RPM (The Radio Policy Manager) is the requirement put forward by the operator AT&T, which mainly contains the following aspects:
If the access request is rejected by NAS, or any domain of CS/PS domain is ignored by the network when the device is trying to connect the network, the "Network Access Management and Connection Management" can be used to protect the network.
The module can be restored to default settings to enhance the stability of modules if the device’s network access request failed or was rejected.
It is applied by AT&T and other operators, manufacturers who require RPM function.
This function can meet the requirements of AT&T and other operators requiring RPM function, protect the network of operators and enhance the stability of modules.
Users can enable RPM function and perform relevant parameter settings through AT commands.
The embedded TCP/IP protocol stack is applied to partition the application layer data into IP grouping data packets, and submit the received IP packets to the application layer after decapsulation, sorting and regrouping. In the meantime, it will provide AT commands of TCP/IP protocol interface, which can be used for the following functions, such as set up network connection parameters, activate the control module or disconnect PDP wireless data connection, enable/disable TCP/UDP connection with remote server, transmit/receive user data, and query the status of TCP/UDP connection, etc. In order to meet the communication requirements of users in multiple applications, the module is required to set up multiple TCP/UDP connections simultaneously.
With the booming of IOT technology, the wireless modules are not restricted to the application of Netbooks or laptops, but are gradually and widely used in information collecting, dispatch, telematics, remote measurement, remote control, positioning and navigation, etc. The wireless module can externally connect to various hosts, and establish high-speed wireless channel in connection with 3G network for those hosts. However, whether or not those hosts can access the Internet or communicate with other hosts in the Internet depends on whether or not they are equipped with TCP/IP protocol stack.
Above is the protocol stack of wireless module's Dial-up Internet Access. In the figure above, TE refers to the external host and MT refers to the wireless module. During the process of Dial-up Internet Access, application layer data partitioning, regrouping, IP packet data encapsulation and decapsulation are realized in TCP/IP protocol stack of the host. And the IP grouping data packets are transparently transmitted by the wireless module. Therefore, without TCP/IP protocol stack in the host, there is no way to access the Internet or communicate with other hosts in the Internet through the wireless channel provided by the wireless module. In order to solve this problem and make full use of the wireless channel provided by the wireless module, we have built in TCP/IP protocol stack inside the module.
The built-in TCP/IP protocol stack solves the problem of being unable to access the Internet when there is no TCP/IP protocol stack in the host. Users can send data to the Internet through a simple control module such as single-chip microcomputer. This is especially important to industry applications.
Through AT commands, users can set up/release the socket connection and transmit/ receive data, etc.
Network Lock is for the purpose of protecting the rights and interests of operators. In order to gain advantages in the competition with numerous operators, network lock is usually applied to terminals. After the network specified by operators is locked, the locked terminals can be used under the locked network only, and can't be used under the unlocked illegal network. Therefore Network Lock enables the terminals to be used under the legal network specified by operators.
SIM Card Lock is to lock the card used by terminals. Operators may impose restrictions on terminals to use the customized services when they release terminals based on their own network. You only need impose restrictions on the SIM card used by terminals if you want to restrict the network service on your mobile phone, since there is direct relationship between network service and SIM card. With SIM Card Lock technology, terminals can only use the SIM card specified by operators, while other SIM cards cannot be used.
Phone and SIM card Interlock enables the bundling of one phone and one SIM card, for example, Phone B which interlocks with SIM card A cannot use other SIM cards except SIM card A, and SIM card A cannot be used on other phones except Phone B.
Network Lock: Operators customize their specific functions on a batch of terminals, which means they have made an allowance for those terminals. In order to protect the interests of their own to the largest extent, those terminals cannot be used under other network. With this method Network Lock is achieved on terminals. SIM Card Lock: in order to promote their new business, which may bundle with newly-released SIM cards, operators will perform SIM Card Lock on terminals. The locked SIM cards can be used on the terminals while other SIM cards cannot be used. With this method, business promotion is realized.
Phone and SIM card Interlock: for users, Phone and SIM card Interlock can prevent their SIM card and phone from unauthorized use by others.
Network Lock: the ultimate purpose of this technology is to protect the interests of operators, for instance, to realize business expansion through commercial allowance of network locked terminals.
SIM Card Lock: it is convenient for operators to promote their specific business.
Phone and SIM card Interlock: it is used to protect the interests of subscribers. Subscribers can use their own SIM card on their own terminal, while others have no rights to use their SIM card and terminal.
ECALL technology, first put forward in Europe, is aimed at timely transmitting information, such as location of accidents, number of casualties, to the Emergency Center and providing first-aid service as soon as possible in case of vehicle accidents. Apart from ECALL system in Europe, the system “Tour buses, passenger buses and special-purpose vehicles” leaded by the State Council of PRC has also raised higher requirements on the safety of vehicles and people. It is expected that the communication module and positioning product can be integrated into the vehicle system, so that accidents location information can be acquired in order to provide first-aid service in case of accidents.
ECALL function integrates GPS technology and wireless communication technology (GSM/UTMS technology) into the communication box, and also integrates digital information into in-band modem technology of voice channel to monitor the status of vehicles. In case of collisions or other accidents, it will automatically transmit the onsite information promptly and accurately to the nearest Public Safety Answer Point (PSAP). And the operation personnel at the local service center will confirm the accurate location of accidents and arrange ambulances for emergency rescue.
In terms of ECALL system, the product reliability must be guaranteed. The product can still work normally after intense collisions. And it can support backup battery when the vehicle power supply stops working. Small-sized communication module is free from limitation of vehicle structure, which minimizes the collision impact caused to the module, and the wireless communication module must have extremely high sensitivity. M2M module plays a very important role in the whole linkage of vehicle-mounted electronic applications, as a bridge to connect the device sensor and the information service center. The vehicle-mounted application environment is very complicated, so it has raised higher and higher requirements on reliability, stability and high/low temperature.
In case of accidents, the built-in ECALL system will automatically or manually originate an emergency call to the local Public Safety Answering Point (PSAP) through the wireless network. Different from ordinary emergency calls, it adopts In-band signaling technology while establishing an emergency call, and transfers the vehicle data between In-vehicle System (IVS) of accident vehicles and the local PSAP. The data is called minimum set of data (MSD), which mainly contains location of vehicle, accident time, number of passengers, vehicle identification, etc.
The communication module and positioning product are integrated into the vehicle system to send the location and vehicle information to the Service Center in case of accidents, so that the Service Center can obtain the accident location at first time and provide emergency rescue.
Users can enable and control the ECALL function through AT commands.
SMS triggering mechanism has further expanded the module's SMS function and differentiate from the ordinary SMS through customized key words; it adopts SMS containing defined key words to trigger module actions, which can be defined and expanded.
It can be used for scenarios where the module is required to be controlled remotely via SMS.
It enables users to control and trigger the module's specific actions through SMS, such as device rebooting, debugging, enabling/disabling of SOCKET connection, inquiry and setup of GPIO status, and inquiry of module status, etc.
Users can enable and control the SMS triggering function through AT commands.
Modules, as the intermediate products, are more and more widely used in mobile products based on AP+BP structure, such as tablet PC and vehicle-mounted products, which require modules to provide basic wireless services like SMS, voice call, data function, etc. In those products, the basic application requirements on modules focus on remote wake-up function. Currently there are two methods to wake up modules:
1.Report information, wake up AP and then complete the touch screen action through the USB BUS.
2.In addition to USB interface, provide GPIO level wake-up interface (support GPIO wake-up method during hardware design); after receiving a text message or an incoming call in idle mode, the module will send out signals to AP through GPIO interface, and the AP will wake up each function in the upper layer after receiving the signals.
Remote wake-up methods based on GPIO include SMS wake-up and Call wake-up, and on the basis of this function it also supports Wake-up by any SMS, Wake-up by a specific SMS, Not Wake-up by SMS.
The ultimate bottleneck of current development of mobile products such as tablet PC, vehicle-mounted products is the problem of endurance. One important means for major manufacturers to improve the product competitiveness and selling points is to prolong the usage time of their products. In order to solve the problem of endurance for mobile terminals to the largest extent, we have developed the remote wake-up function, which provides Wake-up by any SMS, Wake-up by a specific SMS, Not Wake-up by SMS, Wake-up by any call, Wake-up by a specific call and Not Wake up by call, to make sure to wake up the host only when providing the above service; otherwise, it will stay in low battery mode to reduce power consumption and improve the endurance of products.
The Module provides three interfaces:
1.One interface for wake-up mode, toggle among Wake-up by any SMS, Wake-up by a specific SMS and Not Wake-up by SMS.
2.One interface for wake-up mode, toggle among Wake-up by any call, Wake-up by a specific call and Not Wake up by call.
3.One interface of setting a specific SMS header of Wake-up by a specific SMS;
4.One interface of setting a specific phone number of Wake-up by a specific call;
MBIM, shortly referred to as Mobile Broadband Interface Model, is a new interface standard put forward in November, 2011 by multiple USB/IF members including Intel, Microsoft etc. It is a kind of connection protocol based on USB host and device for desktop computers, laptop computers, tablet PC, and mobile devices. MBIM currently supports Win8, and will support Linux after version 3.8.
Ordinary users can directly connect it to the operating systems that support MBIM (e.g. Windows 8) after obtaining a mobile broadband device supporting MBIM. The operating system will automatically identify the mobile broadband device and provide the corresponding functional interface. Users only need to follow the relevant descriptions of the operating system to use all the functions of the mobile broadband device (such as data service, SMS, etc).
When a mobile broadband device supporting MBIM is connected to the operating system supporting MBIM, it can be directly used conveniently without installation of a driver. Comparing to the previous standards, MBIM has the following characteristics:
1.Support multiple IP connection through an independent USB interface;
2.Support implementation of flexible, highly-efficient and low cost devices;
3.Support implementation of power-friendly type in multiple operating systems;
4.Support implementation of mobile broadband drivers unrestricted by device in multiple operating systems including desktop computers, laptop computers, tablet PC, and mobile devices;
5.Substitution of troublesome control channel mechanism such as AT commands;
6.Elimination of needs for Ethernet header, minimization of costs and improvement of data transmission efficiency through the transmission of original IP frames.
Users can directly use the MBIM function through system UI.
The module will periodically monitor the OTA paging channel after entering the idle mode, and enter the sleep mode at the end of monitoring. It goes full circle. The large pulse current generated during the process of monitoring will result in rising up of standby average current and power consumption, therefore the standby time will be shortened when the module is powered by the battery. On some application occasions, MT calls are very rare because the application scenario of module is relatively special. In this case, we should properly adjust the monitoring pulse of DRX and reduce the number of pulses in unit time, in order to reduce the average current.
It is used for industry terminals requiring the external battery and concerning power consumption, such as power meter, tablet PC, etc.
It can greatly reduce the power consumption of modules.