Redline Communications Inc. SC1000E 用户手册

下载
页码 60
 
 User 
 BASE 
STATION 
Manual
 
 
Doc #70-00100-01-00-DRAFT 
Proprietary Redline Communications © 2009  
Page 10 of 60 
January 7, 2009 
4. 
Disconnect power and discharge circuits before touching them. Do not replace 
components with power cable connected -- dangerous voltages may exist even when 
the power cable fusing has been removed. 
5. 
Do not attempt internal service or adjustment, without backup personnel available, 
capable of rendering first aid and resuscitation. 
 
 
 
1.8 
Handling Static Sensitive Devices 
 
 
 
Electrostatic Discharge (ESD) must be avoided to prevent damaging or destroy static 
sensitive components. Please observe proper ESD handling procedures. 
Metal oxide semiconductor (MOS) devices may be susceptible to damage from 
electrostatic charge. Charges can be created by the use of nylon overalls, friction, and 
by pushing hands into some types of insulation packing material, or ungrounded 
soldering irons. 
Observe the following precautions when handling electronic components: 
-  Always wear a ground strap connected to the electrostatic point on the equipment. 
-  Cotton clothing produces less static than nylon and other synthetic materials. 
-  Use a grounded metal surface or anti-static mat. Wipe clean with an anti-static cloth. 
-  Use all-metal tools and place on grounded surface when not being used. 
-  Use caution when removing components connected to electrostatic sensitive devices. 
The components may provide protection from static shock. 
-  Do not remove the replacement device from its protective packaging until actual 
installation of the device. It may be necessary to replace foam with wire, due to space 
constraints. 
-  Printed circuit boards (PCBs) should always be handled with care. Handle only by the 
edges and do not directly touch connectors, tracks, or pins. 
 
1.9 
Security Features 
Redline Communications wireless systems provide security setting that can be adjusted 
by the operator to meet specific applications. Redline recommends these parameters be 
set according to industry recognized security practices. Considerations include 
confidentiality, integrity, and availability of information. Implementation of these 
recommendations and the final responsibility for the system security is the responsibility 
of the system administrator and operators.