Solved

Question for  rmarotta

Posted on 1998-06-30
3
177 Views
Last Modified: 2013-12-27

Regarding top my previous question, remember that you gave me the following answer:

      Are you speaking of the mark and space frequencies for frequency shift keying? (FSK)
      If so, perhaps this is what you want:

      FSK frequencies:

      2400 baud Space = 2450 Hz, Mark = 4450 Hz

      1200 baud Space = 1300 Hz, Mark = 2100 Hz (Bell 202R compatible)

      300 baud Space = 1070 Hz, Mark = 1270 Hz (Bell 102 compatible)

      Please re-open the question if the current proposed answer has not provided a solution for
      you.
      Then I'll submit this one if it is what you want.
      Regards,
      Ralph

I want to add a little question. Could you also specify the duration of the mark and space frequency. How long do the mark frequencies last and how long do the space frequencies last.

Thanks for your help
0
Comment
Question by:ms99y
  • 2
3 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1146974
Sorry for the delayed response, but I've been away from the computer on a trip.
I'll look for your info tonight and let you know what I come up with.
Regards,
Ralph

0
 
LVL 9

Accepted Solution

by:
rmarotta earned 20 total points
ID: 1146975
ms99y,
Early teletypers used the neckbreaking speed of 50 baud (which means that one step is 20ms), 5 bits of data, no parity and 1.5 stop bits (don't ask me why!). Your PC is capable of serial transmission at up to 115,200 baud (step size of 8.68 microseconds!)..... (taken from the following site)

I think you'll find what you're looking for here:
gopher://wiretap.spies.com/00/Library/Techdoc/Comm/serialpc.faq%09%09%2B
Let me know if you need more.
Regards,
Ralph
0
 

Author Comment

by:ms99y
ID: 1146976
Thanks for your answer

Regards..
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Hello All, I have been training on Multicast for a while now and whenever I start the topic , I find out that my friends /  Colleagues mention that they do not know how to test Multicast Joins. As most of the multicast would be video traffic and …
Before I go to far, let's explain HA (High Availability) and why you should consider it.  High availability is the mechanism used to provide redundancy to any service at the same site and appears as a single service to the users of that service.  As…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now