Antenna Handbook | Best Antennas, Free Calculators & Top Antenna Deals

Atmel's tinyAVR Microcontrollers

The tinyAVR series of microcontrollers comes in many flavors now. The number of input/output (I/O) pins ranges from 4 in the smallest series, ATtiny4/5/9/10, to 28 in ATtiny48/88. Some packages of ATtiny48/88 series have 24 I/O pins only. A widely used device is ATtinyl3, which has a total of eight pins, with two mandatory pins for power supply, leaving you with six I/O pins. That doesn't sound like much, but it turns out that a lot can be done even with these six I/O pins, even without having to use additional I/O expansion circuits.

From the table of tinyAVR devices presented later in this chapter, we have selected ATtinyl3, ATtiny25/45/85, and ATtiny261/461/861 for most of the projects. They represent the entire spectrum of Tiny devices. All of these devices have an onchip static random access memory (SRAM), an important requisite for programming these chips using C. Tiny 13 has just IK of program memory, while Tiny 861 and Tiny 85 have 8K. Tiny 13 and Tiny25/45/85 are pin-compatible, but the devices of latter series have more memory and features. Whenever the code doesn't fit in Tinyl3, it can be replaced with Tiny25/45/85, depending on memory requirements.


The projects that are planned for this book have a distinguishing feature: Almost all of them have fascinating visual appeal in the form of large LED-based displays. A new technique of interfacing a large number of LEDs using a relatively small number of I/O pins, called Charlieplexing, makes it possible to interface up to 20 LEDs using just five I/O pins. This technique has been used to create appealing graphical displays or to add a seven-segment type of readout to the projects. Other projects that do not have LED displays feature graphical LCDs.

Each project can be built over a weekend and can be used gainfully in the form of a toy or an instrument.

tinyAVR Devices

tinyAVR devices vary from one another in several ways, such as the number of I/O pins, memory sizes, package type like dual in-line package (DIP), small outline integrated circuit (SOIC) or micro lead frame (MLF), peripheral features, communication interfaces, etc. Figure 1-1 shows some tinyAVRs in DIP packaging, while Figure 1-2 shows some tinyAVRs in surface mount device (SMD) SOIC packaging. The complete list


of these devices is highly dynamic, as Atmel keeps adding newer devices to replace the older ones regularly. The latest changes can always be tracked on www.avrgenius.com/tinyavrl.

Most of these devices are organized in such a way that each member of the series varies from the others only in a few features, like memory size, etc. Some major series and devices of the tinyAVR family that are the main focus of this book have been summarized in Table 1 - 1 , and are shown in Figures 1-1 and 1-2.

If you see the datasheet of any device and find that its name is suffixed by "A," it implies that it belongs to the picoPower technology AVR microcontroller class and incorporates features to reduce the power consumption on the go.

tinyAVR Architecture

This section deals with the internal details of the Tiny devices. It may be noted that this section follows a generic approach to summarize the common features of the Tiny series. Certain
features may be missing from some devices, while some additional ones may be present. For more information on these features, refer to the datasheet of the individual devices.



Memory

The AVR architecture has two main memory spaces: the data memory and the program memory space. In addition, these devices feature an electrically erasable programmable read-only memory (EEPROM) memory for data storage. The Flash program memory is organized as a linear array of 16-bit-wide locations because all the AVR instructions are either 16 bits or 32 bits wide. The internal memory SRAM uses the same address space as that used by register file and I/O registers. The lowermost 32 addresses are taken by registers, the next 64 locations are taken by I/O registers, and then the SRAM addressing continues from location 0x60. The internal EEPROM is used for temporary nonvolatile data storage. The following illustration shows the memory map of Tiny controllers

I/O Ports

Input/Output (I/O) ports of AVR devices are comprised of individual I/O pins, which can be configured individually for either input or output. Apart from this, when the pin is declared as an input, there is an option to enable or disable the pull-up on it. Enabling the pull-up is necessary to read the sensors that don't give an electrical signal, like microswitches. Each output buffer has a sink and source capability of 40mA. So, the pin driver is strong enough to drive LED displays directly. All I/O pins also have protection diodes to both VCC and Ground. The following illustration shows the block diagram of the AVR I/O ports.



Timers


tinyAVR devices generally have eight-bit timers that can be clocked either synchronously or asynchronously. The synchronous clock sources include the device clock or its factors (the clock divided by a suitable prescaler), whereas asynchronous clock sources include the external clock or phase lock loop (PLL) clock, which goes up to 64 MHz. Some devices also include 10-bit or 16-bit timers. Besides counting, these timers also have compare units, which generate pulse width modulation on I/O pins. These timers can be run in various modes, like normal mode, capture mode, pulse width modulation (pwm) mode, clear timer on compare match, etc. Each timer has several interrupt sources associated with it, which are described in the next section on interrupts. The following illustration shows the block diagram of the AVR timer.




source : https://archive.org/details/TinyavrMicrocontrollerProjectsForTheEvilGenius.pdf/page/n23/mode/2up?view=theater


What's the best free antivirus software available for Windows?

Choosing the "best" free antivirus software for Windows depends on your specific needs and priorities, as each option has its strengths and weaknesses. Here are some top contenders:

For Overall Protection:

  • Bitdefender Antivirus Free: Offers excellent malware detection, real-time protection, and additional features like ransomware protection and safe browsing. It might nag you a bit to upgrade, but it's a powerful free option.


  • Avast One Essential: Provides good malware protection and real-time scanning, along with features like password manager and web browser extensions. However, it may install some unwanted additional software.


  • AVG Antivirus Free: A solid option with good malware detection and basic features like email protection and performance optimization. However, its interface can be cluttered and it might display some ads.

For Lightweight and Resource-Friendly:


  • Microsoft Defender Antivirus (built-in with Windows 10 and 11): Offers basic but effective protection against common threats. It's already integrated with your system, so it's lightweight and resource-friendly. However, it might lack some advanced features.
  • Malwarebytes Free: Primarily focuses on malware detection and removal, making it a good additional layer of protection alongside another antivirus. It's lightweight and has minimal impact on performance.

For Specific Features:

  • Panda Free Antivirus: Offers excellent parental controls and data protection features, making it a good choice for families.
  • ZoneAlarm Free Antivirus: Focuses on network security and firewall protection, making it ideal for users concerned about online privacy and hacking attempts.

Here are some additional factors to consider when choosing your free antivirus software:

  • User Reviews: Read reviews from other users to get a sense of the software's performance, features, and overall user experience.
  • System Requirements: Make sure the software is compatible with your operating system and hardware specifications.
  • Additional Features: Consider if you need specific features like ransomware protection, password manager, or parental controls.

Ultimately, the best free antivirus software for Windows is the one that meets your individual needs and preferences. I recommend trying out a few different options and comparing them before making a decision.

I hope this information helps you choose the right free antivirus software for your Windows system!

What is Dedicated Server Hosting ?

 Dedicated server hosting, also called dedicated hosting or just a dedicated server, is a type of web hosting where you rent an entire physical server, just for yourself, instead of sharing it with other websites. Think of it like having your own private apartment building instead of sharing an apartment complex with others.

Here's a breakdown of what dedicated server hosting entails:

Benefits:

  • Performance and control: You get all the server's resources (CPU, RAM, storage) dedicated to your needs, leading to faster loading times, smoother operation, and the ability to run demanding applications.
  • Security and privacy: Your data and software are isolated from other users, reducing the risk of security breaches and ensuring complete privacy for your operations.
  • Customization: You have full control over the server's configuration and software installations, allowing you to tailor it to your specific needs and preferences.
  • Scalability: While not as flexible as cloud hosting, you can still scale your dedicated server to a certain extent by adding more RAM, storage, or even additional dedicated servers.
  • Reliability: Dedicated servers offer high uptime and reliability thanks to their dedicated resources and data center environment.

Drawbacks:

  • Cost: Dedicated servers are significantly more expensive than shared or cloud hosting options.
  • Management: You're responsible for managing the server, including software updates, security patches, and backups. This can be time-consuming and require technical expertise.
  • Scalability limitations: Scaling dedicated servers beyond their initial configuration can be expensive and require downtime.

Who is dedicated server hosting for?

  • Websites with high traffic or resource requirements
  • Businesses needing high levels of security and privacy
  • Applications requiring specialized software or configurations
  • Companies with the technical expertise to manage a server
  • Anyone who wants the ultimate control and performance for their web hosting needs

Before choosing dedicated server hosting, ask yourself:

  • Do I need the performance and control it offers?
  • Can I afford the cost and manage the server?
  • Do I have the technical expertise or resources for server management?

If you answered yes to these questions, then dedicated server hosting might be the right choice for you. But if you're on a tight budget or don't need the advanced features, other options like shared or cloud hosting might be more suitable.

There are many dedicated server hosting services out there, each with its own strengths and focuses. To give you a better idea, let's explore examples from two different perspectives: budget-friendly and high-performance:

Budget-friendly dedicated servers:

  • DigitalOcean: Known for its affordable entry-level dedicated servers, starting around $49/month, with simple configurations and pay-as-you-go billing. Ideal for smaller websites or projects.
  • Vultr: Another budget-friendly option offering basic dedicated servers with a global network and easy-to-use control panel. Prices start around $65/month. Good for startups or low-traffic websites.
  • Hostwinds: A reliable provider with a range of dedicated server options starting at $79/month, including managed plans with server maintenance included. Great for businesses looking for affordability and support.

High-performance dedicated servers:

  • Liquid Web: A top-tier provider specializing in high-performance dedicated servers for demanding applications. Prices start around $299/month and include features like DDoS protection and 24/7 support. Ideal for mission-critical websites or resource-intensive applications.
  • OVH: Offers a wide range of dedicated servers, from entry-level to high-performance models, with global data centers and DDoS protection. Prices vary depending on configuration, starting around $179/month. Suitable for businesses needing scalability and global reach.
  • Leaseweb: Another top-tier provider known for its reliable and secure dedicated servers with high bandwidth and custom configurations. Prices are on the higher end, starting around $400/month, but offer premium features and support.

Remember: These are just a few examples, and the best dedicated server hosting service for you will depend on your specific needs and budget. Consider factors like:

  • Performance requirements: CPU, RAM, storage, and network bandwidth
  • Operating system choices: Linux, Windows, or custom options
  • Data center location: Proximity to your target audience
  • Management options: Managed or self-managed
  • Customer support: Availability and quality of support

I recommend researching and comparing different providers before making a decision. Many offer free trials or demos to test their services before committing.

cloud hosting vs dedicated server

 Choosing between cloud hosting and a dedicated server can be a tough decision. Both have their own advantages and disadvantages, and the best choice for you will depend on your specific needs.

Cloud hosting is a type of hosting where your website or application is hosted on a network of servers, rather than a single physical server. This means that your website or application can benefit from the scalability and reliability of the entire network.

Dedicated servers, on the other hand, are physical servers that are leased to a single customer. This means that you have complete control over the server and its resources, but you are also responsible for its maintenance and security.

Here is a table that compares and contrasts cloud hosting and dedicated servers:

FeatureCloud hostingDedicated server
CostGenerally less expensive than dedicated serversMore expensive than cloud hosting
ScalabilityEasy to scale up or down as neededCan be difficult to scale
ReliabilityMore reliable than a single server, but less reliable than a dedicated serverVery reliable
SecurityLess secure than a dedicated serverMore secure than cloud hosting
ControlLess control than a dedicated serverMore control than cloud hosting
MaintenanceNo need to manage the serverYou are responsible for managing the server


So, which is right for you?

If you are on a budget and need a scalable solution, then cloud hosting is a good option. If you need more control and security, or if you have a website or application with high traffic or resource requirements, then a dedicated server is a better option.

Here are some additional things to consider:

  • Your technical expertise: If you are not comfortable managing a server, then cloud hosting is a better option.
  • Your traffic levels: If you have a website or application with high traffic, then you will need a more powerful server.
  • Your security needs: If you need a high level of security, then a dedicated server is a better option.

I hope this information helps you decide whether cloud hosting or a dedicated server is right for you.

OSI Model

OSI Model 

The Open Systems Interconnection (OSI) model is a conceptual model that describes the universal standard of communication functions of a telecommunication system or computing system, without any regard to the system's underlying internal technology and specific protocol suites. The OSI model has seven layers described below, and helps: 

• Determine the required hardware and software to build their network. 

• Understand and communicate the process followed by components communicating across a network. 

• Perform troubleshooting, by identifying which network layer is causing an issue and focusing efforts on that layer.





Fiber Optic

Transmits data via light waves. Optical cable currently has the highest capacity and distance of any transmission medium.


Coaxial Cable

Coaxial Cable Transmits data over longer distances than other copper cables. Coax is most commonly used in cable TV networks.


Twisted Pair Cable

Commonly used for telephone and Ethernet. Usually seen inside houses 


Satellite 

Transmits data via radio waves through an orbiting satellite. Traditionally used for remote locations.  


Microwave 

Transmits data via radio waves over a clear line of sight


OSI Model – Data Link Layer L2 

The data link layer establishes and terminates a connection between two physically-connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts—Logical Link Control (LLC), which identifies network protocols, performs error checking and synchronizes frames, and Media Access Control (MAC) which uses MAC addresses to connect devices and define permissions to transmit and receive data.

Network Switch is the device associated to Data link Layer .

A network switch connects devices within a network and forwards data frames to and from those devices. Unlike a router, Layer 2 switch only understands communication with devices directly connected to it; Layer 2 has no concept of sources or destinations "farther away" on the network. Network switches can operate at either OSI layer 2 (the data link layer) or layer 3 (the network layer). Layer 2 switches forward data based on the destination MAC address. Layer 3 switches forward data based on the destination IP address, effectively making them routers. Some switches can do both, operating at both OSI layers 2 and 3.


OSI Model – Network Layer L3 

The network layer is responsible for the end-to-end delivery of data between the originating device and the final destination. Routers forward packets by discovering the best path across a physical networks. The network layer uses network addresses (typically Internet Protocol addresses) to route packets 


Network Router is the device associated to Network Layer 



A router is a device that connects two or more packet-switched networks or subnetworks. Routers manage traffic between these networks by forwarding data packets towards their intended destination IP addresses. In order to direct packets effectively, a router uses an internal routing table — a list of paths to various network destinations. The router reads a packet's header to determine where it is going, then consults the routing table to figure out the most efficient path to that destination. It then forwards the packet to the next network in the path.


Network and Connectivity

Network Topologies

The term network topology describes how devices are connected to each other within the network. It describes how many
connections each device has, in what order, and what sort of hierarchy. Typical network configurations include mesh
topology, ring topology, star topology, and tree topology. Each topology has a different level of fault tolerance. 


The topology in each node is directly connected to some or all the other nodes present in the
network. This redundancy makes the network highly faulttolerant, but the escalated costs
may limit this topology to highly critical networks.High Redundancy



All network nodes are connected sequentially to a backbone, except that the backbone ends at the starting node, forming a ring. The failure of one node will result in changing the direction of the data traffic since the topology is Bi-directional . High Redundancy. 



A root node is connected to two or more sub-level nodes, which themselves are connected hierarchically to sub-level nodes. Physically.Medium Redundancy.




Also known as hub and spoke. All the nodes in the network are connected to a central device like a hub or switch via cables. Failure of individual nodes or cables does not necessarily create downtime in the network, but the failure of a central device can. Low Redundancy.


source : https://broadbandusa.ntia.doc.gov/sites/default/files/2022-12/Introduction_to_Broadband_and_High_Speed_Internet_FINAL_0.pdf

What is Dark Fiber ?

Dark fiber refers to optical fiber infrastructure that has not yet been lit (*lit fiber), meaning it is installed but is not yet being used (no data transmission). 

Dark fiber is rented by broadband providers who need to control their own network, so instead of leasing a service, they lease infrastructure that allows them to build their own network with their own equipment. 

Dark fiber gives clients the capacity to increase bandwidth as needed without paying any additional monthly costs and decreases dependence on carrier response times during events and for upgrades. 

 Dark fiber is usually priced per strand per mile for a set period. The dark fiber providers often offer their client the option of an indefeasible right of use (IRU)** which can range between 20 to 30 years, paid upfront along with annual payments for maintenance.

*Lit Fiber: This term is the opposite of dark fiber and refers to a fiber optic cable that is active and able to transmit data. ** Indefeasible Right of Use (IRU) : A contractual agreement (temporary ownership) of a portion of the capacity of a fiber optic cable.  

Symmetric vs Asymmetric for Upload and Download Data


Symmetrical Communication 

Symmetrical communication links are just as they sound. They have the same download and upload rates. For example, a 500/500 Mbps fiber Internet link offers download and upload speeds of 500 Mbps.


Asymmetrical Communication 

Asymmetrical communication links, on the other hand, do not have the same download/upload rates. For example, 25/3 denotes a download speed of 25 Mbps and an upload speed of 3 Mbps. Asymmetrical data communication can make more efficient use of bandwidth than symmetrical data flows, since generally, most users will download more data than they upload

Middle Mile & Last Mile Networks


Interconnected networks that transmit data between and across countries and continents.

Middle Mile The electronics and circuitry that carry a signal from interconnection points and aggregation facilities to a Central Office or Point of Presence. 

Last Mile The electronics and circuitry that deliver the Internet service to a household.

*Point of Presence(POP): Demarcation point, access point, or physical location at which two or more networks or communication devices share a connection. 

**Example of Middle Mile Aggregation Facility is An Internet Exchange Point (IXP), which is a physical location through which Internet infrastructure companies such as ISPs connect with each other.

 ***Example of Middle Mile Interconnect Facility is a Data Center, which is a facility responsible for driving Internet content delivery and managing network resources.

source : https://broadbandusa.ntia.doc.gov/sites/default/files/2022-12/Introduction_to_Broadband_and_High_Speed_Internet_FINAL_0.pdf

What is Broadband Internet ?

The term Broadband was introduced in the late 1990’s and it commonly refers to high-speed Internet access that is always on and faster than the traditional dial-up access (Maximum of 56kBits/s) 1. Broadband is accessed through various high-speed transmission technologies that allow the data to move faster.

High-Speed Internet is delivered with one of two Broadband technologies. The first technology is physical wire and cables to connect the networks to the Internet, and this is called Wired broadband (e.g., Fiber Optic Cable). The other is wireless technology (e.g., Cellular 5G), and it’s called Wireless Broadband. Each connection method is capable of providing high-speed Internet, but each differs in its own way.

The Federal Communications Commission (FCC) defines basic broadband as transmission speeds of at least 25 Mbps (megabits per second) downstream (from the Internet to the user’s computer) and 3 Mbps upstream (from the user’s computer to the Internet). Infrastructure Investment and Jobs Act (IIJA) defines underserved broadband as an Internet speed of less than 100 Mbps downstream and 20 Mbps upstream.

Broadband or High Speed Internet 

Broadband in telecommunication means a wide bandwidth which can transport multiple signals over a “broad” range of frequencies and support different internet traffic types, allowing multiple data streams to be sent at once.

High-speed Internet is a generic term used for Internet service that is faster than the average. Traditionally, the way to determine if a connection is high-speed is to test its ability to connect multiple devices simultaneously to allow streaming and access to modern applications.

In essence, the terms “Broadband” and “High-Speed Internet” are mostly interchangeable when the internet speeds are at the FCC standards, or higher (i.e., a minimum of 25Mbps for download & 3Mbps for upload).

Bandwidth 

Bandwidth determines the amount of information that can be transmitted across a given path in a given unit of time. In other words, bandwidth is the size of the medium used to transmit data. The larger the size the more data you can transfer. 

Bandwidth Analogy 

The best way to explain bandwidth is to use an analogy (See the figure below). Think of your bandwidth like a highway, and your data as cars that travel the same speed. The more lanes you have on the highway, the more cars can travel at a time – it will take 5 cars longer to get to their destination on a 1-lane road than it would on a 5-lane highway.


Throughput & Latency

Throughput 
The amount of a data that a system can transmit over a medium within a specified time. Measured in Megabits* per seconds (Mbps).


Latency 
Network latency, sometimes called lag, is the term used to describe delays in communication over a network. It is a measurement of the time it takes to send data and receive a response. * A binary digit (bit) is the minimum unit of binary information stored in a computer system. A bit can have only two states, on or off, which are commonly represented as ones and zeros.


Causes of Network Latency

Distance 
Latency can be caused by an excessive distance between the server/system making the request and the one that responds to it.

Bandwidth & Network Congestion Network 
congestion happened when there’s a lack of sufficient bandwidth to handle the existing amount of traffic, causing delays to the transmitted data and increasing latency.

Hardware Misconfigurations & Malfunctions 
The check of hardware operation & configuration can be crucial in detecting latency causes. Malfunctioning or misconfigured equipment can lead to mis-matched connections between systems, which can add latency. 

End-User issues 
Network problems might appear to be responsible for latency, but sometimes excessive latency is the result of the end-user device being low on memory or the processing power needed to respond in a reasonable timeframe.

Physical issues 
The physical medium used for communication (wires, fiber, wireless) can also be a source of latency. Cables can become damaged and wireless signal paths can become obstructed leading to loss of data or increased latency.


source : https://broadbandusa.ntia.doc.gov/sites/default/files/2022-12/Introduction_to_Broadband_and_High_Speed_Internet_FINAL_0.pdf

How does the Internet work ?



When an Internet user is trying to access a web site, the first thing the computer will initiate is a communication with the server hosting the website located in a data center by sending a request. 

This “request” is a data that will be translated to a series of 1s and 0s (computer language), then will be chopped into chunks called packets.

Each packet will be sent to the wi-fi router via either wireless or cable (ethernet), then eventually, will exit the router to the modem and then to the ISP fiber or coaxial network towards the data center location

The data center, which can be across town or across the world from the end-user, has the requested web page stored inside it. Once the server gets a request to access a particular website, the data flow starts. 


After exiting the modem, the packets that were converted from a digital signal to an analog signal will enter the ISP network, which is in most cases a large number of fiber optic cables that either buried underground (Buried Fiber) or attached to utility poles (Aerial Fiber). 

Each packet will then move through multiple ISP networks, routers and switches towards the final destination where the packets will be reassembled into a coherent message (The original request). 

The network will choose the optimum route for the packet to reach the server based on the distance, the links capacity, and other factors. 

A separate message will go back through the network to confirm a successful delivery and right after, the data flow between the user and the server is established.


source : https://broadbandusa.ntia.doc.gov/sites/default/files/2022-12/Introduction_to_Broadband_and_High_Speed_Internet_FINAL_0.pdf

Expansion Board Shield for ESP32 ESP 32 WROOM 30Pin BASE PLATE







SKU: KK4003


Description:
=================================
For those of you who want to simplify the connectivity of your ESP32 board with other peripherals. This base plate has expander pins for each ESP32 GPIO pin.

Using this Base Plate will make it easier for us to carry out prototyping or create projects using ESP32.

Specification:
=================================
- Base For ESP32 DOIT V1
- Expansion I/O
- Expansion Power Vcc/GND
- Power input: Type-C, Micro USB, DC Jack

- Dimensions: L4 x W2 x H1cm

Please order :)

Package :
=================================
- 1x I/O EXPANSION ESP32 SHIELD ESP32 DOIT V1 30P BASE PLATE EXTENSION


SKU: 3131/1543936687711141888/55