Tetrapol has a cool feature that helps set up location apps.
Thanks to a Tetrapol feature known as DDCH, dispatchers can keep track of field personnel with extra convenient location updates. This feature helps in two location apps:
A Tetrapol feature known as DDCH lets radio terminals send regular updates to the network - efficiently, conveniently, and reliably.
In other words, radio terminals can exchange small data messages with the system while continuing with their current operations.
For these small data messages, the system uses a specific radio channel known as the Dedicated Data CHannel (DDCH). Short messages of nine bytes in length move on this channel, and it does not matter if the radio terminal is in communication or on the control channel.
Let's say that a dispatcher wants to see the field personnel's locations on a map.
The dispatchers can decide how often the location updates run. They can also change the update frequency for a vehicle in pursuit of a suspect, for example.
The staff only need to decide their priorities and requirements: together with the AVL solution, the Tetrapol DDCH feature will manage the location updates.
The Tetrapol radio needs a GPS receiver: a connection to one or an embedded receiver.
The radio will automatically ask the AVL server for a data transmission configuration. This commits the radio terminal to communicate with the AVL server periodically, to transmit its position at certain intervals. For example, a pedestrian radio would update its location every four minutes and a vehicle radio every 30 seconds. When needed, the radio in a vehicle giving chase would update its position every few seconds.
The radio terminal requests that the network assigns a dedicated time slot in the DDCH for it. Using the time slot, the radio can decide to send its position on its own, without network intervention. This avoids the classic data exchange and handshaking that occur whenever a radio wants to send data to a server.
The network will dedicate a time slot for this terminal. It will choose an available time slot according to the update interval.
The network can support up to three DDCH per base station cell.
The data messaging related to AVL is extremely efficient thanks to the use of DDCH.
When the radio roams to another base station cell, the network will automatically dedicate a new time slot from the new cell for the radio. No action from the radio user or control centre personnel is required.
If the new base station cell has no DDCH time slots left, the radio will ask the network to use the back-up data sending mode. In other words, the radio and the network exchange the standard data messages and handshakes. This is not as efficient as the use of DDCH but the location updates from the radio continue to arrive.
Using the DDCH does not limit to location updates. It can be used for every type of data. The example describes how DDCH works in an AVL scenario – monitoring the changing location of a radio. It could also be used for other applications, such as:
Location apps and other data applications can really become easier thanks to Tetrapol’s DDCH feature.
Eine Notruftaste ist unabdingbar für die Funkgeräte von Einsatzkräften. Aber wussten Sie schon, wie viele nützliche Funktionen sich für die rote Taste der TETRA-Endgeräte von Airbus programmieren lassen?
Tips para mantener comunicaciones discretas en la policía.
The new TPH900 has advanced features that help officers do their jobs more easily and safely.
Today’s mobile professionals cannot afford to waste time worrying about running into communication blind spots. But how do professional network planners determine whether a network can deliver complete coverage?
Five tips for using the red key.
Using TETRA in hospitals can bring great benefits, states Tomi Pekkonen, Manager for Social and Healthcare VIRVE network, Hospital district of Helsinki and Uusimaa (Finland).
Tips for accessing functions and folders with the tactical button.
Choosing a digital radio network to suit the way you work may seem daunting, but the task can be broken down into five key requirements. It should not disrupt your operations, should be secure, bring new efficiencies, be supported by many suppliers and come from a vendor who can deliver the solution you need.