Professional Documents
Culture Documents
PART 5B
Advanced
Automatic Radio Control System
(ARCS) / 3rd Generation Automatic
Link Establishment (3G ALE)
Date: 06/03/2014
Revision: 030
Rapid Mobile (Pty) Ltd
PO Box 121
Persequor Park
South Africa
0020
Building C, D, F2
Apex Corporate Park
Quintin Brand Street
Persequor Park
0020
e-mail: info@rapidm.com
www: www.rapidm.com
Document
RM-RAP1-0018DOC
Number:
Reference: RM-RAP1-0018DOC030.docx
Revision: 030
All rights reserved. No part of this publication may be reproduced or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, or by any other means or
media now known or to become known, without prior written permission from Rapid Mobile
(Pty) Ltd.
Control Protocol Definition Document
RM-RAP1-0018DOC
Proprietary
TABLE OF CONTENTS
1 Part 5 Overview ......................................................................................................... 4
1.1 Scope .................................................................................................................. 4
1.2 Overview ............................................................................................................. 5
1.3 Persistence .......................................................................................................... 5
2 ARCS Configuration Interface....................................................................................... 6
2.1 Network-Wide Configuration................................................................................... 6
2.1.1 Broadcast LDL Repeat Count ............................................................................ 6
2.2 Address List Configuration ..................................................................................... 7
2.2.1 LSU Subnet Table Delete .................................................................................. 7
2.2.2 LSU Subnet Table Size ..................................................................................... 7
2.2.3 LSU Subnet Table Entry ................................................................................... 8
2.2.4 Subnet Alias Lookup ........................................................................................ 9
2.2.5 LSU Group Table Delete ................................................................................... 9
2.2.6 LSU Group Table Size ...................................................................................... 9
2.2.7 LSU Group Table Entry................................................................................... 10
2.2.8 Group Alias Lookup ....................................................................................... 11
2.3 System Configuration .......................................................................................... 12
2.3.1 LSU Mode..................................................................................................... 12
2.3.2 FLSU Periodic LQA ......................................................................................... 13
2.3.3 Occupancy Detection Mode ............................................................................. 14
2.3.4 LBT Duration ................................................................................................ 15
2.3.5 Fixed Channel Mode ...................................................................................... 17
2.4 Packet Link Configuration .................................................................................... 18
2.4.1 xDL Max Missed ............................................................................................ 18
2.4.2 HDLP RxDropTimeout .................................................................................... 19
2.4.3 HDLP Packet Size .......................................................................................... 19
2.4.4 HDLP Constellation ........................................................................................ 20
2.4.5 Allow Incomplete Broadcast Packets ................................................................ 20
2.5 Permission Configuration ..................................................................................... 21
2.5.1 LSU Promiscuous Mode .................................................................................. 21
2.5.2 Accept Broadcast TOD Responses from Anyone ................................................. 22
2.6 Channel History Table Configuration ...................................................................... 23
2.6.1 Channel History Table Delete .......................................................................... 23
2.6.2 Channel History Table Add Entry ..................................................................... 23
2.6.3 Channel History Table Entry ........................................................................... 24
2.6.4 Channel History Table Current Size ................................................................. 24
2.6.5 Channel History Table Maximum Size .............................................................. 25
2.6.6 Channel History Deleted Indication .................................................................. 25
2.6.7 LQA Averaging Algorithm ............................................................................... 26
2.6.8 LQA Behaviour when LQA not received............................................................. 26
3 ARCS Control Interface ............................................................................................. 27
3.1 Packet Link Control ............................................................................................. 27
3.1.1 Packet-To-Circuit Request .............................................................................. 27
3.2 Packet Link Status & Indications ........................................................................... 28
3.2.1 Start of Message ........................................................................................... 28
3.2.2 End of Message ............................................................................................. 28
3.2.3 Packet-To-Circuit Result ................................................................................. 29
3.3 DTE Link Control ................................................................................................. 30
3.3.1 Voice Switch Request .................................................................................... 30
3.4 DTE Link Status & Indications............................................................................... 31
3.4.1 Voice Switch Result ....................................................................................... 31
1 P A R T 5 OV E RV I E W
1.1 S COPE
This document defines the 3G-ALE (S4538 ARCS) interface RapidM Application Protocol 1
(RAP1) messages
Part 1
RAP1 Common and Transport Protocols
Radio Control
TC4 Crypto
Telemetry
2G-ALE
V-05
1.2 O VERVIEW
All of the messages described in this document fall under one of the following interfaces:
1 5 6a 6b
ARCS ARCS ARCS ARCS
Configuration Control Packet Data DTE Data
Interface Interface Interface Interface
Remote Control Port
2a 3 4
Radio
Figure 2: Interfaces
1.3 P ERSISTENCE
Configuration persistence (saving to non-volatile memory, as well as loading from non-volatile
memory) shall be handled by the Management Information Base (MIB), if present. Any
configuration value which is to be persisted shall be identified in this document as either
normal-priority or high-priority. High-priority values, such as port configurations, shall be
persisted as soon as they are changed. Normal-priority values shall be persisted when
appropriate, so as to maximise the lifetime of the non-volatile memory.
2 A R C S C ON F I G U R A T I ON I N T E R F A C E
ATT EN T I O N
RapidM recommends the use of Groups rather than Subnets. Groups are less
restrictive than Subnets and they perform the same function. To avoid conflicts do
not configure the Subnet Table. Leave the Subnet Table empty (delete the Subnet
Table and do not add entries).
A subnet address may not be equal to any other existing subnet address, or to
any existing group address.
A subnet may not be empty.
All of the subnet members must belong to the same scan group.
None of the subnet members may belong to any other subnet.
ATT EN T I O N
A group address may not be equal to any other existing group address, or to any
existing subnet address.
A group may not be empty.
All of the group members must belong to the same scan group.
All of the group members must belong to the same subnet (i.e. the group belongs
to a subnet), or all of the group members must belong to the same network that
does not have any subnets (i.e. the group belongs to a network with no subnets).
It is important to note that using these messages might lead to unexpected behavior.
The get message requests the current settings of the automatic periodic execution of FLSU
LQA Sound or Exchange.
If the Occupancy Detection Mode is set to 1 (never), then occupancy detection will never be
done.
If the Occupancy Detection Mode is set to 2 (if-there-is-time), then occupancy detection will
be done if there is time. Asynchronous link setup will begin as soon as possible, irrespective
of when the call channel is scanned by the destination scan group. Therefore, occupancy
detection will be done on the call channel. If separate call and traffic channels are being used,
then occupancy detection will also be done on the traffic channel. Synchronous link setup
will begin the next time that the call channel is scanned by the destination scan group. If
there is time before the call channel is scanned by the destination scan group, then occupancy
detection will be done on the call channel. If there is time before occupancy detection is done
on the call channel, and only if separate call and traffic channels are being used, then
occupancy detection will also be done on the traffic channel.
If the Occupancy Detection Mode is set to 3 (always), then occupancy detection will always be
done. Asynchronous link setup will begin as soon as possible, irrespective of when the call
channel is scanned by the destination scan group. Therefore, occupancy detection will be done
on the call channel. If separate call and traffic channels are being used, then occupancy
detection will also be done on the traffic channel. Synchronous link setup will begin the next
time that the call channel is scanned by the destination scan group, after occupancy detection
has been done.
ATT EN T I O N
Occupancy detection is only done during link setup (if it is done at all).
Occupancy detection is never done during packet link renegotiation.
Scenario 3: No LBT.
Call Tune
At the start of every dwell, FLSU decides whether to scan, or whether to start the LBT
scenario. However, because LBT scenarios need to end at a specific time (~368 milliseconds
after the start of the call dwell), they seldom need to start on a dwell boundary.
The following figure illustrates that the first action of the LBT scenario (Traffic LBT or Call
Tune) will usually be allowed extra time.
LBT Scenario
The following figure illustrates that Call LBT will be allowed extra time if Call Tune completes
early:
Transmit Time
ATT EN T I O N
The local station will always scan on the fixed channel, while the rest of the
network will scan through the Scan List.
LQA links, whether for sounding or for exchange, will be rejected. This
applies to both incoming, as well as outgoing LQA links.
When making a call, if the Call Channel Selection Type is Next or Best, then
the fixed channel will always be selected.
When making a call, if the Call Channel Selection Type is Specified, then the
specified channel must be equal to the fixed channel.
When making a call, the Traffic Channel Selection Type must be Same.
When making a call, the link request will be sent when the destination next
scans on the call channel, not when the local station next scans on the call
channel.
It is important to note that using these messages might lead to unexpected behavior.
8 Max Missed ACKs NOTE: An LDL_ACK indicating that the LDL_DATA was not
received correctly, or an HDL_ACK/HDLP_ACK indicating that
NO HDL_DATA/HDLP_DATA was received correctly, is
considered missed.
If the receiver does not allow incomplete broadcast packets, then it will not pass an
incomplete broadcast packet to the user.
If the receiver does allow incomplete broadcast packets, then it will pass an incomplete
broadcast packet to the user (provided that the first fragment is not missing). Each missing
fragment will be replaced with an equal number of zeros.
It is important to note that using these messages might lead to unexpected behavior.
If the Link Setup Promiscuous Mode is Disabled, then an outgoing point-to-point call will only
be allowed to an address in the Address Table.
If the Link Setup Promiscuous Mode is Disabled, then an incoming call will only be accepted
from an address in the Address Table.
If the Link Setup Promiscuous Mode is Enabled, then an outgoing point-to-point call will be
allowed to any address. If the address is not in the Address Table, then the caller will use its
own Network Address, Link Protection Key and/or Scan Group when making the call.
If the Link Setup Promiscuous Mode is Enabled, then an incoming call will be allowed from any
address.
It is important to note that using these messages might lead to unexpected behavior.
This message should preferably be used to populate the Channel History Table upon start-up.
It is recommended that the Channel History table be deleted before the table is populated.
When an entry in the Channel History Table is changed/added through LQA information that
was received, a Set-Indication shall be generated and the Process containing the MIB must
have registered for this Set-Indication in order to receive the updated information. This
message shall also serve as the Set-Indication when a Channel History Table Entry is changed
due to new LQA information that was received.
3 A R C S C ON T R O L I N T E R F A C E
It is important to note that using these messages might lead to unexpected behavior.
It is important to note that using these messages might lead to unexpected behavior.
It is important to note that using these messages might lead to unexpected behavior.
It is important to note that using these messages might lead to unexpected behavior.