Files
hpr-knowledge-base/hpr_transcripts/hpr4502.txt

119 lines
6.8 KiB
Plaintext
Raw Normal View History

Episode: 4502
Title: HPR4502: Cheap Yellow Display Project Part 3: Reverse beacon network
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr4502/hpr4502.mp3
Transcribed: 2025-11-22 15:07:29
---
This is Hacker Public Radio Episode 4,502 for Tuesday 4 November 2025.
Today's show is entitled, GPLO Display Project Part 3, Reverse Beacon Network.
It is hosted by Trey and is about 8 minutes long.
It carries a clean flag.
The summary is, learn about the Reverse Beacon Network and how it might be used with
the GPLO Display.
Hello again, this is Trey.
Welcome to Part 3 in my GPLO Display Project series.
You can find Part 1 in Episode 4472 and Part 2 in Episode 4488.
We previously left our handy hero searching for a solution to an amateur radio signal propagation
dilemma while he is trying to become proficient with Morse code.
The GPLO Display technology is simmering in the back of his brain and the answer in search
of a problem.
I love trying to create the feel of a vintage radio or television series with the intro
and outro of these episodes.
But I am by no means the hero.
I am simply Trey, a grumpy old man and a tinkerer.
Instead the real hero in this episode is Keith, V-E-S-V-Q, the shaky key on YouTube.
There's a link in the show notes.
So let's see, where were we?
Oh yes, I have been trying to learn Morse code.
That was me, tapping out CQ, CQ, and Morse code using the practice set I keep on my desk.
This consists of a set of code paddles connected to an Arduino Nano, which I built several
years ago based on what I learned watching Code Practice Oscillator, aka the three Arduino's.
On J.M. Harvey1947's YouTube channel.
And based on the code from his GitHub repository, and I'll post a link to that in the show notes.
I did need to make modifications both to support the Arduino Nano on which I chose to run
it and for my own sanity as the way that I learned to write code for Arduino is very different.
I focus on readability and flexibility.
You can see these changes on my own GitHub repository, and I'll post a link to that also
in the show notes.
Anyway, I have been studying, and I have been watching videos.
I have been practicing Morse code.
I might actually be learning some of this stuff.
If you are interested in more details about the resources I'm using, leave a comment for
this episode or drop me an email using the address in my profile, and I may record
an episode about it.
The result is that I have been learning, but also the Google and YouTube algorithms
have been learning about me.
They have started to feed me more videos about Morse code.
It is both helpful and super creepy at the same time.
So one day, when I opened YouTube, a title in my feed caught my eye.
News, CWop, use the reverse beacon network to improve your code.
A link is in the show notes.
I said to myself, self, this could be interesting.
I watched Keith's video and learned about the reverse beacon network.
Again, there's a link in the show notes.
According to their website, the reverse beacon network is a revolutionary new idea.
Instead of beacons actively transmitting signals, the reverse beacon network is a network
of stations listening to the bands and reporting what stations they hear, when, and how
well.
Let's pause for a second and discuss amateur radio beacons.
These are stations which repeatedly broadcast their identity on dedicated frequencies.
Other operators around the world who hear a beacon can evaluate the signal propagation
between their stations and the beacon location.
The reverse beacon network is just the opposite.
Here the station operator can transmit a test signal with their own call sign using
CW or other digital modes.
Then they can look at the reverse beacon network website to see which reverse beacon network
listening stations received their transmission and even get a signal report.
On the main page of the reverse beacon network, one can observe a world map with paths showing
where signals are received, where they originated based on the registered grid square of the
originating call sign.
The table displayed below the map reveals the sending and receiving call signs, their distance
apart in miles or kilometers, the frequency, the mode, the type of transmission, the signal
to noise ratio, the speed of the transmission, and the date and time using UTC.
I'm posting a picture of that page in the show notes.
This information is collected by a network of volunteer reverse beacon receiving stations
all over the world, which monitor various radio bands, decode transmissions of CW,
Morse code, RTTY, that's radio teletype, and PSK31 or PSK63.
These are digital modes.
These are digital modes of operation that use phase shift keying.
These receiving stations report what they receive as well as the signal strength back
into the reverse beacon network to be recorded and published over the internet.
Dave Kassler discussed the reverse beacon network back in 2016 on his YouTube video, the
ham radio reverse beacon network, an Ask Dave episode number 32, a link is in the show
notes.
This gives very good detail of how the network works.
This sounds like exactly what I've been looking for.
All I need to do is come up with a way to reliably, accurately, and consistently transmit
CQ, CQ, CQ, test, DE, followed by my call sign, three times at a consistent 20 words
per minute.
If I can do this a few times, I can then check the reverse beacon network to see where
I was received.
By including the test string, recipients know that I do not wish to start a conversation.
I can get accurate reporting of where my signal is going and how strong it is.
But remember, my Morris code skills are still inadequate.
And my radios do not have keyer memories like those which can be found in higher end transceivers
like the ICOM 7300.
to be programmed to be sent at the touch of a button.
But there is a fairly inexpensive solution to this problem, one which has been nagging
at the back of my mind for weeks.
Maybe, just maybe, I could use the cheap yellow display to effectively add keyer memory
to any of my radios by simply plugging it into the code key input port.
These stored messages could be transmitted by simply touching their specific ICOM on
the touch screen.
Now we have a plan.
But how will we do it?
What else will we need to learn?
Will it even work?
Well, tune in to the next episode in the series to find out the answers to some of these
questions and more.
Bye now.
You have been listening to Hacker Public Radio at HackerPublicRadio.org.
Today's show was contributed by a HPR listener like yourself.
If you ever thought of recording a podcast, then click on our contribute link to find
out how easy it really is.
Hosting for HPR has been kindly provided by an onsthost.com, the internet archive and
our syncs.net.
On this advice status, today's show is released on our Creative Commons Attribution 4.0 International
License.