Bufferbloat, The Internet, And How To Fix It

There’s a dreaded disease that’s plagued Internet Service Providers for years. OK, there’s probably several diseases, but today we’re talking about bufferbloat. What it is, how to test for it, and finally what you can do about it. Oh, and a huge shout-out to all the folks working on this problem. Many programmers and engineers, like Vint Cerf, Dave Taht, Jim Gettys, and many more have cracked this nut for our collective benefit.

When your computer sends a TCP/IP packet to another host on the Internet, that packet routes through your computer, through the network card, through a switch, through your router, through an ISP modem, through a couple ISP routers, and then finally through some very large routers on its way to the datacenter. Or maybe through that convoluted chain of devices in reverse, to arrive at another desktop. It’s amazing that the whole thing works at all, really. Each of those hops represents another place for things to go wrong. And if something really goes wrong, you know it right away. Pages suddenly won’t load. Your VoIP calls get cut off, or have drop-outs. It’s pretty easy to spot a broken connection, even if finding and fixing it isn’t so trivial.

That’s an obvious problem. What if you have a non-obvious problem? Sites load, but just a little slower than it seems like they used to. You know how to use a command line, so you try a ping test. Huh, 15.0 ms off to Google.com. Let it run for a hundred packets, and essentially no packet loss. But something’s just not right. When someone else is streaming a movie, or a machine is pushing a backup up to a remote server, it all falls apart. That’s bufferbloat, and it’s actually really easy to do a simple test to detect it. Run a speed test, and run a ping test while your connection is being saturated. If your latency under load goes through the roof, you likely have bufferbloat. There are even a few of the big speed test sites that now offer bufferbloat tests. But first, some history. Continue reading “Bufferbloat, The Internet, And How To Fix It”

Coils In The Road Could Charge EVs While Driving

One of the primary issues with EVs is that you need to pull over and stop to get a charge. If there isn’t a high-speed DC charger available, this can mean waiting for hours while your battery tops up.

It’s been the major bugbear of electric vehicles since they started hitting the road in real numbers. However, a new wireless charging setup could allow you to juice up on the go.

Electric Highways

Over the years, many proposals have been made to power or charge electric vehicles as they drive down the road. Many are similar to the way we commonly charge phones these days, using inductive power transfer via magnetic coils. The theory is simple. Power is delivered to coils in the roadway, and then picked up via induction by a coil on the moving vehicle.

Taking these ideas from concept into reality is difficult, though. When it comes to charging an electric vehicle, huge power levels are required, in the range of tens to hundreds of kilowatts. And, while a phone can sit neatly on top of a charging pad, EVs typically require a fair bit of ground clearance for safely navigating the road. Plus, since cars move at quite a rapid pace, an inductive charging system that could handle this dynamic condition would require huge numbers of coils buried repeatedly into the road bed. Continue reading “Coils In The Road Could Charge EVs While Driving”

Why Do Brits Drink Warm Beer?

Traveling through mainland Europe on a British passport leads you to several predictable conversations. There’s Marmite of course, then all the fun of the Brexit fair, and finally on a more serious note, beer. You see, I didn’t know this, but after decades of quaffing fine ales, I’m told we do it wrong because we drink our beer warm. “Warm?”, I say, thinking of a cooling glass of my local Old Hooky which is anything but warm when served in an Oxfordshire village pub, to receive the reply that they drink their beers cold. A bit of international deciphering later it emerges that “warm” is what I’d refer to as “cold”, or in fact “room temperature”, while “cold” in their parlance means “refrigerated”, or as I’d say it: “Too cold to taste anything”. Mild humour aside there’s clearly something afoot, so it’s time to get to the bottom of all this. Continue reading “Why Do Brits Drink Warm Beer?”

What Goes Into A Hacker Camp

Long-time readers of Hackaday will know that we attend quite a few events, including summer hacker camps. Here in Europe this year there are two large events, the British Electromagnetic Field, and the Dutch MCH, or May Contain Hackers. These events are put together by volunteers from within the community, and as part of the MCH setup I noticed they needed drivers for their off-site logistics. I have a licence to drive medium-sized trucks in Europe so it seemed like a perfect fit. I traveled early on the first set-up day to the Dutch city of Utrecht, and found myself behind the wheel of a large Volkswagen box van. My brief career as a trucker had begun!

An Empty Field Of Dreams

A field with a few tents and a blue sky
The tents stand in isolation at the end of day one.

The Netherlands is a relatively small country and the MCH site at Zeewolde is roughly in its centre, so while the traffic could be heavy the distances weren’t large by American or even British standards. There were however a wide variety of loads waiting for me and my fellow driver, and a few obstacles such as the hottest days of the year and angry Dutch farmers blockading the roads. If you’re interested in the logistics behind a large hacker camp then our journeys provided an insight that maybe wandering around the field doesn’t quite deliver.

Arriving on site on the first day gives a perspective on how much of the infrastructure comes from specialist contractors and thus isn’t delivered by the hackers. Articulated trucks from the marquee company were disgorging the main tents, with their crews expertly assembling them in record time. The toilets and showers were arriving as self-contained hook lift container units, and yet more contractors were delivering fencing or tables and chairs. I can add the power infrastructure to this list, but due I’m told to delays at another event this wasn’t on site on the first day. Continue reading “What Goes Into A Hacker Camp”

Books You Should Read: The Hardware Hacker’s Handbook

Here on Hackaday, we routinely cover wonderful informative writeups on different areas of hardware hacking, and we even have our own university with courses that delve into topics one by one. I’ve had my own fair share of materials I’ve learned theory and practical aspects from over the years I’ve been hacking – as it stands, for over thirteen years. When such materials weren’t available on any particular topic, I’d go through hundreds of forum pages trawling for details on a specific topic, or spend hours fighting with an intricacy that everyone else considered obvious.

Today, I’d like to highlight one of the most complete introductions to hardware hacking I’ve seen so far – from overall principles to technical details, spanning all levels of complexity, uniting theory and practice. This is The Hardware Hacking Handbook, by Jasper van Woudenberg and Colin O’Flynn. Across four hundred pages, you will find as complete of an introduction to subverting hardware as there is. None of the nuances are considered to be self-evident; instead, this book works to fill any gaps you might have, finding words to explain every relevant concept on levels from high to low.

Apart from the overall hardware hacking principles and examples, this book focuses on the areas of fault injection and power analysis – underappreciated areas of hardware security that you’d stand to learn, given that these two practices give you superpowers when it comes to taking control of hardware. It makes sense, since these areas are the focus of [Colin]’s and [Jasper]’s research, and they’re able to provide you something you wouldn’t learn elsewhere. You’d do well with a ChipWhisperer in hand if you wanted to repeat some of the things this book shows, but it’s not a requirement. For a start, the book’s theory of hardware hacking is something you would benefit from either way. Continue reading “Books You Should Read: The Hardware Hacker’s Handbook”

Maximum Power Point Tracking: Optimizing Solar Panels

When looking at integrating a photovoltaic solar panel into a project, the naive assumption would be that you simply point the panel into the general direction of where the Sun is, and out comes gobs of clean DC power, ready to be used for charging a battery. To a certain extent this assumption is correct, but feeding a solar panel’s output into something like a regular old PWM buck or boost regulator is unlikely to get you anywhere close to the panel’s full specifications.

The keywords here are ‘maximum power point’ (MPP), which refers to the optimal point on the solar panel’s I-V curve. This is a property that’s important not only with photovoltaics, but also with wind turbines and other highly variable power sources. The tracking of this maximum power point is what is generally referred to as ‘MPPT‘, but within this one acronym many different algorithms are covered, each with its own advantages and disadvantages. In this article we’ll take a look at what these MPPT algorithms are, and when you would want to pick a particular one.

Continue reading “Maximum Power Point Tracking: Optimizing Solar Panels”

Dead Spider Becomes Robot Gripper: It’s Necrobotics!

Robot arms and grippers do important work every hour of every day. They’re used in production lines around the world, toiling virtually ceaselessly outside of their designated maintenance windows.

They’re typically built out of steel, and powered by brawny hydraulic systems. However, some scientists have gone for a smaller scale approach that may horrify the squeamish. They’ve figured out how to turn a dead spider into a useful robotic gripper.

The name of this new Frankensteinian field? Why, it’s necrobotics, of course!

Continue reading “Dead Spider Becomes Robot Gripper: It’s Necrobotics!”