networking:hdb3
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| networking:hdb3 [15/04/2025 08:38] – [Example 2 of HDB3 encoding] andrew | networking:hdb3 [22/09/2025 14:07] (current) – andrew | ||
|---|---|---|---|
| Line 15: | Line 15: | ||
| The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the " | The receiver removes all Violation pulses, but in addition a violation preceded by two zeros and a pulse is treated as the " | ||
| + | |||
| + | This is sometimes wrongly referred to as encryption, it is NOT! It is a form of scrambling, there is no key and of you know the protocol, anyone can " | ||
| ===== Summary of HDB3 encoding rules ===== | ===== Summary of HDB3 encoding rules ===== | ||
| Line 52: | Line 54: | ||
| Lifted from:- | Lifted from:- | ||
| Gorry Fairhurst - email: | Gorry Fairhurst - email: | ||
| + | |||
| + | |||
| + | |||
| + | This page has been accessed:- \\ | ||
| + | Today: {{counter|today}} \\ | ||
| + | Yesterday: {{counter|yesterday}} \\ | ||
| + | Until now: {{counter|total}} \\ | ||
| + | |||
| + | |||
networking/hdb3.1744706320.txt.gz · Last modified: by andrew
