Foundations of Amateur Radio Podcast Por Onno (VK6FLAB) arte de portada

Foundations of Amateur Radio

Foundations of Amateur Radio

De: Onno (VK6FLAB)
Escúchala gratis

Acerca de esta escucha

Starting in the wonderful hobby of Amateur or HAM Radio can be daunting and challenging but can be very rewarding. Every week I look at a different aspect of the hobby, how you might fit in and get the very best from the 1000 hobbies that Amateur Radio represents. Note that this podcast started in 2011 as "What use is an F-call?".℗ & © 2015 - 2025 Onno Benschop Ciencia Física
Episodios
  • Antenna modelling with genetic algorithms.
    Jul 5 2025
    Foundations of Amateur Radio

    Recently I was helping a friend erect their newly refurbished multi-band antenna and during the process we discussed the notion of tuning an antenna that's high in the air. They made a curious response, in that they'd tuned the antenna on the ground before we started.

    I asked how this would work, since as I understand the process, this changes things once it gets in the air. They assured me that while the actual SWR might change, the frequencies at which it was resonant would not.

    This was news to me because I've been putting off erecting my own multi-band 6BTV antenna mainly because I didn't really want to face having to erect it, tune it, lower it, modify the elements, erect it, tune it, etc., all whilst standing on the steel roof of my patio. Would this phenomenon be true for my antenna?

    It occurred to me that I could test this idea, not only for my antenna, but for other antennas as well. In my minds-eye, I saw a video displaying the pertinent attributes of an antenna, SWR, gain, radiation pattern, and whatever else I could think of, animated with the modifications of things like height and ground radials.

    If this sounds familiar in some way, it's because I've been here before. This time the outcome was slightly different, since I found a tool that can optimise antennas using a genetic algorithm. What I mean by that is an automated process where you can test variations of a thing, in this case antennas. Rather than design each antenna and test it, you essentially generate antenna designs and tweak them to determine the best one. Then you use that to generate the next series of designs. Rinse and repeat until you have what you're looking for. There's a whole field of computer science dedicated to this and unsurprisingly the rabbit hole goes deep.

    The tool is called "xnec2c-gao" and it's written by Maurizio DC1MDP. The name of the tool hints at its nature, working in combination with "xnec2c", written by Neoklis 5B4AZ and maintained by Eric KJ7LNW, you'll find links to both tools on the xnec2c.org website.

    How the two tools work together is a beautiful dance. The antenna modelling tool, xnec2c, can read an antenna definition file and detect if it changes, at which point it can redo the simulation, which it can output to another file. The genetic algorithm optimisation tool, xnec2c-gao, can detect the changed output and update the antenna definition file, and the process repeats. Which brings me to a pro-tip, for this to work, you need to configure xnec2c to do two things, detect the changed definition file, and write the output to CSV, both of these options can be found in the "Optimization Settings" menu, just so you don't spend an hour banging your head against the desk.

    Between the two tools, the antenna definition evolves and you end up with a design optimised for your purpose. The default does this for SWR and gain. Mind you, I tested a multi-band dipole which managed to find some interesting designs, but didn't pick them because a low SWR combined with a high gain, for reason't I don't yet understand, wasn't considered better than a high SWR with a high gain, so there's some work to be done. As a software developer I have a sneaking suspicion that it's adding the two, rather than picking the highest gain combined with the lowest SWR, but I haven't confirmed that. As I said, deep rabbit hole.

    While we're not yet at the video display stage, for the first time I can get a sense that this might come to pass. There's plenty of work to be done. For example, the antenna display on xnec2c during the process seems broken, there's no way to output gnuplot files during the process, and capturing the various charts in real-time will require work, but all that seems if not easy, at least possible.

    Meanwhile, I'm attempting to locate an antenna definition file, preferably in .NEC format for my 6BTV antenna, so I can use this combination of tools to discover if tuning it on the ground will work and while I'm at it, discover if the installation I'm working on will give me something worthwhile.

    I realise that this is well beyond "try it and see", but my body isn't up to climbing up and down ladders 17 times in a day and I think that getting a feel for what might occur is a good way to learn.

    When was the last time you climbed on a roof and what did you do to avoid it?

    I'm Onno VK6FLAB

    Más Menos
    5 m
  • The ARRL incident of May 2024, a year later
    Jun 28 2025
    Foundations of Amateur Radio Just over a year ago, the ARRL, the American Radio Relay League, the peak body for amateur radio in the United States and one of the oldest of such organisations, experienced an incident. During the weeks following, the ARRL was tight-lipped about the extent of the incident and most amateurs only really noticed that services were off-line or slow to respond. After months of delay and disinformation, the ARRL finally revealed that it was the subject of a ransomware attack and that it had paid a million dollar ransom. It went on to blame the authorities for its silence. Mind you, it didn't tell me personally, it made public statements on its website. Similarly when I specifically contacted the ARRL to discover what information of mine it held, and what the status of that information was, the ARRL responded that I should refer to its public statements. It continued to state that my information was not compromised, since it only lived in LoTW, the Logbook of The World, the system it uses to coordinate the verification of amateur radio contacts, which are used to distribute awards like the DXCC and Worked All whatever. Imagine my surprise when I received an email this week, sent from "memberlist@arrl.org" to my non-amateur radio email address. I confirmed with several amateurs that they too received this email. Informative, to a point, but likely well beyond anything intended by its author, it stated that LoTW was being updated with associated down time, incidentally, inexplicably, coinciding with the 2025 ARRL Field day, and it "will be fully migrated to the cloud". It went on to solicit donations. It made no reference whatsoever to the ransomware attack. There's a lot hidden in that email. Although the attack last year was linked to the outage associated with LoTW, the ARRL has continued to claim that the LoTW data was not impacted by the ransomware attack, but the email reveals that the system is being migrated to the cloud, in other words, right now, it's not in the cloud. Which begs the question, where is the server infrastructure for LoTW today, and more importantly, where was it a year ago when its systems were compromised? From a public post by Dave AA6YQ, dated the 2nd of February 2021, in response to a message about a January LoTW committee meeting, we know that the LoTW server "now employs the current version of an SAP database engine". A month before that, Dave wrote another informative email that indicated that 105 thousand callsigns submitted logs to LoTW in the last 1,826 days or the five years between 2016 and 2021. There were logs from 21 thousand callsigns in the week prior to that January post. In all, according to Dave, there were 153,246 callsigns who submitted contacts to LoTW. The LoTW committee meeting minutes are no longer available from the ARRL website, but I have a copy. The document states that there were 1.2 billion contacts entered into LoTW, big number right? The next line tells us that this resulted in 262 million QSO records. I wonder what happened to the other billion records? This activity was generated by 139 thousand users using 200 thousand certificates. For context, every VK callsign automatically comes with an AX callsign, but LoTW requires that you separately register each with its own certificate. As someone who has been playing with databases since the 1980's I can tell you that LoTW is a tiny database. For comparison, the WSPR database is an order of magnitude larger, not to mention, more active. I have no insight into the business rules within the LoTW database, but the fact that updates are being processed in batches and that it regularly has delays indicates a level of complexity that I cannot account for. As an aside, the LoTW committee document lists 10 members. Dave is not one of those listed. It makes me wonder who else has access to this database. Note that I have no reason to believe that Dave's information is questionable, nor that he has access that he shouldn't, he was after all a member of the LoTW committee from 2013 until 2017 when the ARRL removed all development resources from the LoTW. I'm asking who else has access and why? While we're here, who has been doing maintenance and updates on this system over the past seven years? Moving on. The database for LoTW contains information from amateurs all over the planet, including those in Europe where the GDPR, the General Data Protection Regulation, enacted in 2016, is extremely strict on the security and disclosure of personal data with very heavy penalties for breaches. The GDPR requires notifications be sent within 72 hours of a breach, and that an organisation must designate a data protection officer. I wonder who has that role at the ARRL and I wonder if they told anyone? Did any European amateurs receive personal notification from the ARRL about their data, I know I didn't. My first activation of LoTW was in 2013, now twelve years ago. I received ...
    Más Menos
    12 m
  • The Art of decoding a signal.
    Jun 21 2025
    Foundations of Amateur Radio

    The other day Randall, VK6WR, encouraged me to get on-air. He described it like this:

    "There is a mystery signal on 40m that you can try your new Universal Radio Hacker skills on. It appears to be a FSK signal separated by 7kHz with the two signals at 7.0615 and 7.0685 MHz. Each of them on their own sounds a bit like a Morse signal, but my CW decoder decodes junk. But if you can see it on a spectrum scope, it is clearly FSK because either one of them is on at any time."

    He went on to say: "You'll need an SDR to receive the signal given the separation, but could be a fun investigation!"

    Having just discovered "Universal Radio Hacker", a tool that can help you decode radio signals, that sounded like something I'd love to have a go at. Unfortunately, after the demise of my main workstation last year, my current set-up doesn't allow me to do such recordings, but Randall, ever the gentleman, provided a recording of the signal.

    He writes: "This was captured with gqrx demodulating the signal as SSB audio with the VFO tuned to 7.060, so both "signals" are there, one very low freq and one very high freq."

    If you're curious, I've uploaded the file as it was shared with me to my VK6FLAB GitHub repository under "signals".

    Over the next two days I spent my time attempting to decode this signal. I opened up Universal Radio Hacker and spent delightful hours getting precisely .. nowhere. Some of that is absolutely my unfamiliarity with the tool, but this is a great exercise in learning on the fly, where truth be told, I tend to live most of my life.

    It wasn't until several hours later that I decided I should at least listen to the audio. To my ear it sounded like 25 WPM Morse Code, but being still in the learning phases, while my brain was triggering on the sequences, decoding wasn't happening. Of course I could cheat and forward the audio to one of my fellow amateurs, but the actual message wasn't really the point of the exercise, at least not at this stage.

    Instead I fired up "multimon-ng" which has an in-built Morse decoder. I spent some hours doing more Yak Shaving than I was expecting, but even then, I still didn't get more than gobbledegook out of the process. I used "Audacity" to shift one of the signals by one wavelength and mixed them together. This allowed me to reduce the noise significantly, but still none of my tools did anything useful. In case you're wondering why, if you have a tone and noise and shift one signal by the wavelength of the tone, then mix them, the tone adds to itself, but the noise, random in nature, is just as likely to add as it is to subtract, so in effect, you're increased the signal to noise ratio.

    After multimon-ng failed, I tried an online Morse decoder, which gave me all manner of text, but none of it made sense to me. Of course it's possible that this is someone rag chewing in a different language, but I couldn't make any sense of the thing.

    I did come up with some issues that prompted me to create the signal repository. I realised that I didn't have any known "good" signals. Previously I'd tried decoding a sample FT4 signal, but that went nowhere, mainly because the signal was noisy.

    So, what I'm going to do over the next couple of weeks is create some clean, as-in, computer generated, known signals, and add them to the repository. The aim is to have a known good starting point to learn from. In software development this technique is often used to limit the number of unconstrained variables. In our case, if I generate a known good Morse Code signal, then I can learn how to use Universal Radio Hacker to decode it, so when I come across an unknown signal, I can use the techniques I learnt to attempt to decode it.

    Feel free to make pull requests with known good signals yourself. RTTY, PSK31, WSPR, FT8, etc. Feel free to include non-amateur modes.

    One thing, I'm not looking for off-air recordings of signals, yet, that can come later, right now I need signals that are pure, as-in, as I said, computer generated. Of course at some point, perhaps sooner rather than later, I'll discover that generated signals are no easier to decode than off-air recordings, but that's for another day.

    Meanwhile, you too can play. Download one or more sample files and decode them. Let me know what you learn.

    I'm Onno VK6FLAB

    Más Menos
    5 m
Todavía no hay opiniones