User Tools

Site Tools


networking:hdb3

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
networking:hdb3 [15/04/2025 08:38] – [Example 2 of HDB3 encoding] andrewnetworking:hdb3 [15/04/2025 08:40] (current) – [HDB3 Encoding Rules] andrew
Line 15: Line 15:
  
 The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the "BOOV" pattern and both the viloation and balancing pulse are removed from the receieved bit stream. This restores the original bit stream. The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the "BOOV" pattern and both the viloation and balancing pulse are removed from the receieved bit stream. This restores the original bit stream.
 +
 +This is sometimes wrongly referred to as encryption, it is NOT! It is a form of scrambling, there is no key and of you know the protocol, anyone can "decode" the bit sequence.
  
 ===== Summary of HDB3 encoding rules ===== ===== Summary of HDB3 encoding rules =====
networking/hdb3.txt · Last modified: by andrew

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki