background image

26

Appendix E

Software License Agreement

Powerline Network Adapter

Thus,  it  is  not  the  intent  of  this  section  to  claim 

rights or contest your rights to work written entirely 

by you; rather, the intent is to exercise the right to 

control the distribution of derivative or collective 

works based on the Library.
In  addition,  mere  aggregation  of  another  work 

not based on the Library with the Library (or with 

a  work  based  on  the  Library)  on  a  volume  of  a 

storage or distribution medium does not bring the 

other work under the scope of this License.

You may opt to apply the terms of the ordinary GNU 

3. 

General  Public  License  instead  of  this  License  to  a 

given copy of the Library. To do this, you must alter all 

the notices that refer to this License, so that they refer 

to  the  ordinary  GNU  General  Public  License,  version 

2, instead of to this License. (If a newer version than 

version 2 of the ordinary GNU General Public License 

has  appeared,  then  you  can  specify  that  version 

instead if you wish.) Do not make any other change in 

these notices.
Once  this  change  is  made  in  a  given  copy,  it  is 

irreversible for that copy, so the ordinary GNU General 

Public  License  applies  to  all  subsequent  copies  and 

derivative works made from that copy.
This option is useful when you wish to copy part of the 

code of the Library into a program that is not a library.
You may copy and distribute the Library (or a portion 

4. 

or derivative of it, under Section 2) in object code or 

executable  form  under  the  terms  of  Sections  1  and 

2  above  provided  that  you  accompany  it  with  the 

complete  corresponding  machine-readable  source 

code,  which  must  be  distributed  under  the  terms  of 

Sections 1 and 2 above on a medium customarily used 

for software interchange.
If  distribution  of  object  code  is  made  by  offering 

access to copy from a designated place, then offering 

equivalent  access  to  copy  the  source  code  from  the 

same  place  satisfies  the  requirement  to  distribute 

the  source  code,  even  though  third  parties  are  not 

compelled to copy the source along with the object 

code.
A program that contains no derivative of any portion 

5. 

of the Library, but is designed to work with the Library 

by being compiled or linked with it, is called a “work 

that uses the Library”. Such a work, in isolation, is not 

a  derivative  work  of  the  Library,  and  therefore  falls 

outside the scope of this License.
However,  linking  a “work  that  uses  the  Library”  with 

the Library creates an executable that is a derivative 

of  the  Library  (because  it  contains  portions  of  the 

Library), rather than a “work that uses the library”. The 

executable is therefore covered by this License. Section 

6 states terms for distribution of such executables.

When a “work that uses the Library” uses material from 

a header file that is part of the Library, the object code 

for the work may be a derivative work of the Library 

even  though  the  source  code  is  not. Whether  this  is 

true is especially significant if the work can be linked 

without the Library, or if the work is itself a library. The 

threshold for this to be true is not precisely defined by 

law.
If such an object file uses only numerical parameters, 

data structure layouts and accessors, and small macros 

and small inline functions (ten lines or less in length), 

then the use of the object file is unrestricted, regardless 

of whether it is legally a derivative work. (Executables 

containing this object code plus portions of the Library 

will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you 

may distribute the object code for the work under the 

terms  of  Section  6.  Any  executables  containing  that 

work also fall under Section 6, whether or not they are 

linked directly with the Library itself.
As an exception to the Sections above, you may also 

6. 

combine or link a “work that uses the Library” with the 

Library to produce a work containing portions of the 

Library, and distribute that work under terms of your 

choice,  provided  that  the  terms  permit  modification 

of  the  work  for  the  customer’s  own  use  and  reverse 

engineering for debugging such modifications.
You  must  give  prominent  notice  with  each  copy  of 

the  work  that  the  Library  is  used  in  it  and  that  the 

Library  and  its  use  are  covered  by  this  License.  You 

must supply a copy of this License. If the work during 

execution displays copyright notices, you must include 

the copyright notice for the Library among them, as 

well as a reference directing the user to the copy of this 

License. Also, you must do one of these things:

Accompany  the  work  with  the  complete 

a) 

corresponding  machine-readable  source  code 

for  the  Library  including  whatever  changes  were 

used  in  the  work  (which  must  be  distributed 

under  Sections  1  and  2  above);  and,  if  the  work 

is an executable linked with the Library, with the 

complete  machine-readable  “work  that  uses  the 

Library”, as object code and/or source code, so that 

the  user  can  modify  the  Library  and  then  relink 

to produce a modified executable containing the 

modified  Library.  (It  is  understood  that  the  user 

who changes the contents of definitions files in the 

Library will not necessarily be able to recompile the 

application to use the modified definitions.)

Summary of Contents for PLTE200

Page 1: ...USER GUIDE Powerline Network Adapter Powerline 4 Port Network Adapter Powerline Network Kit Model PLTE200 PLTS200 PLTK300 ...

Page 2: ...ress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Secur...

Page 3: ...l of the Powerline 4 Port Network Adapter model number PLTS200 4 Placement Options 4 Chapter 3 Advanced Configuration 6 Overview 6 How to Install the Powerline Utility 6 How to Access the Powerline Utility 6 Main 7 Security 8 Diagnostics 9 About 9 Appendix A Troubleshooting 10 Appendix B Specifications 11 Appendix C Warranty Information 12 Limited Warranty 12 Appendix D Regulatory Information 14 F...

Page 4: ...er PLTS200 features four Ethernet ports and connects to the following an electrical outlet up to four computers or other Ethernet network devices using Ethernet cables How to Share Internet Access over the Powerline Network To share Internet access over the powerline network add your router to the powerline network Connect a Powerline Adapter to one of the local Ethernet network ports on your rout...

Page 5: ... plugged into an electrical outlet Using the powerlines of the home the router expands your local network to include the gaming console and desktop computer in the living room Internet access and files can be shared between your computers and other networked devices For online gaming you can play downstairs in the comfort of your living room while taking advantage of your router and high speed Int...

Page 6: ...The power LED lights up when the Powerline Adapter is powered on Ethernet Blue The Ethernet LED lights up when the Powerline Adapter is connected to a network device through the Ethernet port The LED flashes to indicate network activity over that port Powerline Blue The Powerline LED lights up when the Powerline Adapter is connected to the powerline network through the Power port TheLEDflashestoin...

Page 7: ...nd into the side panel and then place the Powerline Adapter on a level surface near an electrical outlet NOTE When the Powerline Adapter is on the stand the Power port is closest to the stand Wall Mounting Placement ThePowerlineAdapterhasfourwall mountslotsonitsback panel The distance between two adjacent slots is 60 mm 2 36 inches Two screws are needed to mount the Powerline Adapter Suggested Mou...

Page 8: ...screws Place the wall mount slots over the screws and slide 5 the Powerline Adapter down until the screws fit snugly into the wall mount slots 60 mm Wall Mounting Template Print this page at 100 size and cut along the dotted line Check the template s accuracy by measuring the distance between the wall mount slots with a ruler This distance should be 60 mm Then place the template on the wall to dri...

Page 9: ...ve Then click OK The 4 Welcome screen appears Click Next Welcome Screen To accept the License Agreement click 5 Yes License Agreement To install the Powerline Utility in the 6 default folder click Next To select a different folder click Browse and select the new location Then click Next Choose Destination Location When the installation is complete click 7 Finish InstallShield Wizard Complete How t...

Page 10: ...er is listed with its Device Type and MAC Address Refresh Clickthisoptiontoupdatethestatusinformation of the local Powerline Adapter Remote The remote Powerline Adapters are listed with the following information Device Name Device Password Quality of connection Rate Mbps and MAC Address The Password column lists the Device Passwords you have entered for the remote Powerline Adapters using the Ente...

Page 11: ...t to save your changes or click Cancel to cancel your changes Add Device to Network Refresh Clickthisoptiontoupdatethestatusinformation of the remote Powerline Adapters Security Use this screen to configure advanced security for your powerline network Security Step 1 Choose Network Password HomePlug The default password HomePlug is displayed Enter a new password in the field provided Reset to Defa...

Page 12: ...vice History The remote Powerline Adapters are displayed with the following information Device name MAC Address device Password Rate Mbps Network password Last Seen detected Vendor Firmware version Sent number of sent packets Misses number of missed packets Drops number of dropped packets Fails number of failed packets Hi Rate highest transmission rate and Low Rate lowest transmission rate Delete ...

Page 13: ...mation Whenyouscanthepowerlinenetwork youdonotdetect all of the powerline devices Make sure all devices on the powerline network have been configured with the same Network Password The Network Password must be identical in order for them to communicate with each other If you are adding a new Powerline Adapter to a pre existing power network with a unique Network Password use the Add Device option ...

Page 14: ...orage Temp 4 to 140ºF 20 to 60ºC Operating Humidity 10 to 80 Noncondensing Storage Humidity 5 to 90 Noncondensing Model PLTS200 Standards HomePlug 1 0 with Turbo IEEE 802 3 IEEE 802 3u Ports Power Ethernet 1 4 LEDs Power Powerline Ethernet Modulations Supports QAM 256 64 16 DQPSK DBPSK and ROBO Modulation Schemes Security Features 56 Bit DES Link Encryption Security Key Bits 56 Bit Encryption Envi...

Page 15: ...mited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE D...

Page 16: ...duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com...

Page 17: ...r than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning ...

Page 18: ...nice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady S...

Page 19: ...ίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages...

Page 20: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Page 21: ...e zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganje o...

Page 22: ...IA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER...

Page 23: ... fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING...

Page 24: ...o prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed un...

Page 25: ...f Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means...

Page 26: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Page 27: ...or the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effect...

Page 28: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 29: ...rary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Wheth...

Page 30: ... modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such parties r...

Page 31: ...nerally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PA...

Page 32: ...ptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for comme...

Page 33: ...ER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution li...

Reviews: