![Spectracom GSG-5 series User Manual With Scpi Manual Download Page 92](http://html1.mh-extra.com/html/spectracom/gsg-5-series/gsg-5-series_user-manual-with-scpi-manual_1343630092.webp)
For Glonass:
Glonass-K1
Glonass-M
(default)
3.5.10.5 Encryption
Next to the unencrypted L1 band Coarse/Acquisition Pseudo-Random Noise code (C/A PRN
code), the Precise (P), but encrypted Pseudo Random Noise code is used to modulate both the
L1, and the L2 carriers.
While GSG cannot replicate the encryption, it can emulate, and thus represent the P(Y) code,
so as to allow for commercial GPS surveying receivers to be tested for their ability to derive the
carrier in a codeless fashion.
Note that this technology does NOT use controlled encryption. Instead, it mimics the encryption
so as to provide an RF signal in the L1/L2 P(Y) location.
Note:
GPS receivers that use genuine encryption methods will NOT be able to use
the L1/L2 P with Pseudo P(Y) code enabled because the encryption used is not as
expected and they cannot decode it.
To turn P(Y) ON/OFF:
1.
Navigate to:
Select [Select a Scenario] > Configure Scenario: View 3/3
.
2.
Next to the
GPS
, enter a
number of satellites
greater than "0", or
Auto
, then press
Enter
to open this
Configuration
view:
Figure 3-22:
Turning pseudo encryption ON/OFF
3.
Navigate to the
P(Y)
entry at the bottom of the view, and select
On
, or
Off
.
Considerations:
For most L1/L2 GPS receivers, there are two valid configuration modes:
76
CHAPTER
3
•
User Manual GSG-5/6 Series
Rev.
26
3.5 "Select" Menu
Summary of Contents for GSG-5 series
Page 2: ......
Page 4: ...Blank page II User Manual GSG 5 6 Series...
Page 116: ...BLANK PAGE 3 6 Options Menu 100 CHAPTER 3 User Manual GSG 5 6 Series Rev 26...
Page 182: ...BLANK PAGE 4 9 Studioview Tasks 166 CHAPTER 4 User Manual GSG 5 6 Series Rev 26...
Page 368: ...BLANK PAGE 6 7 Revision History SCPI Guide 352 CHAPTER 6 User Manual GSG 5 6 Series Rev 26...