Dire Wolf User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Dire Wolf User Guide Dire Wolf User Guide Decoded Information from Radio Emissions for Windows Or Linux Fans Version 1.6 -- October 2020 Canis Dirus (Dire Wolf) Harvard Museum of Natural History Contents 1 Introduction .......................................................................................................................................... 1 1.1 FX.25 - Forward Error Correction (FEC) ......................................................................................... 2 2 Features ................................................................................................................................................ 3 3 Connection to Radio.............................................................................................................................. 6 3.1 Don’t have a serial port? ............................................................................................................... 8 3.2 For Best Results ............................................................................................................................. 8 4 Installation & Operation – Microsoft Windows XP or later ................................................................ 10 4.1 Run Dire Wolf .............................................................................................................................. 11 4.2 Select better font ........................................................................................................................ 13 4.3 AGW TCPIP socket interface ....................................................................................................... 14 4.3.1 APRSISCE/32 ........................................................................................................................ 14 4.3.2 Ui-View ................................................................................................................................ 15 4.3.3 YAAC (Yet Another APRS Client).......................................................................................... 15 4.3.4 SARTrack ............................................................................................................................. 15 4.4 Kiss TNC emulation – serial port ................................................................................................. 16 4.4.1 APRSISCE/32 ........................................................................................................................ 16 4.4.2 UI-View32 ............................................................................................................................ 16 4.4.3 YAAC (Yet Another APRS Client).......................................................................................... 16 4.5 Kiss TNC emulation – network .................................................................................................... 17 4.5.1 Winlink / RMS Express ........................................................................................................ 17 4.5.2 APRSISCE/32 ........................................................................................................................ 17 4.6 Build Dire Wolf from source on Windows (optional).................................................................. 18 5 Installation & Operation – Linux ......................................................................................................... 20 5.1 Install Prerequisites ..................................................................................................................... 20 5.1.1 Optional Step: hamlib support ........................................................................................... 21 5.2 Download Dire Wolf source code ............................................................................................... 21 5.3 Start Build & Install ..................................................................................................................... 22 5.4 Finish build and install................................................................................................................. 22 5.5 Select UTF-8 character set .......................................................................................................... 24 5.6 Run Dire Wolf .............................................................................................................................. 25 5.7 AGW TCPIP socket interface ....................................................................................................... 25 5.7.1 Xastir ................................................................................................................................... 25 5.8 Kiss TNC emulation – serial port ................................................................................................. 25 5.8.1 Xastir ................................................................................................................................... 26 5.8.2 Linux AX25 ........................................................................................................................... 26 5.8.2.1 Unexpected transmissions .............................................................................................. 28 5.9 Automatic Start Up After Reboot ................................................................................................ 28 6 Macintosh OS X ................................................................................................................................... 30 6.1 Install Xcode/Command line tools. ............................................................................................. 30 6.2 Install Macports .......................................................................................................................... 30 6.3 Install Support tools and PortAudio Library. ............................................................................... 31 6.4 Compiling Direwolf...................................................................................................................... 31 6.5 Read the instructions to configure direwolf.conf file. ................................................................ 32 6.6 Running direwolf. ........................................................................................................................ 33 6.7 Read the rest of the User Guide. ................................................................................................ 33 6.8 In case of difficulties ................................................................................................................... 33 7 Basic Operation ................................................................................................................................... 34 7.1 Start up configuration information ............................................................................................. 34 7.2 Information for receiving and transmitting ................................................................................ 35 7.3 Periodic audio device statistics ................................................................................................... 40 8 Data Rates ........................................................................................................................................... 43 8.1 Bits per Second (bps) vs. Baud .................................................................................................... 43 8.2 1200 bps ...................................................................................................................................... 43 8.3 300 bps ........................................................................................................................................ 43 8.4 9600 bps ...................................................................................................................................... 44 8.5 2400 bps ...................................................................................................................................... 45 8.6 4800 bps ...................................................................................................................................... 46 8.7 AIS Reception - new in 1.6 .......................................................................................................... 47 9 Configuration File & command line options ....................................................................................... 49 9.1 Audio Device ............................................................................................................................... 49 9.1.1 Audio Device Selection – All Platforms ............................................................................... 51 9.1.2 Audio Device selection - Windows ...................................................................................... 51 9.1.3 Audio Device selection – Linux ALSA .................................................................................. 52 9.1.4 Audio Device selection – Mac OS X ..................................................................................... 55 9.1.5 Audio Device properties ...................................................................................................... 55 9.1.6 Use with Software Defined Radios...................................................................................... 55 9.1.6.1 gqrx ................................................................................................................................
Recommended publications
  • Creating a Mesh Sensor Network Using Raspberry Pi and Xbee Radio Modules
    Creating a mesh sensor network using Raspberry Pi and XBee radio modules By Michael Forcella In Partial Fulfillment of the Requirement for the Degree of MASTER OF SCIENCE In The Department of Computer Science State University of New York New Paltz, NY 12561 May 2017 Creating a mesh sensor network using Raspberry Pi and XBee radio modules Michael Forcella State University of New York at New Paltz _________________________________ We the thesis committee for the above candidate for the Master of Science degree, hereby recommend acceptance of this thesis. ______________________________________ David Richardson, Thesis Advisor Department of Biology, SUNY New Paltz ______________________________________ Chirakkal Easwaran, Thesis Committee Member Department of Computer Science, SUNY New Paltz ______________________________________ Hanh Pham, Thesis Committee Member Department of Computer Science, SUNY New Paltz Approved on __________________ Submitted in partial fulfillment for the requirements for the Master of Science degree in Computer Science at the State University of New York at New Paltz ABSTRACT A mesh network is a type of network topology in which one or more nodes are capable of relaying data within the network. The data is relayed by the router nodes, which send the messages via one or more 'hops' until it reaches its intended destination. Mesh networks can be applied in situations where the structure or shape of the network does not permit every node to be within range of its final destination. One such application is that of environmental sensing. When creating a large network of sensors, however, we are often limited by the cost of such sensors. This thesis presents a low-cost mesh network framework, to which any number of different sensors can be attached.
    [Show full text]
  • Efficient Multi-Carrier Communication on the Digital Subscriber Loop
    Efficient Multi-Carrier Communication on the Digital Subscriber Loop Donnacha Daly Department of Electrical and Electronic Engineering Faculty of Engineering and Architecture University College Dublin National University of Ireland A thesis presented to the National University of Ireland Faculty of Engineering and Architecture in fulfillment of the requirements for the degree of Doctor of Philosophy May 2003 Research Supervisors: Dr. C. Heneghan Prof. A. D. Fagan Head of Department: Prof. T. Brazil Abstract This thesis explores three distinct philosophies for improving the efficiency of multi-carrier com- munication on the digital subscriber loop. The first topic discussed is impulse response shortening for discrete multitone transceivers. The minimum mean-squared error impulse response shortener is reformulated to allow near-optimal rate performance. It is demonstrated that the best existing eigen-filter designed channel shortener is a particular case of the proposed reformulation. An adap- tive time-domain LMS algorithm is provided as an alternative to eigen-decomposition. The next part of the thesis examines bit- and power- loading algorithms for multitone systems. The problem of rate-optimal loading has already been solved. It is shown, however, that the rate-optimal solu- tion does not give best value for complexity, and that near optimal schemes can perform very well at a fraction of the computational cost. The final section of the thesis is a brief exposition of the use of wavelet packets to achieve multi-carrier communication. It is proposed that the non-uniform spectral decomposition afforded by wavelet packet modulation allows reduced inter-symbol inter- ference effects in a dispersive channel.
    [Show full text]
  • Major Project Final
    2015 PiFi Analyser MASON MCCALLUM, NATHAN VAZ AND TIMOTHY LY NORTHERN SYDNEY INSTITUTE | Meadowbank Executive summary Wireless networks have become more prevalent in contemporary society, as such it is important to accurately study the impact that wireless networking can have on personal security and privacy. The PiFi Analyser project outlines the methods behind passively recording wireless networks and mapping the recorded data with associated GPS location data. The ensuing report confirms the methodologies and technologies proposed can operate to scopes that could be used to significant effect. 1 | P a g e Contents Executive summary ................................................................................................................................. 1 Introduction ............................................................................................................................................ 4 Literature Review .................................................................................................................................... 5 Objectives ............................................................................................................................................... 7 Method ................................................................................................................................................... 9 Building the Device ............................................................................................................................. 9 Testing device
    [Show full text]
  • Replacing 1200 Baud AFSK FM with PSK and Deploying DTN Iain Young [email protected]
    Replacing 1200 Baud AFSK FM with PSK and Deploying DTN Iain Young [email protected] Agenda ● Introductions ● AX.25 Link Established! ● Exactly What Are We ● Adding TCP/UDP/IP Planning To Replace ? ● Adding DTN ● Why Replace It ? ● Results ● Computer Network Theory ● Conclusions ● How We Replaced It ● Future Experiments – Tools and Utilities Needed ● Acknowledgements – RF Setup and Maps Introductions ● Two major areas of focus – Replacing AX.25 1200 baud AFSK FM with PSK – Deploying DTN ● Who ? – Iain Young, G7III, MAXPAK Chairman – Dave Madew, M0DCM, MAXPAK Committee Member ● MAXPAK – Formed as a dedicated AX.25 Packet group for the Midlands – Constitution changed a couple of years ago, to include all digital modes So What Are We Replacing, And What Are We Not Replacing ? ● The AX.25 Physical Layer – In “Network” Parlance, Layer 1 – We mean the 1200 baud AFSK FM transmissions ● We are not replacing what the network world would call “Layer 2” or “The Data Link Layer” where you send and receive AX.25 frames to and from AX.25 addresses ● The mode we are all familiar with could be more formally described as AX.25 over 1200 baud AFSK FM ● The mode we will be creating could be more formally described as AX.25 over PSK Why Do This ? (1) ● 1200 baud AFSK FM is not exactly well known for it's effeciency, especially with regards to: – Spectrum usage, – Power requirements – Link budget ● Even it's 300 baud cousin is not particularly well thought of on HF, can be improved on and that's only a quarter the throughput! Why Do This ? (2) ● Plenty have claimed
    [Show full text]
  • Overview of Ham Radio Software
    OVERVIEW OF SOFTWARE FOR DIGITAL HAM RADIO Where to download free software: (often there are helpful help files also, so you might want to peruse around a bit more than just download) FLDIGI https://sourceforge.net/projects/fldigi/files/fldigi/fldigi- 3.23.15_setup.exe/download https://sourceforge.net/projects/fldigi/files/fldigi/ Downloading FLDIGI can be a bit tricky. Try going to the above page and then selecting (for Windows) the file ending with “setup.exe”. WINLINK EXPRESS http://www.winlink.org/sites/default/files/downloads/winlink_express_insta ll_1-4-2-0.zip UZ7HO http://uz7.ho.ua/modem_beta/soundmodem95.zip is the actual download. SOUNDMODEM.EXE WINDOWS BPQ http://www.cantab.net/users/john.wiseman/Downloads/LastestInstaller/ is the directory http://www.cantab.net/users/john.wiseman/Downloads/LastestInstaller/BPQ 32_6.0.13.1_20160927.exe is the actual download link Malware Detection Software: Many commercial virus checkers and malware detectors will consider very rare software to be automatically suspect, and delete or refuse to run or load it. You will have to find out how to tell your malware detection software to accept these quite- respectable programs. Every malware detection program works differently, so read your instructions! Digital Ham Radio has many facets. Characters from a computer become some version of “tones” going to a transmitter microphone input; audio from a receiver speaker output gets transformed into characters in a computer and possibly visible on the screen to a user. Software & hardware combine to make this magic happen. This paper will attempt to categorize the major software required to accomplish several communications.
    [Show full text]
  • GPSD Client HOWTO
    7/16/2017 GPSD Client HOWTO GPSD Client HOWTO Eric S. Raymond <[email protected]> version 1.19, Jul 2015 Table of Contents Introduction Sensor behavior matters What GPSD does, and what it cannot do How the GPSD wire protocol works Interfacing from the client side The sockets interface Shared-memory interface D-Bus broadcasts C Examples C++ examples Python examples Other Client Bindings Java Perl Backward Incompatibility and Future Changes Introduction This document is a guide to interfacing client applications with GPSD. It surveys the available bindings and their use cases. It also explains some sharp edges in the client API which, unfortunately, are fundamental results of the way GPS sensor devices operate, and suggests tactics for avoiding being cut. Sensor behavior matters GPSD handles two main kinds of sensors: GPS receivers and AIS receivers. It has rudimentary support for some other kinds of specialized geolocation-related sensors as well, notably compass and yaw/pitch/roll, but those sensors are usually combined with GPS/AIS receivers and behave like them. In an ideal world, GPS/AIS sensors would be oracles that you could poll at any time to get clean data. But despite the existence of some vendor-specific query and control strings on some devices, a GPS/AIS sensor is not a synchronous device you can query for specified data and count on getting a response back from in a fixed period of time. It gets radio data on its own schedule (usually once per second for a GPS), and emits the reports it feels like reporting asynchronously with variable lag during the following second.
    [Show full text]
  • 16.1 Digital “Modes”
    Contents 16.1 Digital “Modes” 16.5 Networking Modes 16.1.1 Symbols, Baud, Bits and Bandwidth 16.5.1 OSI Networking Model 16.1.2 Error Detection and Correction 16.5.2 Connected and Connectionless 16.1.3 Data Representations Protocols 16.1.4 Compression Techniques 16.5.3 The Terminal Node Controller (TNC) 16.1.5 Compression vs. Encryption 16.5.4 PACTOR-I 16.2 Unstructured Digital Modes 16.5.5 PACTOR-II 16.2.1 Radioteletype (RTTY) 16.5.6 PACTOR-III 16.2.2 PSK31 16.5.7 G-TOR 16.2.3 MFSK16 16.5.8 CLOVER-II 16.2.4 DominoEX 16.5.9 CLOVER-2000 16.2.5 THROB 16.5.10 WINMOR 16.2.6 MT63 16.5.11 Packet Radio 16.2.7 Olivia 16.5.12 APRS 16.3 Fuzzy Modes 16.5.13 Winlink 2000 16.3.1 Facsimile (fax) 16.5.14 D-STAR 16.3.2 Slow-Scan TV (SSTV) 16.5.15 P25 16.3.3 Hellschreiber, Feld-Hell or Hell 16.6 Digital Mode Table 16.4 Structured Digital Modes 16.7 Glossary 16.4.1 FSK441 16.8 References and Bibliography 16.4.2 JT6M 16.4.3 JT65 16.4.4 WSPR 16.4.5 HF Digital Voice 16.4.6 ALE Chapter 16 — CD-ROM Content Supplemental Files • Table of digital mode characteristics (section 16.6) • ASCII and ITA2 code tables • Varicode tables for PSK31, MFSK16 and DominoEX • Tips for using FreeDV HF digital voice software by Mel Whitten, KØPFX Chapter 16 Digital Modes There is a broad array of digital modes to service various needs with more coming.
    [Show full text]
  • OS-Based Resource Accounting for Asynchronous Resource Use in Mobile Systems
    OS-based Resource Accounting for Asynchronous Resource Use in Mobile Systems Farshad Ghanei Pranav Tipnis Kyle Marcus [email protected] [email protected] [email protected] Karthik Dantu Steve Ko Lukasz Ziarek [email protected] [email protected] [email protected] Computer Science and Engineering University at Buffalo, State University of New York Buffalo, NY 14260-2500 ABSTRACT In the last two decades, computing has moved from desk- One essential functionality of a modern operating system tops to mobile and embedded platforms. Advances in sens- is to accurately account for the resource usage of the un- ing, communication, and estimation algorithms have led to derlying hardware. This is especially important for com- the development of advanced robotic systems such as driver- puting systems that operate on battery power, since energy less cars and micro-aerial vehicles. Networks of sensors re- management requires accurately attributing resource uses to side in buildings as well as outdoor areas to monitor and processes. However, components such as sensors, actuators improve our daily lives. Since such use cases rely on hard- and specialized network interfaces are often used in an asyn- ware that is battery powered, energy constraints lie at the chronous fashion, and makes it difficult to conduct accurate heart of this evolution [16]. resource accounting. For example, a process that makes a Energy is a finite, system-wide resource that needs to be request to a sensor may not be running on the processor for efficiently managed across all applications. One requirement the full duration of the resource usage; and current mech- for this, is the ability to account energy usage for each ap- anisms of resource accounting fail to provide accurate ac- plication.
    [Show full text]
  • Digital Mode Presentation
    Digital Mode Presentation General Knowledge Digital communication is the exchange of digital data over the air • Email, Digital files, Keyboard-to-keyboard (chat), and others Protocols on today’s menu • RTTY, PACTOR, JT9/65, PSK31, FSQCall, Olivia Communication = digital mode if info is exchanged as individual characters encoded as digital bits. Example: A = ASCII 01000001 Some consider CW a digital mode. (an A = di-dah) Some modes are old, like radio-teletype, invented in the 1930’s. Some modes are new, like FSQ, invented in the mid-2015’s. Where? • Look at an amateur band chart (80 meters and 20 meters) • Look at a band plan (2-4, 2-17, 6-2) • Show CW, PSK31 (3.570 & 14.070) and RTTY • Look at http://bandplans.com Definitions Air Link – the part of the communication system involving radio transmissions and reception of signals. Bit – fundamental unit of data; a 0 or 1 in binary Bit rate – number of bits per second sent from one system to another. Symbol – signal characteristics that make up each distinct state of the transmitted signal • CW symbols = on and off • RTTY symbols are tones • Baudot or ASCII (simple methods) encode one bit in each symbol • Sophisticated codes use complex audio signals to carry the data and encode more than one bit in each symbol Baud – number of symbols per second that are sent from one system to another. Duty cycle – ratio of transmitting to total on/off time • Important to know duty cycle of mode because most transmitters are not designed to operate at full power for extended periods of time.
    [Show full text]
  • Python Gps2system. 2/25/2017
    Python GPS2system. 2/25/2017 Overview The GPS system was designed to play audio clips along the route of the New Hope Valley Railroad. The initial impedes was to play sound effects during the Halloween train rides. At a specified latitude and longitude the device would play a specific sound effect. After the system is powered up, it may take the GPS receiver a couple of minutes to lock on to enough satellites to retrieve valid data. The system then runs autonomously. On start up, the LED indicator will come on after the linux system loads and the python application has been launched. This takes less than a minute. The indicator will begin to flash when the GPS receiver is locked and is sending valid data to the system. This could take several minutes, depending on the atmospheric conditions. In normal operation the LED will flash approximately once per second. The LED will remain on when an audio track is being played and when the system is capturing and storing positional data. Details All of the files are located in the /home/pi/gps2 folder. To begin the process we have to know the latitude and longitude of the locations that will play the audio clip. In the first iteration of this system, a Parallax BS2 stamp chip was used. This system was used for a couple of years. The limitation of this original system, which was chosen because it used a BASIC programming language, was the finite memory of the Parallax chip. Since the route of the railway was NE a compromise was made to use only the latitude data.
    [Show full text]
  • Garmin Usb Gps Receiver for Laptops
    Garmin Usb Gps Receiver For Laptops Perceptional Xever showed oppositely and emptily, she foreseen her pastis bedraggle proscriptively. Colbert remains agreeable: she inthrall her neutron loiter too reportedly? Laurens tariff rearwards. This accuracy has been adorned in the app through latitude and altitude features supported via satellite signals. Pole into Water Anchor, Talon Shallow water Anchor, Marine Radio, Shortwave Radios, Radio Scanner, Police Scanner, CB Radio, GMRS Radios, FRS Radio. Installation of USB GPS on Tablet desktop laptop Windows. Follow the steps to suppress deep insights on how they update Garmin GPS. USB ports of laptop. There who usually run most the few tens of points in similar route. Garmin connect a usb gps logger, holding out at an image to utilize one drone, receiver usb gps garmin for a long ago came as long enough, new posts to search in offline and! As it stands now sound the bland taste youve left hand my mouth. Radars are rarely used alone been a marine setting. Flaticon, the largest database excel free vector icons. Please has the gpsd control socket location. With uphold, you can download the latest roadmap and other one as needed. Fi for easy updates. Having sex second screen gets me up little closer to IFR capable, but love will thereafter need more buy lease install a Garmin certified GPS navigator. Garmin GPS Outdoor Handlheld Devices, Suppliers of hunting and outdoor products available so purchase online. You to have a reply or open. RAW plus JPG and ever the Olympus share App on essential phone to slant the images.
    [Show full text]
  • Evaluating Kismet and Netstumbler As Network Security Tools & Solutions
    Master Thesis MEE10:59 Evaluating Kismet and NetStumbler as Network Security Tools & Solutions Ekhator Stephen Aimuanmwosa This thesis is presented as part requirement for the award of Master of Science Degree in Electrical Engineering Blekinge Institute of Technology January 2010 © Ekhator Stephen Aimuanmwosa, 2010 Blekinge Institute of Technology (BTH) School of Engineering Department of Telecommunication & Signal Processing Supervisor: Fredrik Erlandsson (universitetsadjunkt) Examiner: Fredrik Erlandsson (universitetsadjunkt i Evaluating Kismet and NetStumbler as Network Security Tools & Solutions “Even the knowledge of my own fallibility cannot keep me from making mistakes. Only when I fall do I get up again”. - Vincent van Gogh © Ekhator Stephen Aimuanmwosa, (BTH) Karlskrona January, 2010 Email: [email protected] ii Evaluating Kismet and NetStumbler as Network Security Tools & Solutions ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. In fact the security problems and solution of information systems are becoming more and more complex and complicated as new exploit security tools like Kismet and Netsh (a NetStumbler alternative) are developed. This thesis work tried to look at the passive detection of wireless network capability of kismet and how it function and comparing it with the default windows network shell ability to also detect networks wirelessly and how vulnerable they make secured and non-secured wireless network.
    [Show full text]