Return-Path: X-Spam-DCC: paranoid 1290; Body=2 Fuz1=2 Fuz2=2 X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on lipkowski.org X-Spam-Level: X-Spam-Status: No, score=-0.7 required=5.0 tests=BAYES_00,DNS_FROM_AHBL_RHSBL, RATWARE_GECKO_BUILD autolearn=no version=3.1.3 Received: from post.thorcom.com (post.thorcom.com [195.171.43.25]) by paranoid.lipkowski.org (8.13.7/8.13.7) with ESMTP id u11IJKoN001448 for ; Mon, 1 Feb 2016 19:19:20 +0100 Received: from majordom by post.thorcom.com with local (Exim 4.14) id 1aQJ0p-0000sb-Pt for rs_out_1@blacksheep.org; Mon, 01 Feb 2016 18:15:43 +0000 Received: from [195.171.43.32] (helo=relay1.thorcom.net) by post.thorcom.com with esmtp (Exim 4.14) id 1aQJ0o-0000sS-GK for rsgb_lf_group@blacksheep.org; Mon, 01 Feb 2016 18:15:42 +0000 Received: from mtaout001-public.msg.strl.va.charter.net ([68.114.190.26]) by relay1.thorcom.net with esmtp (Exim 4.86) (envelope-from ) id 1aQIzj-0005QL-GV for rsgb_lf_group@blacksheep.org; Mon, 01 Feb 2016 18:15:41 +0000 Received: from impout003 ([68.114.189.18]) by mtaout001.msg.strl.va.charter.net (InterMail vM.9.00.021.00 201-2473-182) with ESMTP id <20160201181419.KRAZ11980.mtaout001.msg.strl.va.charter.net@impout003> for ; Mon, 1 Feb 2016 12:14:19 -0600 Received: from [192.168.1.100] ([68.118.229.27]) by impout003 with charter.net id D6EK1s0090c6mLs016EKZH; Mon, 01 Feb 2016 12:14:19 -0600 X-Authority-Analysis: v=2.1 cv=RcoeCjdv c=1 sm=1 tr=0 a=WLV0DKOOKFWiVcf2giHCRw==:117 a=WLV0DKOOKFWiVcf2giHCRw==:17 a=L9H7d07YOLsA:10 a=9cW_t1CCXrUA:10 a=s5jvgZ67dGcA:10 a=IkcTkHD0fZMA:10 a=Cns4n-K156WhLeReP4EA:9 a=QEXdDO2ut3YA:10 X-Auth-id: dzF0YWdAY2hhcnRlci5uZXQ= To: rsgb_lf_group@blacksheep.org References: From: John Andrews Message-ID: <56AFA07E.4040001@charter.net> Date: Mon, 1 Feb 2016 13:14:22 -0500 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: X-Scan-Signature: 118b9e608370528226a3c3b3aedcdda0 Subject: Re: LF: WOLF Coding Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-SA-Exim-Scanned: Yes Sender: owner-rsgb_lf_group@blacksheep.org Precedence: bulk Reply-To: rsgb_lf_group@blacksheep.org X-Listname: rsgb_lf_group X-SA-Exim-Rcpt-To: rs_out_1@blacksheep.org X-SA-Exim-Scanned: No; SAEximRunCond expanded to false X-Scanned-By: MIMEDefang 2.56 on 10.1.3.10 Status: O X-Status: X-Keywords: X-UID: 6606 Andy, WOLF interleaving hasn't changed since the very beginning. Markus has pointed out the source code location -- Wolf Buscher's GUI is a wrap-around for the core code created by Stewart Nelson. As Warren suggests, the WOLF and WOLF_GUI programs have a method of creating a file representing the 960 bits in the message. I have used that in a small transmitter at my other QTH to send a static text giving callsign and QTH. I simply brought the output file into the 8051 code as a look-up table, and step through it with 100ms interrupts from a divider chain. For the original Stewart Nelson program, the following instructions were given: "If you have a BPSK-capable beacon which uses an EEPROM to store its message, WOLF can generate a binary file suitable for programming the device. This mode is activated by supplying a negative argument to the 'n' option: C:\wolf>wolf -x "KK7KA RENO NV" -n -1 WOLF version 0.31 Wrote wolfx.bin, 961 bytes The wolfx.bin file has one byte for each bit to be transmitted, followed by a "reset" byte. The data is in the LSB (bit 0), and the reset function is in bit 1. You may need to convert the .bin file to a .hex for some programmers." DL4YHF carried all of the command-line parameters into the GUI version. If you call up his program with: WOLF_GUI -x "W1TAG HOLDEN MA" -n -1 you will get a wolfx.bin file in that directory, which you can use for beaconing. If you want to change the message "on the fly," then work from the DL4YHF version noted by Markus. John, W1TAG On 2/1/2016 12:18 PM, Andy Talbot wrote: > I'm contemplating writing some PIC code to encode WOLF (the software) > into a PIC to make a standalone beacon transmitter source. A generator > for the rate 1/6 32 constraint length convolutional code will fit into > a 16F628A chip without too much difficulty - I've already done it for > JT4 and WSPR; it just needs more parallel shift registers and less > message memory than those modes do. > > Looking back though the archives of various progs written over the > years, I found one written back in 2010 that generates the bit pattern > for a WOLF message. So back then, must have been thinking of doing > something with WOLF but it never got beyond a basic coder. To be able > to write that software I must have had the original source code by John > / team or Wolf (the operator!) for the mode, but can't find it. > > Also have a bit of a conundrum - in that software I provided the option > for interleaving the final data or not, but don't know if the current > Wolf GUI software implements interleaving or not. > > This is the interleaving code I wrote back then (PowerBasic language, > variables here are all long ints) but don't know if its currently > implemented in the latest versions > > IF interlv THEN > tempj = j > SHIFT RIGHT tempj , 3 > PTR = k * 80 + (j AND 7) * 10 + tempj + i * 2 > ELSE > PTR = k * 80 + j + i * 16 > END IF > outdata(PTR) = b > > > Is the WOLF source code available anywhere, and is interleaving > implemented? > > Also, is there an option somewhere to generate a file or even a screen > showing of the output bit pattern? > Short of actually running WolfGUI with a test message, recording the > output and comparing it with my generated sequence for the same message > it's difficult to know if my software gives the right answers. > > Andy G4JNT