Making Sure Your Patch Cables Are Ready For RF Work

How do you know that your patch cables are good? For simple jumper wires, a multimeter is about all you need to know for sure. But things can get weird in the RF world, in which case you might want to keep these coaxial patch cable testing tips in mind.

Of course, no matter how high the frequency, the basics still apply, and [FesZ] points out in the video below that you can still get a lot of mileage out of the Mark 1 eyeball and a simple DMM. Visual inspection of the cable and terminations can reveal a lot, as can continuity measurements on both the inner and outer conductors. Checking for shorts between conductors is important, too. But just because the cable reads good at DC doesn’t mean that problems aren’t still lurking. That’s when [FesZ] recommends breaking out a vector network analyzer like the NanoVNA. This tool will allow you to measure the cable’s attenuation and return loss parameters across the frequency range over which the cable will be used.

For stubborn problems, or just for funsies, there’s also time-domain reflectometry, which can be done with a pulse generator and an oscilloscope to characterize impedance discontinuities in the cable. We’ve covered simple TDR measurement techniques before, but [FesZ] showed a neat trick called time-domain transformation, which uses VNA data to visualize the impedance profile of the whole cable assembly, including its terminations.

 

 

All-Band Receiver Lets You Listen To All The Radio At Once

There are many ways to build a radio receiver, but most have a few things in common, such as oscillators, tuned circuits, detectors, mixers, and amplifiers. Put those together in the right order and you’ve got a receiver ready to tune in whatever you want to listen to. But if you don’t really care about tuning and want to hear everything all at once, that greatly simplifies the job and leaves you with something like this homebrew all-band receiver.

Granted, dispensing with everything but a detector and an audio amplifier will seriously limit any receiver’s capabilities. But that wasn’t really a design concern for [Ido Roseman], who was in search of a simple and unobtrusive way to monitor air traffic control conversations while flying. True, there are commercially available radios that tune the aviation bands, and there are plenty of software-defined radio (SDR) options, but air travel authorities and fellow travelers alike may take a dim view of an antenna sticking out of a pocket.

So [Ido] did a little digging and found a dead-simple circuit that can receive signals from the medium-wave bands up into the VHF range without regard for modulation. The basic circuit is a Schottky diode detector between an antenna and a high-gain audio amplifier driving high-impedance headphones; [Ido] built a variation that also has an LM386 amplifier stage to allow the use of regular earbuds, which along with a simple 3D-printed case aids in the receiver’s stealth.

With only a short piece of wire as an antenna, reception is limited to nearby powerful transmitters, but that makes it suitable for getting at least the pilot side of ATC conversations. It works surprisingly well — [Ido] included a few clips that are perfectly understandable, even if the receiver also captured things like cell phones chirping and what sounds like random sferics. It seems like a fun circuit to play with, although with our luck we’d probably not try to take it on a plane.

Hacker weet kapotte satelliet BeeSAT-1 vanaf aarde weer tot leven te wekken

Een Duitse hacker heeft een satelliet tot leven weten te wekken die sinds 2013 niet meer werkte. Daarvoor hoefde PistonMiner niet naar de ruimte; de satelliet kon vanaf de grond weer worden gerepareerd door eerst de telemetrie te herstellen en daarna de originele code te hacken.

Hacker PistonMiner presenteerde de hack tijdens de CCC-hackersconferentie in Hamburg. Het gaat om de satelliet BeeSAT-1, wat staat voor de Berlin Experimental and Education Satellite. Dat is een kleine cubesat van 10x10x10cm die in 2009 door de Technische Universiteit van Berlijn werd gelanceerd. In 2011 begon de satelliet foutieve telemetrie terug te sturen naar de aarde. Nadat de beheerders de satelliet daarop overzetten naar de back-upcomputer, kreeg ook die in 2013 problemen. Sindsdien is de satelliet, die op een hoogte van 700 kilometer boven de aarde vliegt, niet meer bruikbaar. BeeSAT-1 stuurt namelijk alleen nog nullen door als telemetrie.

PistonMiner ontdekte al snel dat het niet mogelijk was om zomaar een firmware-update naar de satelliet te sturen. De functionaliteit daarvoor werd namelijk niet afgemaakt voor de lancering. Maar de hacker ontdekte ook dat de computer niet fysiek stuk was gegaan door bijvoorbeeld straling in de ruimte; in diens talk heeft PistonMiner het over softwareproblemen. De cubesat stuurt bijvoorbeeld data terug die corrupt lijkt te zijn. Dat kan in theorie gerepareerd worden in het flashgeheugen. PistonMiner ontdekte dat het probleem lag in de bootcounter van de computer aan boord. De hacker bouwde daarom een eigen BeeSAT hier op aarde om te simuleren of het probleem op afstand kon worden gerepareerd.

Daar kwam uit dat het mogelijk moest zijn om de vtables van de satellietsoftware, die in C++ werd geschreven, te onderscheppen. Zo kon PistonMiner commando’s uitvoeren op de satelliet zelf. In de talk vertelt de hacker ook hoe het mogelijk werd om de camera van de satelliet uiteindelijk te beheren. Die werkte aanvankelijk niet omdat er voorafgaand aan de lancering te weinig tijd was de firmware daarvoor te schrijven, maar PistonMiner kreeg het alsnog voor elkaar die bug te repareren en de camera werkend te krijgen.

PistonMiner vertelt in de talk verder ook hoe ingewikkeld het was om in de eerste plaats contact te leggen met de satelliet; die vliegt eens per anderhalf uur over Berlijn, waarin de hacker maximaal een kwartiertje de tijd had commando’s door te voeren naar de kleine cubesat. Uiteindelijk is dat wel gelukt. BeeSAT-1 is weer operationeel en kan worden gebruikt voor zijn originele doel om bijvoorbeeld signalen naar radioamateurs te sturen.

Update, 16.55 uur – aangepast dat CCC in Hamburg plaatsvond en niet in Berlijn.

PistonMiner

Silent Key: PD3CW

Onlangs bereikte ons het droevige nieuws dat ons lid Kees Woudenberg PD3CW op 21 november is overleden.

Kees was actief op de HF-banden en bezocht in het verleden ook wel eens onze bijeenkomsten. Wij wensen zijn familie veel sterkte met dit verlies.

Lowering Your Noise Floor, The Easy Way

If there’s anything more annoying to an amateur radio operator than noise, we’re not sure what it could be. We’re talking about radio frequency noise, of course, the random broadband emissions that threaten to make it almost impossible to work the bands and pick out weak signals. This man-made interference is known as “QRM” in ham parlance, and it has become almost intolerable of late, as poorly engineered switch-mode power supplies have become more common.

But hams love a technical challenge, so when a nasty case of QRM raised its ugly head, [Kevin Loughlin (KB9RLW)] fought back. With an unacceptable noise floor of S8, he went on a search for the guilty party, and in the simplest way possible — he started flipping circuit breakers. Sure, he could have pulled out something fancier like a TinySA spectrum analyzer, but with his HF rig on and blasting white noise, it was far easier to just work through the circuits one by one to narrow the source down. His noise problem went away with the living room breaker, which led to pulling plugs one by one until he located the culprit: a Roomba vacuum’s charging station.

Yes, this is a simple trick, but one that’s worth remembering as at least a first pass when QRM problems creep up. It probably won’t help if the source is coming from a neighbor’s house, but it’s a least worth a shot before going to more involved steps. As for remediation, [Kevin] opts to just unplug the Roomba when he wants to work the bands, but if you find that something like an Ethernet cable is causing your QRM issue, you might have to try different measures.

 

 

Custom Firmware Adds Capabilities To Handie Talkie

Although ham radio can be an engaging, rewarding hobby, it does have a certain reputation for being popular among those who would fit in well at gated Florida communities where the preferred mode of transportation is the golf cart. For radio manufacturers this can be a boon, as this group tends to have a lot of money and not demand many new features in their technology. But for those of us who skew a bit younger, there are a few radios with custom firmware available that can add a lot of extra capabilities.

The new firmware is developed by [NicSure] for the Tidradio TD-H3 and TD-H8 models and also includes a browser-based utility for flashing it to the radio without having to install any other utilities. Once installed, users of these handheld radios will get extras like an improved S-meter and detection and display of CTCSS tones for repeater usage. There’s also a programmer available that allows the radio’s memory channels to be programmed easily from a computer and a remote terminal of sorts that allows the radio to be operated from the computer.

One of the latest firmware upgrades also includes a feature called Ultra Graph which is a live display of the activity on a selected frequency viewable on a computer screen. With a radio like this and its upgraded firmware, a lot of the capabilities of radios that sell for hundreds of dollars more can be used on a much more inexpensive handheld. All of this is possible thanks to an on-board USB-C interface which is another feature surprisingly resisted by other manufacturers even just for charging the batteries.