Hi,
Yes, I have considered something like that. There is a precondition that
I'd need to first detect which stations are sending valid timestamps;
there's quite a few stations out there sending timestamps which either
don't change, which are wrong, or which are badly encoded. The most common
misencodings are using the 'z' timestamp to send HHMMSS UTC timestamps
while the 'z' identifier is for DDHHMM UTC timestamps. :)
Just today someone with a DMR radio was complaining, his DMR rig sends a
local-time HHMMSS timestamp claiming to be UTC when he tells it to send
fixed user-selected coordinates, and a valid UTC HHMMSS timestamp when
sending coordinates from the GPS. Go figure.
If there are good igates in the area, it should be possible to detect
packets from stations with correct fresh timestamps (a few seconds old at
most), and then detect their badly-delayed copies coming through the bad
igates.
> --
> You received this message because you are subscribed to the Google Groups "
aprs.fi" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to
aprsfi+un...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/aprsfi/c3498f6d-caea-4f04-9b03-4eae3871d131n%40googlegroups.com.
>
>
- Hessu