El 06/03/2010 10:03, Dave AA6YQ escribió:

>>>I don’t have a definition, Rein; I agree with you that the Wikipedia entry is not authoritative. The fact that part 97 references spread spectrum without defining it is one of the root causes of this controversy, leaving us to make “individual decisions” in the absence of decision criteria. Transparency (ability for anyone to copy without a private key) and spreading factor are clearly important factors, but to what does the spreading factor apply? Information content? Bandwidth of the signal being spread? Mike N4QLB claims in a post on the ROS reflector that “it’s not spread spectrum if the resulting bandwidth is 3 khz”. Is that true? If so, why 3 khz, as opposed to, say, 3.1 khz?

Bandwidth of the RESULTING signal. Depends mostly on the chipping frequency and waveform (DSSS) or spread of center frequencies and dwell time (FHSS)
independent of the message.

Ideally, it should not be discernible from noise, but the FHSS scheme ROS uses does not reduce spectral power density to such low levels in a 3 kHz bandwidth.

The chipping should be many times faster than the baseband bandwidth, with no specific, fixed figure. All real systems have finite bandwidth to be realizable, and ROS is no exception. The fact that the bandwidth is that of a SSB voice channel is imposed by the available hardware (radios).

The QRM potential does not come from the bandwidth alone, but also from the resultant spectral power density achieved in such a bandwidth. No SS system can achieve the ideal limits due to hardware and administrative constraints, even 802.11 systems.

What is at a stake is also the blurred, fuzzy limits that real systems have nowadays in practice. I do believe that there should be room for such systems, as much as there is room for Olivia wide modes or MT63, and there are specific frequencies for such modes.

So far, even using a different paradigm, ROS does not achieve such a robustness in practice, because of what it still lacks. But that is something else, as is the possible presence of backdoors.

I do recommend a personal firewall, I am using an old one by Kerio, that fields and denies all non acceptable background communications, even when I do not have a direct connection to the Internet, as it "rings the bell" whenever such an unauthorized attempt happens. Not only that, it has rules to effectively deny any further attempts. Nothing is 100% safe, but it does less harm that way.

Anyone can check the spectrum of the baseband signal using the proper tool. I used Spectran and a loopback cable for simplicity on my PC. Others have used Spectrum Lab, believe even Visual Analyzer could help as well.

73,

Jose, CO2JA


Reply via email to