19 Datacomms
19 Datacomms
19 Communications
It is generally assumed that data communication is a modern used for special applications, for example slow PBSK modes and
aspect of amateur radio, but of course Morse code transmission the MFSK mode JASON (weak signal modes for LF); and WSJT
can also be regarded as a data mode. Recent deregulation of and high speed Hellschreiber (for meteor scatter use).
international and local Morse requirements has done nothing to The late 1990s and early 2000s saw the ascendancy of the
weaken the interest in Morse, and the mode remains one of the high-speed personal computer with sound card as the preferred
most popular on the DX bands. method of signal processing. In addition to the development of
The mode of operation first associated with data communica- new modes that would not have been possible without digital
tions by most amateurs is radio teletype (RTTY). Amateurs in the signal processing, the sound card technique has made digital
UK first began using RTTY on the air in the late 1950s with sur- mode operation easy and inexpensive for beginners. It has also
plus machines such as the Creed 7B. Despite inferior perform- paved the way for a range of new tools, such as the spectrogram,
ance in comparison to that of more recently developed modes, used to detect weak signals and monitor propagation.
RTTY still has its enthusiasts. There are still many RTTY con- Although not exactly a data mode, Slow Scan Television (SSTV)
tests, although now computers are used in place of mechanical technology also advanced significantly during this period, to
machines. become a popular addition to the SSB QSO. Through the use of
the sound card and digital signal processing, inexpensive SSTV
DATA MODE DEVELOPMENTS operation is now widely enjoyed. See the Image Techniques
Digital electronics and then computers allowed technically chapter for more on SSTV.
improved data modes to be developed. The first, developed by The trend in HF data modes is continuing to move away from
Peter Martinez, G3PLX, was called AmTOR (from 'amateur tele- specialised hardware toward general-purpose computers using
type over radio'). Based on the commercial SiTOR system, this digital signal processing. Performance never dreamed possible
was the first amateur data communications mode to make use is becoming a reality, and indications are that before long the
of error-detection and correction techniques, albeit in a very sim- receiver and transmitter as we know them will be completely
ple form. This was to be followed by many other specially absorbed into the computer - the so-called software defined
designed data modes. Commercially developed modems offer- radio [2].
ing protocols such as PacTOR, G-TOR and CLOVER were intro- Towards the end of the 1970s, amateurs in North America
duced, and these continue to provide error-free (but expensive) began experimenting with microprocessor and digital tech-
HF communications for bulletin-board and automated mail sys- niques to generate and process data. A standard based on the
tems; these modes correct errors using two-way transactions. CCITT X.25 public packet switched network protocol was finally
Fig 19.1 shows how modern modes have developed from RTTY. agreed on, and this Amateur X.25 (AX.25) protocol became the
There has also been strong interest in modes that (like RTTY) standard for amateur packet radio. During the 1980s and
offered the amateur operator real-time keyboard to keyboard 1990s the technique grew into a global amateur integrated net-
chatting. From the mid 1990s, a serious effort was made to work offering error corrected communications between any two
replace RTTY with modes designed specifically to take into stations in a network, file transfer, automatic message storage
account the requirements of amateur chat modes, and the and forwarding, and bulletin dissemination. While packet radio
characteristics of HF propagation. The first of these new ‘design- no longer has the following it once had, largely due to the incred-
er’ modes was PSK31, developed by G3PLX. An amazingly fruit- ible popularity of the Internet, useful work is still continuing in
ful period of new mode development followed, based on the PC the area of packet data handling. There is especially strong
sound card, and as one experienced operator interest in international message handling for remote users,
commented:"More modes have been developed in the last few computer networking, and in technology related to telemetry
years than in the previous century!" [1]. During this period, and the tracking of vehicles and other assets. The leaders in this
Hellschreiber was revived, MT63 was developed, and MFSK16 area have been Bob Bruninga, WB4APR, (APRS) [3]; Phil Karn,
was introduced. Other less successful modes have come and KA9Q [4]; Ian Wade , G3NRW (radio network operating systems)
gone, or remain as curiosities. Some newer developments are [5], and the late Roger Barker, G4IDE (UIVIEW and WINPACK) [6].
Packet radio has also been widely used to disseminate hints to
DX operators ("DX spotting").
GETTING STARTED
There is no need to be daunted by the prospect of operating HF
data modes. While some systems require skill and experience,
there are also some very effective computer modes that are
easy to set up, and a pleasure to use. The simplest are
Hellschreiber and PSK31.
HF keyboard mode operation is now a very cost-effective addi-
tion to the ham shack. Not only is the equipment inexpensive, if
an HF rig and computer are available, but also the more effec-
tive modes do not require high power or large antennas for good
DX. All the keyboard to keyboard modes now use sound card
Fig 19.1: Development of HF Digital Modes technology, and there is software for the most popular modes
RTTY
RTTY is now almost exclusively operated using computers, but
the actual data signalling remains the same as it was in the
1950s, when mechanical machines were used.
RTTY uses five sequential pulses to represent each of the let-
ters, figures, symbols and machine functions. Start and stop
pulses are added to facilitate serial transmission. This code is
now recognised as the International Telegraph Alphabet No 2
(ITA2) [9], an international standard with national variations. A
Table 19.1: RTTY summary Fig 19.6: Block Diagrams of hardware and sound card systems
Fig 19.7: The AmTOR-A Spectrogram Fig 19.8: The AmTOR-B Spectrogram
Fig 19.9: The PSK31 Spectrogram Fig 19.10: The Feld-Hell Spectrogram
Fig 19.11: The MT63 Spectrogram Fig 19.12: The MFSK16 Spectrogram
lowest (idle) tone. This tone appears at the start of each over
and during pauses in the transmission (see Fig 19.12).
Other amateur-developed MFSK modes include: MFSK8, also
by IZ8BLY; THROB by Lionel Sear, G3PPT; OLIVIA by SP9VRC;
FSK441 by Joe Taylor, K1JT; Domino by Con Wassilief, ZL2AFP;
and JASON, a narrow band LF mode by Alberto deBene, I2PHD.
FSK441 is a high speed four-tone mode for meteor scatter use.
JASON and Domino use Incremental Frequency Keying (IFK),
encoding the data as differences in frequency, rather than Fig 19.14: The CLOVERII Spectrogram
absolute frequency.
MFSK8 is the same bandwidth as MFSK16, but uses 32 tones Symbol Rate 31.25 baud
spaced 8Hz apart at 8 baud. It is extremely difficult to tune accu- Typing Speed 30 - 500WPM
rately. THROB uses an unusual combination of single and dual Bandwidth 500Hz
tones to encode a restricted character set, and operates at 1, 2 ITU-R Description 500HJ2DEN
or 4 baud. Despite the very low signalling rate, the typing speed
is reasonable, since each signal is a complete character. There
Table 19.8: CLOVERII summary
is no FEC.
Domino is designed for HF band chatting, and encodes each pensive) modems, which operate the specialised modes
character of a limited (6-bit) character set into two successive PACTOR, PACTOR2, PACTOR3, CLOVER II and G-TOR.
tones. The tones are in two interleaved sets of eight, odd and The original PACTOR mode is FSK, not unlike AmTOR, except
even, and the data is recovered by measuring the distance that the data is ASCII, transmitted in longer blocks (1.25s peri-
between successive tones. As you can imagine, if one measure- od) and much better error detection is used. In addition, a
ment is in error, the next will be in error in the opposite direction scheme known as Memory ARQ allows data to be corrected by
- this is the main flaw with IFK. The receiver synchronises easily processing multiple corrupted versions of the same data.
because of the odd-even tone sets, and the order of the tone Compression techniques are used to reduce the number of bits
sets is determined by analysis of the received data. Domino has transmitted.
no error correction in its experimental form, and yet it is remark- A summary of the PACTOR specification is in Table 19.13 and
ably robust and forgiving. The ZL2AFP software is very easy to a spectrogram is in Fig 19.13.
use. Later versions PACTOR2 and PACTOR3 use PSK modulation on
The particular advantage of the IFK technique is much multiple carriers, and are considerably faster and more robust.
reduced sensitivity to drift and poor tuning. For example, The calling and linking functions retain the original PACTOR FSK
Domino can be received while the receiver is slowly tuned modulation mode for compatibility. It is important to appreciate
across the signal! Other similar modes with IFK coding and FEC that these are commercial and proprietary modes (not public
are likely to be developed in the future. domain) and therefore their amateur use may be prohibited or
restricted in some countries. A special hardware modem is
HF ARQ MODES required, and it is also not possible to "listen in" to a transmis-
These modes were developed to provide improved automatic sion in these modes.
operation on HF. When forwarding mail or in communication CLOVER II has a wide range of different modulation schemes,
with a bulletin-board system, it is important for communications but is best described as an orthogonal frequency division multi-
to be letter perfect, or the commands could be misinterpreted or plex (OFDM) system. There are four tone frequencies, each
data corrupted. Since these operations are invariably station to amplitude and phase modulated. Special hardware is required,
station and automated (rather than nets or broadcasts), an ARQ and the equipment can automatically switch between the avail-
mode is more appropriate. able modes in an attempt to provide best throughput. Clover
The first automated systems used AMTOR, which maintained uses Reed-Solomon FEC in addition to its ARQ system. The pro-
links well, but data rate was poor. Some also used HF (300 tocol is proprietary. It is not now used very widely.
baud) packet, which performed very poorly unless propagation Fig 19.14 shows a spectrogram of CLOVERII, and a summary
was perfect. Most systems now use commercial (and not inex- of the specification is in Table 19.8.
Of the ARQ modes, G-TOR is the most similar to AMTOR. It has
the same FSK modulation, but differs in using the ASCII charac-
ter set, and in the use of a very strong Golay FEC error correction
system, which transmits two differently coded versions of the
data. Requests for repeat are reduced because the system is
often able to reconstruct the data from the first transmission,
and if the second is required the ability to reconstruct the data
accurately is enhanced further. G-TOR is proprietary and only
available using suitably equipped hardware. Although a good
Fig 19.13: The PACTOR Spectrogram system, unfortunately G-TOR has never enjoyed wide popularity.
and deleted by the receiving station. The receiver will therefore When in the connected state either station may request a dis-
delete any 0 bit which follows five consecutive 1 bits that occur connection which occurs after an acknowledgement is received
between the flag fields. or if no response is received after several attempts.
Address field Packet Operation
The address field consists of the destination field, source field
and up to eight optional relay or digipeat stations. These fields Packet operation currently makes use of the HF, VHF, UHF and
usually contain callsigns and space is available for up to six SHF parts of the spectrum with both terrestrial and satellite links
characters per callsign with a seventh available as a secondary being utilised. In the early days, much packet operation was
station identifier (SSID). This allows up to 16 different packet real-time person-to-person operation, either direct or through a
radio stations to operate with one callsign. The default is an digipeater.
SSID of 0. For example, GM4AUP-0 could be the real-time sta- Most TNCs are capable of digipeat operation and this enables
tion, GM4AUP-2 could be a personal message system (PMS) and stations who cannot contact each other direct to do so by the on-
GM4AUP-4 could be a node station. The SSID byte in the digi- frequency retransmission of the digipeater. As packet became
peater address also contains information as to whether it is more popular the real-time operation tended to be replaced ter-
repeating a frame or not. restrially by store-and-forward systems such as nodes, although
there are Earth-orbiting digipeaters placed into operation peri-
Control field odically from amateur-radio equipped space stations.
The control field is used to identify the type of frame being trans-
mitted and the frame number. Digipeaters
Protocol identifier field Most TNCs can be used as a digipeater as this function is usu-
This field is contained within the information field and identifies ally contained within the AX.25 Level 2 firmware.
what, if any, network layer protocol is being used. Fig 19.18 shows how two stations A and D can connect to
each other using digipeaters B and C. In order for information to
Information field
be passed from station A to station D via the digipeaters B and
The information field contains the data to be transmitted and
C, the information frame must be received by station D and the
can contain any number of bytes, up to a maximum of 256, of
acknowledgement frame received by station A before a frame
information.
can be said to be successfully sent. Digipeaters B and C play no
Frame checksum field part in the acknowledgement process; they merely retransmit
The FCS is a 16-bit number calculated by the sender. On receipt any frames that contain their callsigns in the digipeat portion of
of a frame the receiving station calculates a FCS and compares the address field. If the acknowledgement is not received by sta-
it with that received in the FCS field. If the two match then the tion A then the frame is retried over the whole path. The use of
receiving station acknowledges the frame. digipeaters has reduced dramatically in recent years with the
advent of the network nodes.
AX.25 operation
As previously described, the TNC is the device which assembles Network Nodes
the data into frames as above. When first powered up, the TNC The network node significantly improved the packet radio sys-
is in a disconnected state and is monitoring traffic on the appro- tem as a means of communicating between packet-equipped
priate radio channel. stations in both real time and by the use of mailboxes. The major
In order to communicate with another station it is necessary advantage of a network node over a digipeater is that any frame
to enter the connected state. This is done by issuing a connect which is being transmitted is separately acknowledged between
frame which contains the callsign it is requesting connect status each individual element rather along the whole chain.
with as the addressee. If the other station is on the air it Fig 19.19 shows a system with station A trying to communi-
responds with an acknowledgement frame and the stations cate with station D via the nodes B and C. In trying to commu-
become connected. If no acknowledge frame is received the nicate with each other the information is sent from station A to
requesting station re-issues the command a pre-determined node B and acknowledged back to station A. Node B then pass-
time later and continues to do so until a preset number of tries es the frame on to node C and receives an acknowledgement
has taken place. If no connection is established the requesting back. Node C then passes the frame to station D who acknowl-
TNC issues a failure notification. edges it back to Node C. If anywhere in the path no acknowl-
Once a link is established the TNCs enter the connected or edgement is received then the frame is retried only over the
information transfer state and exchange information and super- part of the path for which no acknowledgement has been
visory frames. The control field contains information about the received.
number of the frame being sent and the number of the last one There are two types of network protocol in use - virtual-circuit
received (0 to 7). This allows both TNCs to know the current link and datagram. In the virtual-circuit protocol the appearance of a
status and which to repeat if necessary.
Fig 19.18: How two stations can connect to each other using Fig 19.19: How two stations can connect to each other using
digipeaters network nodes
direct connection between the two stations is provided. In order in use by all major DXpeditions. Some stations remain connect-
to establish communications a 'call set-up' packet is sent ed to the Cluster all the time and have an audio warning from
through the network to make a path to the other station. Once their PC to tell them about any DX that might be available.
this path is established information is sent through the circuit. Internet-based DX Clusters are commonly used as an alternative
Any packets sent do not have the full address of the required to radio-based DX Cluster connections.
path because the network attempts to maintain this path for the
duration of the contact. After the contact is completed the virtu- Satellite Communications
al circuit is cleared by removing the information on the path Using satellites for communications can be a very satisfying
along the network. An example of a virtual-circuit protocol is the achievement. There are several data satellites orbiting the
RATS Open System Environment (ROSE) developed by the Radio Earth. Using a dedicated set-up, it is possible to run an auto-
Amateur Telecommunications Society (RATS) of New Jersey. matic station to track, send and receive mail to several different
ROSE is a firmware replacement for TNC2 clones. The virtual-cir- satellites. Full duplex mode is used, and 9600 baud is the stan-
cuit protocol is not very common in the UK and most networking dard used. Packet signals have even been bounced off the
is done using the datagram protocol. Moon, although the distortion on that path prevents regular
In the datagram protocol each packet contains full network communication.
addressing and routing information. This enables a packet to More information can be found in the chapter on satellite
reach its destination via any route still open, regardless of how communication.
reliable the network may be. The network overhead is greater in
this protocol but it has much greater flexibility and the end user Packet Radio Bibilography
does not need to know the route, only the node nearest him and Further information can found from the following books and peri-
the node nearest the station with which he desires to connect. odicals:
Datagram protocols used in the UK are NET/ROM (and clones Your First Packet Station, Steve Jelly, G0WSJ, RSGB,
such as TheNET), TheNODE and Internet. 1996.
Packet Radio Primer, Dave Coomber, G8UYZ, and Martyn
TCP/IP Croft, G8NZU, RSGB, 2nd edition 1995.
The Internet protocol software was written by Phil Karn, KA9Q, NOSIntro, Ian Wade, G3NRW.
and is more commonly known as TCP/IP which is an acronym for AX.25 Link Layer Protocol, ARRL.
two protocols, the Internet Protocol (IP) and the Transmission
ARRL Handbook, ARRL.
Control Protocol (TCP).
In reality KA9Q's TCP/IP consists of a suite of individual pro- RadCom, the RSGB members’ magazine.
tocols, Address Resolution Protocol (ARP), File Transfer Protocol Information on licensing and policy matters with regard to
(FTP), Serial Line Transfer Protocol (SLIP), Simple Mail Transfer data communications is available from the chairman of the Data
Protocol (SMTP), Telnet Protocol, User Datagram Protocol (UDP) Communications Committee c/o RSGB, Lambda House, Potters
as well as TCP and IP. Bar, Hertfordshire EN6 3JE.
Each station using TCP/IP is a network node with a unique IP
address that has been assigned by the local IP address co-ordi- REFERENCES
nator. The amateur TCP/IP network has been assigned the net- [1] Comment made in conversation by Dr Gary Bold ZL1AN
work name AMPRNET and all amateur addresses commence [2] See http://www.sdradio.org/
with the two digits 44, followed by three digits indicating the [3] See http://web.usna.navy.mil/~bruninga/aprs.html
country code (as an example of a full address '44.131.5.2' is [4] See http://www.ka9q.net/
assigned to G3NRW). TCP/IP is becoming very popular in the UK [5] NOSIntro: TCP/IP over Packet Radio, Ian Wade, G3NRW,
and is said to offer many advantages over 'ordinary' AX.25. TAPR
[6] See http://www.ui-view.org/ and http://www.winpack.org.uk/
DX Clusters [7] The BARTG publish designs from time to time. See
A DX Cluster provides information on DX stations being http://www.bartg.demon.co.uk/
worked/heard along with information on QSL managers, WWV [8] Appendix D, Digital Modes for All Occasions, Murray
propagation and prefixes for example. The operation is not dis- Greenman ZL1BPU, RSGB
similar to mailbox operation but users stay connected to their [9] A table of the ITA2 character set is to be found in Digital
local DX Cluster for as long as they wish to receive announce- Modes for All Occasions, Murray Greenman ZL1BPU,
ments. The type of announcement the user receives is cus- RSGB
tomised to suit his own needs and can be used to select prefix [10] A table of this character set is to be found in Appendix B,
information, band information, mode information or a combina- Digital Modes for All Occasions, Murray Greenman
tion of all those. ZL1BPU, RSGB .
Each cluster is generally referred to as a cluster node and [11] See http://www.aintel.bi.ehu.es/psk31.html
these nodes can be connected together to each other via the [12] The technical details of PSK31 are explained in detail on
packet network. This enables an item of DX information (com- the PSK31 web site.
monly referred to as a spot) to propagated to all other cluster [13] Patent "Device for the electric transmission of written
nodes in the network, thereby in theory enabling all connected characters" received 1929.
users to see this spot in a short timeframe. [14] See www.qsl.net/zl1bpu/FUZZY/Contents.html
DX Cluster spots are quite common on virtually all contesting [15] More details can be found at http://www.qsl.net/zl1bpu/MT63
software, in lots of major SSB and CW contests, as well as being [16] See www.qsl.net/zl1bpu/MFSK