyond a CAUTION notice 

until the indicated conditions are fully 

understood and met. 

WARNING

WARNING

 notice denotes a hazard. 

It calls attention to an operating 

procedure, practice, or the like that, if 

not correctly performed or adhered to, 

could result in personal injury or 

death. Do not proceed beyond a 

WARNING notice until the indicated 

conditions are fully understood and 

met.

Summary of Contents for PXB MIMO Receiver Tester

Page 1: ...t s Test and Measurement business has become Keysight Technologies For more information go to www keysight com Security Features and Document of Volatility Keysight MIMO Receiver Tester This manual pr...

Page 2: ...s document are furnished under a license and may be used or copied only in accordance with the terms of such license Restricted Rights Legend If software is for use in the performance of a US Governme...

Page 3: ...t updates by email subscribe to Keysight Email Updates http www keysight com find emailupdates Information on preventing instrument damage can be found at http www keysight com find PreventingInstrume...

Page 4: ...4...

Page 5: ...Memory 14 Volatile Memory 18 5 Using the Instrument in a Controlled Area Before Placing the Instrument in a Controlled Area 24 Removing the Instrument from a Controlled Area 24 Returning the Instrumen...

Page 6: ...6 Contents...

Page 7: ...local Keysight office is available via the internet at http www keysight com find assist If you do not have internet access please contact your designated Keysight representative NOTE In any correspo...

Page 8: ...8 Contacting Keysight Sales and Service Offices...

Page 9: ...ditional information go to http www keysight com find security IMPORTANT Be sure that all information stored by the user in the instrument that needs to be saved is properly backed up before attemptin...

Page 10: ...10 Products Covered by this Document Document Purpose...

Page 11: ...on procedures are designed to meet the requirements specified in DoD 5220 22 M National Industrial Security Program Operating Manual NISPOM Chapter 8 Sanitization As defined in Section 8 301b of DoD 5...

Page 12: ...12 Security Terms and Definitions...

Page 13: ...s information on the memory components in your instrument The tables provide details of the size of each memory component its type how it is used its location volatility and the sanitization procedure...

Page 14: ...grammed before board assembly or by factory service center calibration software N5105 63003 Midplane Board U50 N5105 80011 None PCIe SW1 Int Config Memory EEPROM 256 Kb No Yes Contains configuration i...

Page 15: ...b No Yes Contains programming information for FPGA1 on Clock Board Programmed prior to assembly May be reprogrammed in the field by firmware upgrades N5105 63006 Clock Board U1219 N5105 80001 Contains...

Page 16: ...software factory calibration data recovery image user instrument states user data files user trace data and any user installed software Programmed before assembly by factory service center calibratio...

Page 17: ...er supply module Programmed by Astec AstecPower Supply 16 5 Vdc 5 1 Vdc Module Contains no user data None Flash 14 Kbytes No Yes Contains operating code for 3 3 Vdc power supply module Programmed by A...

Page 18: ...icrocontroller for the Interconnect Board Software communicates with this controller through USB interface Written to during application program execution N5105 60002 Interconnect Board U302 Contains...

Page 19: ...cells RAM 136 Kb distributed 504 Kb block Yes No Logic function configuration data Written to during application program execution N5105 60104 Baseband Board U68 Contains no user data Turn off instru...

Page 20: ...AM 73 Kb distributed 360 Kb block Yes No Controls the main phase lock loop for the system and controls clock routing functionality of the PXB Written to during application program execution N5105 6000...

Page 21: ...tes Yes No Registers which dictate Channel 2 baseband signal processing ASIC configuration Written to during application program execution N5105 60009 IO Board U18 Contains no user data Turn off instr...

Page 22: ...22 Instrument Memory Volatility Volatile Memory...

Page 23: ...re for the A14 Hard Drive Assembly When an instrument is used within a controlled area and the need arises to remove it from that controlled area the security strategy is to remove the A14 Hard Drive...

Page 24: ...Keysight repair center that the A14 Hard Drive has been removed to protect your sensitive information If the instrument is under warranty the A14 Hard Drive will be replaced without charge If the ins...

Page 25: ...olled area to use it in a non controlled area refer to After Using the Instrument in a Non Controlled Area on page 26 If you removed the instrument from the controlled area to send it for repair refer...

Page 26: ...ument 5 Move the instrument to the controlled area 6 Once in the controlled area remove the A13 CPU Assembly from the instrument again 7 Install the original A14 Hard Drive Assembly into the A13 CPU A...

Page 27: ...vised February 28 2006 May be downloaded in Acrobat PDF format from http www dss mil isp fac_clear download_nispom html 2 ISFO Process Manual for the Certification and Accreditation of Classified Syst...

Page 28: ...28 References...

Reviews: