networking:hdb3
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
networking:hdb3 [14/03/2020 02:02] – created - external edit 127.0.0.1 | networking:hdb3 [15/04/2025 08:40] (current) – [HDB3 Encoding Rules] andrew | ||
---|---|---|---|
Line 15: | Line 15: | ||
The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the " | The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the " | ||
+ | |||
+ | This is sometimes wrongly referred to as encryption, it is NOT! It is a form of scrambling, there is no key and of you know the protocol, anyone can " | ||
===== Summary of HDB3 encoding rules ===== | ===== Summary of HDB3 encoding rules ===== | ||
Line 51: | Line 53: | ||
Lifted from:- | Lifted from:- | ||
- | Gorry Fairhurst - email: | + | Gorry Fairhurst - email: |
networking/hdb3.1584151332.txt.gz · Last modified: by 127.0.0.1