各种插头的用途

各种插头的用途

点击数:20

发表在 资料 | 留下评论

List of WLAN channels

From Wikipedia, the free encyclopedia

This list of WLAN channels is the set of legally allowed wireless local area network channels using IEEE 802.11 protocols, mostly sold under the trademark WiFi. The 802.11 workgroup currently documents use in five distinct frequency ranges: 2.4 GHz, 3.6 GHz, 4.9 GHz, 5 GHz, and 5.9 GHz bands.[1] Each range is divided into a multitude of channels. Countries apply their own regulations to the allowable channels, allowed users and maximum power levels within these frequency ranges.allo

2.4 GHz (802.11b/g/n)

Graphical representation of 2.4 GHz band channels overlapping

Most countries

Graphical representation of Wireless LAN channels in 2.4 GHz band. Note “channel 3” in the 40MHz diagram above is often labelled with the 20MHz channel numbers “1+5” or “1” with “+ Upper” or “5” with “+ Lower” in router interfaces, and “11” as “9+13” or “9” with “+ Upper” or “13” with “+ Lower”

United States

Graphical representation of Wireless LAN channels in 2.4 GHz band. Note “channel 3” in the 40MHz diagram above is often labelled with the 20MHz channel numbers “1+5” or “1” with “+ Upper” or “5” with “+ Lower” in router interfaces.

There are 14 channels designated in the 2.4 GHz range spaced 5 MHz apart (with the exception of a 12 MHz spacing before channel 14).[2]

Note that for 802.11g/n it is not possible to guarantee orthogonal frequency-division multiplexing (OFDM) operation thus affecting the number of possible non-overlapping channels depending on radio operation.[3]

Interference concerns

As the protocol requires 16.25 to 22 MHz of channel separation (as shown above), adjacent channels overlap and will interfere with each other. Leaving 3 or 4 channels clear between used channels is recommended to avoid interference.[4] The exact spacing required depends on the protocol and data rate selected as well as the electromagnetic environment where the equipment is used.

When two or more 802.11b transmitters are operated in the same airspace, their signals must be attenuated by -50 dBr and/or separated by 22 MHz to prevent interference.[5] This is because the DSSS algorithm transmits data logarithmically along a 20 MHz bandwidth. The remaining 2 MHz gap is used as a guard band to allow sufficient attenuation along the edge channels.

Note: The 40 MHz bands in the diagram above are labelled with their centre channel numbers, but the management interface of many Wi-Fi devices labels one of these bands with the centre channel of one of the 20 MHz bands it overlaps plus an Up or Down notation to specify the other half of the band i.e. Channel 3 in the diagram is called Channel 1+Upper or Channel 5+Lower and Channel 11 in the diagram is called Channel 9+Upper or Channel 13+Lower.

Countries apply their own regulations to the allowable channels, allowed users and maximum power levels within these frequency ranges. Network operators should consult their local authorities as these regulations may be out of date as they are subject to change at any time. Most of the world will allow the first thirteen channels in the spectrum.

点击数:47

发表在 资料 | 留下评论

Windows 10: UUP to ISO – Create Bootable ISO from Windows 10 Build Upgrade Files

  Information
Since beginning of Windows Insider program we geeks have had a possibility to convert the ESD file of new upgrade build to an ISO image (tutorial). With it we could create DVD / USB install media to be used in clean, in-place and repair installs.

Since Windows 10 Insider Build 14986 Microsoft has started to use new Unified Update Platform(UUP), which no longer offers the install.esd file (read more in this post). Through some registry modifications users can at least for now disable UUP and get ESD version of the build upgrade, but it seems that this option might not be available in the future.

UUP is of course a positive change. It is differential, scanning user’s existing Windows 10 installation only downloading and installing those system files that have changed. In ESD upgrade full Windows system (all system files and native applications) were replaced, with the same file or app version even in case the new build did not include a newer updated version. Regardless if a system file, component or application was updated, ESD upgrade replaced it. This caused download size to be bigger, in addition to longer time required for upgrade because full Windows was downloaded and everything overwritten with every upgrade.

However, the possibility to create an ISO image is, has been and will be important to us Insiders. Microsoft has usually released an ISO when a build has been released to Insider Slow Ring, but weFast Ring users do need an option to create our own install media.

This tutorial will show how to do that, how to create an ISO image out of a UUP upgraded Windows 10.

Thanks to fellow geek and TF member @SIW2 for finding a working decrypter

warning   Warning
Notice please: When Windows Update has finished downloading the UUP upgrade, the files needed to make the ISO are stored in subfolders of C:\Windows\SoftwareDistribution\Download.

These files will in some cases be removed when upgrade is done. If you want to make an ISO for future needs, you have to do it before starting the upgrade process itself, after downloading the upgrade files but before clicking Restart now button!

 1: Download and install UUPtoISO application

1.1)
Download and run UUPtoISOSetup.exe (v2.2.1.0):

download

1.2) Installer is digitally signed, accept UAC prompt:
Name:  image.png
Views: 8699
Size:  88.2 KB

1.3) Accept license, select where to install (default: C.\UUPtoISO):
Name:  image.png
Views: 8733
Size:  163.9 KB

Name:  image.png
Views: 8721
Size:  130.2 KB

1.4) Select name of Start Menu group (or accept default). If you do not want any Start Menu group being created, selectDon’t create a Start Menu folder:
Name:  image.png
Views: 8734
Size:  149.1 KB

1.5) Select if you want a desktop shortcut or not:
Name:  image.png
Views: 8722
Size:  89.8 KB

1.6) Click Next to start setup:
Name:  image.png
Views: 8781
Size:  175.8 KB

1.7) If you don’t want to run UUPtoISO now, unselect Launch UUPtoISO. Click Finish to exit setup:
Name:  image.png
Views: 8733
Size:  167.7 KB

1.8) You will find UUPtoISO in Start > U > UUPtoISO. To uninstall go to Settings > Apps, select UUPtoISO, select Uninstall, or right click UUPtoISO in Start Menu and select Uninstall

1.9) See Quick Start.pdf for simple one page printable instructions. It can also be found in folder where you installedUUPtoISO.

 2: Find correct UUP upgrade folder

2.1)
Open File Explorer, browse to C:\Windows\SoftwareDistribution\Download folder. It contains several subfolders named with a long hexadecimal string.

2.2) In File Explorer, search for ext:esd to find all ESD files. Only one of the subfolders ofC:\Windows\SoftwareDistribution\Download contains ESD files (extension .esd). So called express UUP upgrade has only one ESD file, canonical UUP upgrades can have 10+ ESD files. Regardless of how many ESD files your search finds, they are all stored in same subfolder, the one containing necessary files to make an ISO image

Usually upgrades are differential (express) only containing one ESD file as in this example. Search for ESD files finds one file in folder staring with 5721f7. Right click it and select Open file location to open folder we need:
Click image for larger version. 

Name:	image.png 
Views:	281 
Size:	241.1 KB 
ID:	125281

In this example upgrade has been canonical containing 13 ESD files, all in same folder starting with a526e. Right click any of them and select Open file location:
Click image for larger version. 

Name:	image.png 
Views:	261 
Size:	86.7 KB 
ID:	116560

2.3) Right click File Explorer addressbar, select Copy address to copy path of UUP folder to clipboard:
Click image for larger version. 

Name:	image.png 
Views:	174 
Size:	189.7 KB 
ID:	125285

 3: Run UUPtoISO

3.1) Run UUPtoISO, right click to automatically paste the UUP folder path copied in step 2.3, press Enter to start. Main menu will be shown:
Click image for larger version. 

Name:	image.png 
Views:	182 
Size:	115.5 KB 
ID:	125284


3.2)
In main menu select 1 to make an ISO, select 2 to make an install.wim file, select 3 to see information about which build, edition, bit and language version your upgrade is:
Click image for larger version. 

Name:	image.png 
Views:	184 
Size:	101.8 KB 
ID:	125286

Note   Note
There is a bug in builds 16193 and 16199 preventing user to select an option in a script like this tool. All that happens when you press 1, 2 or 3 as told above is a loud beep sound.

If this happens to you, use the temporarily fix posted in this post.

I will remove this notice when Microsoft has fixed the bug in coming builds.

3.3) The information option (#3) is useful to check that ISO will be what you expect:
Click image for larger version. 

Name:	image.png 
Views:	187 
Size:	104.6 KB 
ID:	125287

Press any key to return to main menu

3.4) Press 1 or 2 depending on if you want to make an ISO image or install.wim ​file, the process starts. Be patient, it will take several minutes

Click image for larger version. 

Name:	image.png 
Views:	189 
Size:	314.2 KB 
ID:	125294

3.5) When done, ISO or install.wim can be found in folder where you installed UUPtoISO:
Click image for larger version. 

Name:	image.png 
Views:	158 
Size:	234.7 KB 
ID:	125295

That’s it. You can now start upgrade or repair install using your ISO. To clean install Windows 10, ISO must first be burned to a DVD or USB flash drive (tutorial)

Kari

UUPtoISO Changelog:

All versions using original UUP decrypter script (uup-converter-wimlib-5) by abbodi1406 and rgadguard at MDL.

  • Version 1. > Batch file decrypter
  • Version 2.0 > Added an installer
  • Version 2.1 > Batch compiled to an application (.exe)
  • Version 2.2 > Updated installer, shortened code by removing unnecessary elements, corrected some spelling in prompts shown to end user
  • Version 2.2.0.1 > Only one minor change, replaced a very pixelated low res Ten Forums logo in installer’s last prompt with a high res image
  • Version 2.2.1.0 > Current version, updated 16-MAR-2017. Fixed missing bit architecture in ISO name (x86, x64), added tutorial link to install folder, fixed some more typos

点击数:18

发表在 SYSTEM | 留下评论

BI4QZW_CQWW_2016_ssb_certificate

BI4QZW_CQWW_2016_ssb_certificate

点击数:24

发表在 Other, 相片 | 留下评论

HF20A短波无盲区天线

HF20A短波无盲区天线

一是商家出售的成品中一个金属封装的吸收电阻太过于神秘,阻止了部分DIYer,不知其为何物而无法仿制,二是1:9巴伦的制作或者购买,要么是快递费太贵,要么是缺东少西元件难以凑齐,无法开工。
  二、材料的准备(仅供参考,根据各人获取元件的渠道不同可选用不同的物料)
         1、0.4平方毫米多股铜芯线(由于是试验性质,考虑可能会不成功,所以选用的芯线较细,实际使用时可换成1.5-2.5平方毫米粗细)22米(买的整卷线100米35元);
         2、1:9巴伦1个(购买成品或自制,我是自制的,在网上购买磁环6元,快递费12元,防水盒4元快递费10元,接线柱1元,M座10元);
         3、水泥电阻500欧姆/50瓦1个(网上购买5元,快递费12元);
         4、300*200mm方形不锈钢管150mm1根(我找做防盗网的老板要的);
         5、不锈钢管堵头(我使用的是方形尼龙板298*198*100mm)2个(请好友加工的);
         6、十字形和一字形200mm木柄螺丝刀各1支(2元)。
    三、制作过程:
         1、将多股铜芯线分别取19米1段和1.5米2段作振子备用;
         2、将两个螺丝刀上木柄砸碎取下,在金属头部套M6螺纹作地锚备用;
         3、将水泥电阻放入不锈钢管中,注意导线与钢管的隔离防止短路,两端安装尼龙堵头,引线穿出尼龙板备用,注意用脱水或者螺钉固定堵头,防止使用时承受拉力而被破坏;
         4、连接振子、吸收电阻、巴伦和地锚,连接方法如下图一,到此完成。
         5、如果自制巴伦请参考下图二进行接线,注意两振子分别接在图右方的1和3接线端子上。
     四、使用体会:
         1、最大的优点是短波全段不用调整驻波,切换频率时不用反复调整振子长度或者使用天调;
         2、巴伦上线圈一般在7-11匝之间选取,确定匝数时要注意兼顾频率的低端和高端,防止出现一端驻波高而另一端驻波低的情况。我的是11匝,接假负载时没量驻波在1.5以下,十米波段驻波稍高;
         3、实际使用时驻波和地面土壤的潮湿程度有密切关系,与天线振子的架设高度有一定的关系;
         4、有无盲区或者盲区的大小与天线振子的高度有一定的关系,号称“无盲区”只是一种相对的概念;
         5、辐射效率略低于双极天线。
         6、接收时噪声稍低于双极天线,信号强度也稍低(未定量没是,只是估计值),收听与双极天线无明显区别。
       

点击数:37

发表在 DIY, Radio | 留下评论

2.5G 9DB和12DB全向结构图

点击数:20

发表在 资料 | 留下评论

FM图谱

点击数:26

发表在 资料 | 留下评论

比较HM-133手咪

比较HM-133手咪日本制造与中国制造

点击数:18

发表在 Radio, 资料 | 留下评论

海能达(hytera)不同设备之间信道互导

海能达(hytera)不同设备之间频率互导

本次测试 使用了 X1p 导入 PD980

注:导入的频率范围需要小于被导入否则出现部分失败
注:使用次方法复制会丢失 部分设置 模拟:信令 等 数字:发射联系人等
注:只能导入导出信道

1.  打开CPS 读取数据

 

2. 导出常规信道

3. 正常打开 报错直接点是

4. 正常显示出参数

5. 读取被导入机器信息 操作步骤一样 同样导出一份常规信道

6.机器参数信息

7.吧这个文件直接 另存为 一份Excel 97-2003*.xls 文件

8.打开保存并且不报错的 .XLS 文件 并 增加 宏

9.创建一个 宏

10.全选 删除

11.黏贴 宏脚本

Option Explicit

Public Sub AllInternalPasswords()

‘ Breaks worksheet and workbook structure passwords. Bob McCormick

‘ probably originator of base code algorithm modified for coverage

‘ of workbook structure / windows passwords and for multiple passwords

‘ Norman Harker and JE McGimpsey 27-Dec-2002 (Version 1.1)

‘ Modified 2003-Apr-04 by JEM: All msgs to constants, and

‘ eliminate one Exit Sub (Version 1.1.1)

‘ Reveals hashed passwords NOT original passwords

Const DBLSPACE As String = vbNewLine & vbNewLine

Const AUTHORS As String = DBLSPACE & vbNewLine & _

“Adapted from Bob McCormick base code by” & _

“Norman Harker and JE McGimpsey”

Const HEADER As String = “AllInternalPasswords User Message”

Const VERSION As String = DBLSPACE & “Version 1.1.1 2003-Apr-04”

Const REPBACK As String = DBLSPACE & “Please report failure ” & _

“to the microsoft.public.excel.programming newsgroup.”

Const ALLCLEAR As String = DBLSPACE & “The workbook should ” & _

“now be free of all password protection, so make sure you:” & _

DBLSPACE & “SAVE IT NOW!” & DBLSPACE & “and also” & _

DBLSPACE & “BACKUP!, BACKUP!!, BACKUP!!!” & _

DBLSPACE & “Also, remember that the password was ” & _

“put there for a reason. Don’t stuff up crucial formulas ” & _

“or data.” & DBLSPACE & “Access and use of some data ” & _

“may be an offense. If in doubt, don’t.”

Const MSGNOPWORDS1 As String = “There were no passwords on ” & _

“sheets, or workbook structure or windows.” & AUTHORS & VERSION

Const MSGNOPWORDS2 As String = “There was no protection to ” & _

“workbook structure or windows.” & DBLSPACE & _

“Proceeding to unprotect sheets.” & AUTHORS & VERSION

Const MSGTAKETIME As String = “After pressing OK button this ” & _

“will take some time.” & DBLSPACE & “Amount of time ” & _

“depends on how many different passwords, the ” & _

“passwords, and your computer’s specification.” & DBLSPACE & _

“Just be patient! Make me a coffee!” & AUTHORS & VERSION

Const MSGPWORDFOUND1 As String = “You had a Worksheet ” & _

“Structure or Windows Password set.” & DBLSPACE & _

“The password found was: ” & DBLSPACE & “$$” & DBLSPACE & _

“Note it down for potential future use in other workbooks by ” & _

“the same person who set this password.” & DBLSPACE & _

“Now to check and clear other passwords.” & AUTHORS & VERSION

Const MSGPWORDFOUND2 As String = “You had a Worksheet ” & _

“password set.” & DBLSPACE & “The password found was: ” & _

DBLSPACE & “$$” & DBLSPACE & “Note it down for potential ” & _

“future use in other workbooks by same person who ” & _

“set this password.” & DBLSPACE & “Now to check and clear ” & _

“other passwords.” & AUTHORS & VERSION

Const MSGONLYONE As String = “Only structure / windows ” & _

“protected with the password that was just found.” & _

ALLCLEAR & AUTHORS & VERSION & REPBACK

Dim w1 As Worksheet, w2 As Worksheet

Dim i As Integer, j As Integer, k As Integer, l As Integer

Dim m As Integer, n As Integer, i1 As Integer, i2 As Integer

Dim i3 As Integer, i4 As Integer, i5 As Integer, i6 As Integer

Dim PWord1 As String

Dim ShTag As Boolean, WinTag As Boolean

Application.ScreenUpdating = False

With ActiveWorkbook

WinTag = .ProtectStructure Or .ProtectWindows

End With

ShTag = False

For Each w1 In Worksheets

ShTag = ShTag Or w1.ProtectContents

Next w1

If Not ShTag And Not WinTag Then

MsgBox MSGNOPWORDS1, vbInformation, HEADER

Exit Sub

End If

MsgBox MSGTAKETIME, vbInformation, HEADER

If Not WinTag Then

MsgBox MSGNOPWORDS2, vbInformation, HEADER

Else

On Error Resume Next

Do ‘dummy do loop

For i = 65 To 66: For j = 65 To 66: For k = 65 To 66

For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66

For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66

For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126

With ActiveWorkbook

.Unprotect Chr(i) & Chr(j) & Chr(k) & _

Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _

Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)

If .ProtectStructure = False And _

.ProtectWindows = False Then

PWord1 = Chr(i) & Chr(j) & Chr(k) & Chr(l) & _

Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _

Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)

MsgBox Application.Substitute(MSGPWORDFOUND1, _

“$$”, PWord1), vbInformation, HEADER

Exit Do ‘Bypass all for…nexts

End If

End With

Next: Next: Next: Next: Next: Next

Next: Next: Next: Next: Next: Next

Loop Until True

On Error GoTo 0

End If

If WinTag And Not ShTag Then

MsgBox MSGONLYONE, vbInformation, HEADER

Exit Sub

End If

On Error Resume Next

For Each w1 In Worksheets

‘Attempt clearance with PWord1

w1.Unprotect PWord1

Next w1

On Error GoTo 0

ShTag = False

For Each w1 In Worksheets

‘Checks for all clear ShTag triggered to 1 if not.

ShTag = ShTag Or w1.ProtectContents

Next w1

If ShTag Then

For Each w1 In Worksheets

With w1

If .ProtectContents Then

On Error Resume Next

Do ‘Dummy do loop

For i = 65 To 66: For j = 65 To 66: For k = 65 To 66

For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66

For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66

For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126

.Unprotect Chr(i) & Chr(j) & Chr(k) & _

Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _

Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)

If Not .ProtectContents Then

PWord1 = Chr(i) & Chr(j) & Chr(k) & Chr(l) & _

Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _

Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)

MsgBox Application.Substitute(MSGPWORDFOUND2, _

“$$”, PWord1), vbInformation, HEADER

‘leverage finding Pword by trying on other sheets

For Each w2 In Worksheets

w2.Unprotect PWord1

Next w2

Exit Do ‘Bypass all for…nexts

End If

Next: Next: Next: Next: Next: Next

Next: Next: Next: Next: Next: Next

Loop Until True

On Error GoTo 0

End If

End With

Next w1

End If

MsgBox ALLCLEAR & AUTHORS & VERSION & REPBACK, vbInformation, HEADER

End Sub

12. 选中运行它 去除保护

12.再次保存 运行宏后文档保护被去除

13.打开 X1p 原始常规信道Xls 报错 无视 复制数字\模拟信道

 

14.全选Pd980数字\模拟 信道表 后粘贴 保存

 

15.打开PD980存档或读取机器数据 后选择 导入常规信道

16.数据复制完成

继续阅读

点击数:25

发表在 Radio | 留下评论

SMA 连接器

点击数:23

发表在 Radio, 资料 | 留下评论