D-Star User's Meeting

Saturday, Mar 6 2010 Introductions Lets get to know one another Purpose Introduce new users to D-Star Refresh current users in procedures and practices

Help with radio programming including programming examples Explain D-Controller functions and command structure Explain Linking, Routing, Reflectors What IS D-Star? Digital Smart Technologies for Amateur Radio Developed jointly by the Japan Amateur Radio

League and ICOM beginning in 1999 Significant changes released in 2004 Defines two modes DD (Digital Data) High-speed digital data only on 1.2 GHz not in very wide use DV (Digital Voice) Voice (and a low-speed data channel) available on 2 m, 70 cm, and 23 cm

Well be discussing the DV mode Digital Voice Uses the AMBE CODEC, provided by Digital Voice Systems, Inc. Operates at 4800 bps 2400 bps for the voice channel 1200 bps for the Forward Error Correction

channel 1200 bps for the low-speed data channel Approximately 6.25 kHz occupied bandwidth a significant spectrum savings compared to 16 kHz occupied by a standard FM voice signal Advantages and Disadvantages Range is approximately the same as a

standard FM repeater, but with a difference Standard FM Repeater signals gradually degrade and get noisier with distance D-Star signals decode and sound fine until they drop off a cliff Marginal D-Star signals will R2D2 D-Star radios cost somewhat more than

comparable FM radios While an open standard, only ICOM is making D-Star equipment More Advantages and Disadvantages CODEC is proprietary this gives some people heartburn

Programming becomes more difficult You can link to any connected D-Star repeater in the world with simple commands Linking is currently Internet based, reducing reliability in the event of a disaster There are many more advantages and disadvantages, but well leave that for future discussions Current NC D-Star Repeaters

W4GSO Greensboro, NC 70 cm AK4EG Burlington, NC 2 m, 70 cm, 23 cm KR4RDU Carrboro, NC 70 cm KI4WXS Charlotte, NC 2 m, 70 cm, 23 cm KR4RAL Raleigh, NC 70 cm On To The Good Stuff OR How to USE that new D-Star radio!

Some Definitions to Start Off Repeater D-Controller Gateway D-Plus Reflector Linking Routing DV-Dongle DV-Access Point

Quick-Key Callsign Fields MyCall UrCall Repeater 1 Repeater 2 How to Make It All Work Think of it like layers

Normal FM repeater Frequency, Offset, maybe Tone D-Star repeater Frequency, Offset, ID (MyCall), Destination (UrCall), Repeater used (R1), Additional Repeater used (R2) All fields must be properly set to make it work like you want it to Some Examples

For regular day-to-day communications MyCall K4HC UrCall CQCQCQ R1 W4GSO**B R2 W4GSO**G This enables anything I transmit to pass to the Gateway this includes connected Dongles, Access Points, Repeaters and Reflectors

For local ONLY communications (e.g. dont want to interrupt conversations on a connected reflector) MyCall K4HC UrCall CQCQCQ R1 W4GSO**B R2 Blank or Not Use

My transmissions WILL NOT be passed to the Gateway will ONLY be heard on the local repeater Linking vs Routing Routing defined in the D-Star standard Linking defined by D-Plus Routing is more cumbersome Every station wishing to participate must alter

their settings to participate in Routing Linking requires a single command, then everyone set up for Gateway operation can participate Routing is blind you cant hear whats going on at the distant end For these reasons, Linking is normally preferred over Routing Routing A BRIEF Overview

Two types of Routing Callsign Routing (to a specific station) Source Routing (to a specific Repeater) One advantage of Callsign Routing is you dont need to know WHERE the called station is the call is routed to the last repeater where that station was heard (some delay in this)

Callsign Routing MyCall K4HC UrCall WG5Q R1 W4GSO**B R2 W4GSO**G Routed to last heard repeater/port WG5Q used To reply, WG5Q would need to alter his

settings (using one-touch reply) Source Routing MyCall K4HC UrCall /KR4RDUB R1 W4GSO**B R2 W4GSO**G Transmissions would output on the KR4RDU

Port B repeater To reply, a station would need to alter settings Note the port is in the 8th position Linking THE Preferred Way MyCall - Stays the same, all the time UrCall Normally CQCQCQ Also used to Link, Unlink, Callsign Route, Source Route, issue D-Plus and D-Controller

commands R1 Always the repeater and port you are talking into 8 digits R2 Used for Gateway and (future) RF port forwarding 8 digits Link Examples MyCall K4HC

UrCall REF017CL R1 W4GSO**B R2 W4GSO**G This will link the repeater to Reflector 17C Note L in the 8th position This is the only time the port is moved from the 8th position to the 7th position

Link Examples MyCall K4HC UrCall KR4RDUBL R1 W4GSO**B R2 W4GSO**G This will link W4GSO B to KR4RDU B Note no space between KR4RDU and B Note L for Link in position 8

Link Examples MyCall K4HC UrCall - *******U R1 W4GSO**B R2 W4GSO**G U in the 8th position This will Unlink from any repeater or reflector

Command Examples MyCall K4HC UrCall W4GSO**E R1 W4GSO**B R2 Not Use Echos from D-Controller Also shows BER (Bit Error Rate)

Command Examples MyCall K4HC UrCall W4GSO**E R1 W4GSO**B R2 W4GSO**G Echos from D-Plus Also shows BER Command Examples

MyCall K4HC UrCall W4GSO*S0 R1 W4GSO**B R2 Not Use SAVES a message for automatic playback Command Examples MyCall K4HC UrCall W4GSO*R0

R1 W4GSO**B R2 Not Use RECALLS (Plays) a recorded message Command Examples MyCall K4HC UrCall W4GSO*C0 R1 W4GSO**B R2 Not Use

CLEARS a recorded message Notes on Channel Memories More Programming Ideas Use Memory Banks for different areas Develop a naming convention that YOU understand

Buy the Software, and make or buy the cables your life will be much easier Questions? Thank You!

Recently Viewed Presentations

  • Presentation Title - Greater Houston STEPS

    Presentation Title - Greater Houston STEPS

    A gust of wind blew the plastic away from the building causing the brick/masonry spacers to fall 70' striking an employee FY09 Houston Investigations 1623 - EEs were to install steel truss that was being moved by hydraulic crane with...
  • Earth's Shape - Weebly

    Earth's Shape - Weebly

    Earth's Shape. The Earth is not a perfect sphere. Because of its rotation it is slightly fatter at the equator. This shape is known as an oblate sphere
  • Todays Agenda: UPDATES : - New Role in

    Todays Agenda: UPDATES : - New Role in

    - New Role in PS: Communications Director - New eProcurement suppliers & Catalog Improvements - Strategic Sourcing: Upcoming Projects & Projected Savings for 2011 ... Require Supplier Registration Form (SRF) for all new vendors in PAS. TIN matching with IRS.
  • Informed Decision Making for patients and doctors to produce ...

    Informed Decision Making for patients and doctors to produce ...

    Special thanks to Professor Sir Muir Gray,Professor Robert Lustig, Professor Simon Capewell, Professor Terence Stephenson, Professor Dame Sue Bailey, Dr Fiona Godlee and Professor Rita Redberg " Half of what you learn in medical school will be shown to be...
  • CONTEXTUAL, FLOW-BASED ACCESS CONTROL WITH SCALABLE HOST-BASED SDN

    CONTEXTUAL, FLOW-BASED ACCESS CONTROL WITH SCALABLE HOST-BASED SDN

    SDN & OpenFlow. SDNs, implemented using OpenFlow, provide a powerful, vendor-independent approach to managing complex networks with dynamic demands. SDN with OpenFlowprotocol allows a centralized controller to learn each time a new flow is created
  • How to get your belt. - Kyrene School District

    How to get your belt. - Kyrene School District

    Our school has lots to offer (2 syllables), we learn with lots of laughter. We hope you like adventure(2 syllables), Manitas family (Music Break) Neat 2. Sweet. 3 Down beat. (drum . T q) So get your cap (1 syllable)...
  • Financial Statements, Taxes and Cash Flow

    Financial Statements, Taxes and Cash Flow

    Financial Statements, Taxes, and Cash Flows * 2.* 2.* 2.* This provides a summary for the various cash flow calculations. It is a good place to refer back when working on cash flows in the capital budgeting section.
  • Mobile Device Security - Computer Science and Engineering

    Mobile Device Security - Computer Science and Engineering

    Mobile Device Security Adam C. Champion and Dong Xuan CSE 4471: Information Security ... third parties are cloud computing services TaintDroid cannot detect external data leakage 1 bit in tag for "network" Cannot track multiple external sources at once 12/84...