User Tools

Site Tools


networking:hdb3

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
networking:hdb3 [14/03/2020 02:02] – created - external edit 127.0.0.1networking:hdb3 [15/04/2025 08:40] (current) – [HDB3 Encoding Rules] andrew
Line 15: Line 15:
  
 The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the "BOOV" pattern and both the viloation and balancing pulse are removed from the receieved bit stream. This restores the original bit stream. The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the "BOOV" pattern and both the viloation and balancing pulse are removed from the receieved bit stream. This restores the original bit stream.
 +
 +This is sometimes wrongly referred to as encryption, it is NOT! It is a form of scrambling, there is no key and of you know the protocol, anyone can "decode" the bit sequence.
  
 ===== Summary of HDB3 encoding rules ===== ===== Summary of HDB3 encoding rules =====
Line 51: Line 53:
  
 Lifted from:- Lifted from:-
-Gorry Fairhurst - email:G.Fairhurst@eng.abdn.ac.uk - Date: 08/01/2002 EG3557+Gorry Fairhurst - email:G.Fairhurst at eng.abdn.ac.uk - Date: 08/01/2002 EG3557
networking/hdb3.1584151332.txt.gz · Last modified: by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki