MXPA99004161A - Cellular telephone communication protocol - Google Patents

Cellular telephone communication protocol

Info

Publication number
MXPA99004161A
MXPA99004161A MXPA/A/1999/004161A MX9904161A MXPA99004161A MX PA99004161 A MXPA99004161 A MX PA99004161A MX 9904161 A MX9904161 A MX 9904161A MX PA99004161 A MXPA99004161 A MX PA99004161A
Authority
MX
Mexico
Prior art keywords
location
data
bite
clause
burst
Prior art date
Application number
MXPA/A/1999/004161A
Other languages
Spanish (es)
Inventor
M Herring Russell
Original Assignee
Atx Research Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Atx Research Inc filed Critical Atx Research Inc
Publication of MXPA99004161A publication Critical patent/MXPA99004161A/en

Links

Abstract

A cellular telephone communication protocol enables a communication link primarily for the transmission of voice and data. At predetermined intervals an on-demand data regarding location, an event, or a condition is sent by muting the voice audio and sending a data frame having a pre-determined sequence. Following the transmission of the location, event, or condition data transmission of voice and data is resumed. The communication link uses a half duplex, frequency shift, keying modulation technique.

Description

PROTOCOL OF CELLULAR TELEPHONE COMMUNICATIONS CROSS REFERENCE TO RELATED REQUESTS This application claims priority of the provisional application of the United States of America 60 / 029.72 filed on November 8, 1996.
FIELD OF THE INVENTION The present invention relates to cell phone communication systems; more particularly, the present invention relates to a communication method protocol for a data / video communication link between a vehicle and a remotely located monitoring station or monitoring center.
BACKGROUND OF THE INVENTION With the rapid expansion in the use of cell phone communications systems in the United States of America, it is not uncommon to find vehicles equipped with a cell phone communication system. Such vehicle-mounted cell phone communication systems are not only used for voice communication between the vehicle operator and a remote monitoring system, but are also used to provide data describing vehicle location, data in relationship to events that occur in the vehicle and data that describe the condition of the vehicle for the remote monitoring station. Such data may include the latitude and length of the vehicle, the condition of the condition of any of the numerous operating systems which reside on a motor vehicle and the occurrence of an event such as vehicle rob, fire of the vehicle, accident or alarm condition such as a medical emergency, perceived by the driver.
When a cellular telephone communication system is used to provide the location of the vehicle, the location is normally provided by the use of signals transmitted by one or more orbiting satellites. Such orbiting satellites are part of a global positioning system (GPS). The signals received by the vehicle from the global positioning system satellites are translated by means of a tracking module mounted on the vehicle. The tracking module converts signals received from one or more orbiting global positioning system satellites to latitude longitude data. In addition to the transmission of location data, there is a critical need to ensure that voice communication between an operator and the remote monitoring station and the occupants of the vehicle is not greatly impaired by the transmission of the data.
Therefore, the design criteria for the cellular communication system between a vehicle and a remote surveillance station should include: Easily intelligible voice conversation with minimal interruption due to data transmission; Assurance of data integrity; Determination of communication link loss; Reliable and user friendly operation; Ability to operate in alt noise environments having multiple communication link problems; Recognition of repeated orders in any direction.
BRIEF SUMMARY OF THE INVENTION The protocol of communication method d transmission of data of the present system rests on a technique of modulation of key of change of frequency half full. When a burst of data is being sent that carries information from the tracking module onto a vehicle board, the voice communication is first silent. L voice communication that originates in the vehicle is either from the hands-free microphone or from a microphone part of the headset of the cell phone communication system When it is desired to send data carrying information about the communication link such as when an event occurs in a vehicle that requires rapid communication between the vehicle and the remote response center, the system on the vehicle's panel initiates a call. When the remote answering center detects an incoming call from a communication system mounted on the vehicle it answers the call and sends a burst of greeting message data back to the tracking module in the vehicle. This message is an invitation to the tracking module in the vehicle to start the transmission of data, for example the location and data of the vehicle's state. The tracking module in the vehicle responds with an acknowledgment message which sends signals that it will now start sending data packets to the remote response center.
The data packet carrying information that is sent from the vehicle between the extended periods of voice communication begins with a head start bite. The head start bite is followed by the bite of type d box which in turn is followed by a bite account and a sequence number bite. After the bite of sequence number and bite count are one or more data fields which are used to transmit either information of the location of the vehicle position or condition / event information from the vehicle. The end of the data packets is signaled by the transmission of two cyclic redundancy check error (CRC) detection bits. Since the data packets carrying information may occur at a time interval during a communication link, the receiver does not know when to expect a packet of data to carry information. Therefore, the receiver is continuously seeking the receipt of the data packet carrying information. Since the voice communication is modulated in the data, the receiver is constantly receiving a stream of data not carrying information generated by the voice transmission. Such data n carrying information based on the transmission of voice and significant. However, as soon as the receiver perceives that he has received a valid headset start bite, a box type bite and a bite account automatically silences the voice that is being transmitted to the cell phone. This prevents subsequent voice transmission to interrupt the rest of the data stream carrying information that follows.
Once the data stream carrying information containing location information or the event / condition information has been received, its validity must be verified. If it is a good message that contains information of the condition / event or location, then it is assembled. recognition message. The recognition message also has the same type of corruption protection of bite d sequence and cyclic redundancy check. Once the data recognition / bursting transaction has been completed carrying information, the voice mod transmission shutdown is turned off at both ends of the communication link and resumes the two-way voice communication. If the sequence of error detection of the transmission indicates that the transmission of data packet carrying information has been corrupted, then the data packet carrying transmitted information is ignored, the silent transmission of the voice transmission is turned off. Negative acknowledgments (NAK) are never transmitted and response to corrupted data.
The previous communication protocol is a master / slave type protocol. Ordinarily, the tracking module mounted on the vehicle initiates the communications link. The remote response center accepts the location to the event / condition information data from the tracking module on the vehicle and then recognizes the message. This arrangement prevents a data transmission collision on the communication link. If both ends of the communication link transmit data simultaneously, no data would pass. Therefore, if the data communication is initiated by the tracking module in the vehicle, the transmission collision does not occur. The most notable exception to this rule is that when there is an invitation to transmit the data command originating in the remote response center for the vehicle tracking module. In this case, the tracking module is normally silent so that no collisions of data transmissions occur.
Another case where the response center initiated a communication transaction is the method of operation of "data (carrying information) on demands" when the tracking module can be placed in a data update mode carrying automatic information of 30 seconds. This mode of updating data carrying information is entered due to the fact that an urgent voice communication is required without any interference of the data carrying information. During the 30-second automatic update mod the tracking module is silent; no data is transmitted carrying information. If a position update is required before the 30 seconds of voice communication pass, the operator in the response center can initiate a command "data (carrying information) on demand". The response center then automatically sends this request for "data (carrying information) on demand" for the module d tracking in the vehicle. The tracking module recognizes this request for "data (carrying information) on demand" responds by sending a data packet carrying information to the response center. If the response center receives the update of data carrying information without any corruption of the data carrying information the response center sends an acknowledgment message to the tracking module. This reversal of roles in master and slave usually does not result in any data transmission collisions. However, if the sequence number bit does, it will cause confusion to occur.
The bite account tells the receiver how long the message should be and where the cyclic redundancy verification bits are located. The purpose of the sequence number is to list the messages. This numbering of the data bags carrying information is to determine if a data packet has been received carrying information ... it is a data bag carrying new information or one that has been retransmitted. The data packet of position information is never retransmitted because it is not imperative to obtain this data packet of particular position information. Because the position information packages occur at regular intervals, there is little change in the updated vehicle location information. Therefore, the next data packet carrying programmed information will have updated position data instead of the old position data. Therefore, unlike data transfer, it is not necessary for each data packet carrying information to pass through the remote response center. This tolerance of errors in the link without transmission is a fundamental part of the standard data communications protocols. This will be explained in more detail later.
If the system is in a mode where the position data is transmitted after only a second voice communication and an error occurs, the new position data will be sent one second later. Thought n applies to command charts. In this case it is imperative that the command box carrying information pass through the sun once and only once. By increasing the number of the sequence number for each new recognition message it can be determined whether the message currently received is a new message or a retransmitted message. This is achieved by comparing the bite of sequence number with the last one. If the sequence is different, then the message is a new one. If the sequence number is the same, then the currently received message is merely the previ-ed retransmitted command. This can only happen if the message passes through uncorrupted but the recognition is corrupted. The result of this communications protocol is described as a fault tolerant communications link in which some errors are tolerated and some are corrected. L selective correction in a protocol numbered and oriented d block and completely protected from error is widely divergent from the doctrine of standard data communications.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 includes two tables illustrating the table content schema of the data table and a supervision table; Figure 2 is a table showing the function and identifier of the various data frames; Y Figure 3 is a timeline showing the sequence of data exchange.
BRIEF DESCRIPTION OF THE INVENTION • Cell phone communications systems and other wireless communications systems.
It is essential for the operation of the communications protocol of the present invention for the communication link between a vehicle and a remote monitoring station to require that the system transmit primary communication of speech at a level of quality that is easily understood by both. the occupants of the vehicle and the operator of the remote monitoring station. When the data carrying information are going to be sent on the articulation d communication, the data carrying information are sent as a package mentioned as a "box".
Typically, voice / data communication links use modulation standards such as Bell 212A, CCIT V.22 or V.32. These modulation standards are two-way full-duplex communication schemes. Therefore, in order to perform two-way communication, the bearer must be turned on at each end of the communication link at all times. If the bearer signal happens to be off it disappears, then the plex complet communication link falls off automatically. To avoid the inadvertent fall of a communication link, a half-duplex communication scheme for the present invention was selected. This means that the normal voice operation is experienced over the link most of the time. When data is going to be sent, the voice channel is silenced and the data is sent.
It has also been found that many wireless technologies are very noisy. This means that extracting the data carrying information from a voice signal can be very difficult. Since at least part of the communications link involves a standard tierr telephone line, the bandwidth characteristics of the telephone line are added to the bandwidth characteristics of the wireless link. Therefore, to send data carrying information about an analogous communication link requires that the data carrying information be modulated at the sending location to transmit the data carrying information and then demodulate at the receiving location to receive the data carrying information. There are many types of modulations available for data communication. Modulation types include tuning on / off (OOK), l amplitude modulation (AM), frequency shift tuning (FSK), phase change tuning (PSK), differential phase change tuning (DPSK), quadrature amplitude modulation (QAM), and quadrature amplitude modulation with a full echo cancellation.
Due to the limitations of wireless communication systems, complicated modulation schemes do not work well. It has been found that the simpler is the modulation scheme, the better is the communication obtained from the wireless medium. Therefore, the type d modulation used should be simple but still allow the satisfactory transmission of the data carrying information.
The tuning modulation system d on / off is not complicated but the data transmission rate d carrying information in bits per second is very low.
The amplitude modulation (AM) system is not so simple. However, the quality of communication in many wireless media is degraded due to the large amount of amplitude modulation noise present. Therefore, a link based on amplitude modulation is not satisfactory.
The next simplest modulation system is the frequency change key. It has been found that using the frequency shift tuning at 1200 bits per second offers a good compromise of speed and reliability. Interestingly there are no half duplex communication standards of 2400 bits per second using a frequency change tuning modulation system.
The V27 standard of international communication 2400 bits per second and 4800 bits per second are differential phase change tuning modulation systems. Tale systems are more complex and therefore more difficult to use over wireless communication links. The training time is very long. This results in less time for the voice. However, for large amounts of data, V.27 is a good choice.
The international communication standard V29 9600 bits per second uses both phase change tuning and amplitude modulation. This is called QAM. However, it is expected that with such high rates an error rate can also be expected carrying significant information data. This standard suffers from the same long training as V.27.
Given the criteria for the present system, a frequency change tuning modulation system, the average duplex of 2200 bits per second is satisfactory. The system is a special case of the international standard V.23 duplex, a non-low speed reverse channel. The use of such a standard allows the transmission of data carrying asynchronous information with very little preamble for the condition of the receiver. Such systems do not require line equalization or echo cancellation.
Voice / Data Multiple schemes are available to mix the data carrying information and voice together for transmission. The simplest mixing system changes from a voice mod to a data mode carrying information or vice versa on an order. The communication link is either a voice mode or a data mode carrying information. This type of communication link prevents the voice mode from corrupting the data mode by carrying information; however, the information in such a communication scheme has proved difficult to manage.
The next simplest communication mode operates primarily in voice mode. Then only the short burst of data carrying information is sent when necessary.
A more complicated communication scheme involves digitizing and compressing the voice and then multiplexing it with the data carrying information. Such a process requires a high rate of data transmission carrying information to achieve a reasonable level of voice quality. This will require a high bandwidth data link. The combined cellular system and the terrestrial telephone system are combined to form a high-bandwidth system.
Another method would be to modulate constellation dots in a quadrature modulation scheme with speech. This requires a wider bandwidth and a low noise to operate effectively. Voice quality suffers in this type of system.
The simplest and most reliable communication mode is a switched voice / data scheme. Specifically, the voice is transmitted in normal mode. When the data carrying information will be transmitted, the voice is muted to avoid corrupting the data carrying information. The burst of data carrying information is then sent Specifically, the voice is completely muted during the transmission of data carrying information and its inherent AC sequence. After the system has sent the data carrying information, the communication link returns to the voice mod. The complete process of switching to the mode of data transmission carrying information, the transmission of data carrying information, the ACK, and finally the switching back to voice mode takes less than half a second. E burst of data carrying information is supplied to transmitter at regular intervals. Specifically, the data carrying information is transmitted every second, every second or every thirty seconds of voice transmission. Tale bursts of data carrying information are sent for periods of muted voice so as not to unduly impair the voice communication by the 5 and 30 second modes. The 1 second update mod is used when a voice is not required, only updates and position statements.
Communication Protocol of the Present Invention Follow a detailed description of the communication link. This detailed description of the communication protocol of the present invention defines the schema d frame content and the logical data transfer scheme.
• Picture Content Schema The frame content scheme of the present communication protocol uses frames which are already data frames or monitoring frames.
The data frames contain data such as the location and the event / condition / status information that is being transferred from the vehicle to the bas station remotely located or in the data from the base station to the vehicle.
The supervision tables contain commands d protocol and / or recognition messages. The basic frame structure is shown in Table 1 which appears in Figure 1. Note that all tables start with a head start bite ("SOH") and end with a cyclic redundancy check bite ("CRC ") of 16 bits. The second character in the box is the frame identifier. This character specifies the function of the box as denoted in the Table qu shown in Figure 2.
The frame sequence numbers are module 25 and are assigned to each frame in succession. The fourth character in the box is the sequence number. The vehicle and the monitoring station allocate a bite account and sequence numbers independently when the frames are being transmitted. The supervision pictures are exactly zinc characters in length. An information box can be anywhere from 7 to 256 characters in length and can contain from 1 to 250 characters of data. The last character d data in an information frame is followed by a bite d 16-bit cyclic redundancy check.
• Logical Data Transfer Scheme The data transfer protocol for the communication link of the present invention between a vehicle and a monitoring station is a medium duplex. This means that only one unit can transmit at any time The modem data receiver is always listening for the data stream carrying information that signals the beginning of the data stream carrying information. The data receiver can detect or respond to the data sequence by indicating the presence of a data field carrying information within 2 msec.
The details of the communication link will now be described. When the system in the vehicle wishes to communicate with the remote base station, a cellular call is placed from the vehicle to the base station. The call is placed on the cellular system and placed on the base station on the ground line. The public switched telephone network (PSTN). When the base station modem detects a call condition on the incoming telephone line, the computer at the base station attached to the modem instructs the modem to go pick up the handset (answer the call). The computer of the base station then mutes the audio voice and sends a greeting order (invitation to transmit) to the unit in the vehicle. The unit in the vehicle detects this greeting and responds with an ACK message. This ACK message tells the base station computer that the vehicle unit heard understood the greeting command. The vehicle unit then begins by sending information carrying data packets at regular intervals to the base station. For each data packet carrying information received by the base station computer without errors, the base station sends an ACK message back to the vehicle unit and increases the sequence bit. In this way, both ends of the communication link know that they are still in contact with each other. If this ACK scheme the vehicle unit will not know if the link has been broken.
The location data boxes are never transmitted if an error occurs. In this system, damaged or lost data tables are of little consequence as long as the condition does not persist. The GPS location information renewed for each frame regardless of whether the previous frame was received correctly or its associated ACK was correctly received by the remote unit. Therefore, there is never a duplicate of the position data table in this system. However, the sequence bit can be repeated on one or more data frames if the frames are not going through. The true purpose of the sequence bite and the ACK is not so much the maintenance of data integrity as it is to allow both the vehicle unit and the base station to be aware of the condition of the communication link. When the vehicle unit sends a data box to the base station receives an ACK, the vehicle unit KNOWS that the base station correctly received the data box. When the bas station receives a data frame, the sequence bit must be advanced by an account from the last received data frame. If this is received, then the base station KNOWS that the vehicle unit received the last ACK of the base station. In this way, both extremes KNOW that the other end is hearing the messages correctly in this medium duplex system.
Failure in the vehicle unit to receive the ACK can mean that either the communication half of the communication link is not operating correctly. At the base station it is obvious when the data frames are not received correctly. In addition, the multiple data frames received at the base station with the same sequence bit indicate that the vehicle is not listening to the ACK for its data frames. When communication link problems are encountered, this system allows the base station to determine in which direction the data link is failing.
If a specific period of time elapses if the vehicle unit receives an adequate acknowledgment (ACK) from the base station, the vehicle unit will terminate the communication link and place another call.
When an order is to be issued to the vehicle unit from the base station operator, the base station computer first waits for the next data packet programmed from the vehicle unit. Then, instead of what the base station computer sent a message of recognition to the vehicle unit, a message d type of command box is sent. When the vehicle unit receives this order box, the vehicle unit sends a recognition box to the base station. This scheme allows both ends of the link to know that the order is passing correctly. Orders must only happen once. If the ACK sequence / order does not transpire correctly, then the command in the following data box must be redirected to the vehicle base station. This will continue until the message passes. The sequence bit is used to indicate if the command has passed.
If the communication link is initiated by the base station by calling the vehicle, then the vehicle unit answers the call and begins to send information by immediately taking data frames without being invited to do this by the base station. Again, if the time occurs in which the vehicle unit receives a good acknowledgment frame from the base station, then the communication link will be terminated but the vehicle unit will not place a call to the base station. The vehicle unit may have answered a call not from the base station.
The details of the time-frame and data retrieval will now be described for the data table. Before the actual transmission begins, the complete quad must be built. The data table begins with a head start (SOH), followed by the ID box. The ID box describes what type of table this is. The data field length in the frame is defined by the bit count and e the third bit in the frame. The next bite in the box is the Bite Sequence. The bite allows duplicate messages to be detected. The data field is the next set of dites in the box. All the bits in the head start box have been processed through the cyclic redundancy checker algorithm. This result of this CRC generation is a 2-bit CRC. This completes the construction of the painting.
As shown in Figure 3, the transmitter modem data carrier requires up to 20 msec pair to stabilize before sending the data. Once the stabilization of the transmission bearer is achieved, a synchronization data pattern known as the Preamble is sent. This Preambul consists of four bits of 055H followed by 4 bits of OFFH. The purpose of this Preamble is to condition the clock separator-receiver data by allowing it to acquire a first bit synchronization and then a bite synchronization. The data box is then sent. After the last cyclic redundancy check character has been transmitted, a dumb OFFH character is sent to ensure that the transmit buffer is actually empty and to provide a smooth transition from data to no data in the receiver. It helps to drain the last character in the transmitter. After this last bit has been transmitted, the transmitting bearer is turned off and its receiver is enabled waiting for an acknowledgment from the other modem. The muting of the audio is left.
When the base station sees that a data frame has started, the base station mutes the audio voice to avoid data corruption. The way in which the base station computer "sees" that a message has started and through the first one send the SOH character followed by the valid ID quad. This bite account is also used to qualify the incoming message. If all three bits appear to be reasonable (a combination recognized by the base station) then a valid message is assumed that is entering and the mute is applied and the rest of the message is received. The base station computer then assembles the incoming quad. After the last cyclic redundancy check bite is received at the base station, the receiving base station computer calculates and verifies the CRC bits of the received frame. If the CRC checks, then the reception mode turns on the transmit carrier and allows it to stabilize for 20 ms, send the Preamble and then send a recognition box.
All data frames and command boxes are recognized immediately upon receipt. If the transmitter does not receive an acknowledgment message within a specific period of time, then the transmitter presumes that one is not entering or that any data or acknowledgment quad was corrupted. The data box is not transmitted and the sequence number is not increased. This is used as an indication to the base station that the last message was not completed correctly. The data tables carrying information from the tracking module on the vehicle are transmitted with GPS data refreshed or renewed at the selected update rate of one, five or thirty seconds. Therefore, as described above, if the location / state message was corrupted and not completed correctly then it is not transmitted, but rather was updated simply at the next selected time.
Command boxes must pass once and sun once. If the base station sends a command to the vehicle follower unit and an acknowledgment is not received with the correct associated sequence number, then, at the next opportunity, a duplicate command will be sent again (with the same sequence number as the last frame). This will continue at each transmission opportunity until the command passes and the base station knows what has happened. The sequence bite is used as described above to ensure that both end know that the frame has been successfully completed. The data boxes that are not location / status data but rather other important data such as the position history should also be passed once and only once. These types of data frames which can pass in any direction must follow the same rules as the just described command boxes.
The modes of operation of the communication system of the present invention are as follows.
The voice with data carrying information at the interval of one, five or thirty seconds with the audio enabled.
The data carrying information at intervals of 1 5 or 30 seconds with the horn audio for the mobile phone handset incapacitated or muted (listening mode).
In the voice with the data mode carrying information, the data carrying information is sent and approximately expulsions of approximately 200 msec. This period of time is followed by the transition time to the base station which is variable depending on the routing taken by the transmission. The time for acknowledgment is also included in the total mute time. The general mute time is less than half a second. Therefore, an interruption of this short duration to transmit the data carrying information and receive the answer is not only disruptive for those speaking about the cellular communication link in the modes of 5 and of 3 seconds.
When the first follower unit places a call during an event, the follower enters the listening mode The listening mode is identical to the voice with the data mode carrying information except that the voice signal channel d the base station goes to the vehicle's horn is muted The cell phone's microphone is enabled. This allows audio from inside the vehicle to be heard at the base station. In the case of an intruder or an attack by the vehicle occupant, the actual voices will be transmitted to the base station. If desired, these voice signals may be conferred to a law enforcement communications system. Because the voice signals for the vehicle are disabled, the intruder or the attacker will not know that the voice in the vehicle is being monitored. When it is desired to communicate with the occupants of the vehicle, a command of "produced a simulated ring" is sent to the vehicle follower unit. After the ring is generated, the audio path from the base station to the vehicle follower is enabled and the occupants can hear the base station operator.
During interrogation diagnostics and other non-alarm / non-emergency situations the voice signal both from and to the vehicle is turned on.
The interval in which the vehicle transmits the new position data is variable. The initial interval for this update is 1 second to obtain a good tracking of the position. However, communication of vo is not feasible at this rate. To facilitate the listen mode to determine if a crisis is in process, the operator of the base station can issue a command to the tracking module to acquire and transmit data carrying information at a slower rate, specifically at a range of seconds. If voice communication is important with only occasional location updates, then the 3 second modem is better. A data order can be sent on demand at any time for an instantaneous update.
A clearer understanding of the communications protocol of the present invention can be had by listing the various types of data carrying information transmitted as follows.
Data of the monitoring station: Mode of change • Listening mode and full audio • Resolution of position information d normal resolution (5 seconds) / resolution of high resolution position information (second) • Condition of reset / output / abort for an alarm. (This mode is used when a call ends if the condition that initiated the alarm still persists, ie the vehicle's battery is low / dead). Deactivate. (This mode is used to turn off the system when there is a fault or when you do not want a unit to be able to call the monitoring station). Short / long message format mode Mute / non-mute audio mode for speaker d vehicle Define system operation parameters Data loaded • Time interval for vehicle service / call placement • Call placement time interval • Alternate telephone numbers Data from the vehicle GPS location data Vehicle ID (a sequence of 32-bit binary data) 25 First base station identification call (used in the case of line loss and reconnection to identify the original base station driver) Mode status Tracking-Current status Alarm input 5. Panic switch Perception of ignition On without code Battery Dead Battery Low 10 Event Ordered Secondary State Guard dog has occurred GPS receiver failure CRC CRC bad 15 RAM CRC bad On enabled / disabled Third State Current GPS status Arm / not armed 20 Audio muted / unmuted Fourth State- Cumulative status Panic switch Alarm switch Ignition 25 Motion without power Dead battery Low battery On Ordered event GPS data Universal coordinated time data Latitude data Data length Speed in Knots of calculated earth GP Direcci n calculated GPS data only GPS date Coordinated Universal Time Latitude Longitude calculated ground speed in knots Direction GPS GPS Assistant calculated another state Although the present invention has been described and its preferred embodiment, it will be understood by those skilled in the art that other embodiments of the present invention are possible once the above description has been read. Other incorporations shall be included within the meaning scope of the appended claims.

Claims (35)

R E I V I N D I C A C I O N S
1. A method protocol for data communication and voice audio, said method protocol comprises the steps of: initiating a cellular communication link from first place to second place using an average half duplex frequency tuning modulation technique to initiate a call from said first location to said second location; completing said cell communication link between the first location and said second location by receiving said call to said second location and muting the audio voice part of said cellular communication link; sending a burst of greeting data in a supervisor box from the second place to said first place, said burst of greeting data inviting said first location to transmit a burst of information data in the data frame; send a burst of recognition data in a supervisor box from said first place to said second place; send at least one burst of data d information in the data box from said first location to said second location; sending a burst of recognition data from a supervisor box from said second place to said first place after receipt of each data frame transmitted from the first place to said second place; restoring the audio voice part of said cellular communication link after the data frame and dich burst of recognition data in said supervisory frame have been transmitted from the first place and received in the second place.
2. The method protocol, as claimed in clause 1, characterized in that the supervisor quad includes: a start of bite cabecero; a bite identifier box; a sequence of bite number; and at least one error detection bite d cyclic redundancy check.
3. The method protocol, as claimed in clause 1, characterized in that said data table includes: a start of bite cabecero; a bite box identifier; a bite account; a bite of sequence number; data bits; and at least one error detection bite d cyclic redundancy check.
4. The method protocol, as claimed in clause 3, characterized in that said dite account and the sequence number bite include information describing: information of the package number; the length of the information packet; and the location of said at least one bite d cyclic redundancy check error detection.
5. The method protocol, as claimed in clause 3, characterized in that said data bits contain information describing a location, an event or a condition.
6. The method protocol, as claimed in clause 1, characterized in that the audio voice part of said cellular communication link is restored if the non-data frames are properly transmitted from said first location to said second location in a quantity of predetermined time.
7. The method protocol, as claimed in clause 1, characterized in that said bite d sequence number is incremented upon receipt of said burst of recognition data from said second location in said first location.
8. The method protocol, as claimed in clause 6, characterized in that the data contained in said sequence number bite are used in said second place to determine if said data frame is a retransmission of a previously transmitted data frame. or therefore a data frame not previously transmitted.
9. The method protocol, as claimed in clause 1, characterized in that said at least one burst of information data be retransmitted from the first location if a burst of recognition data from said second location is not received in said first location within a predetermined amount of time.
10. The method protocol, as claimed in clause 5, characterized in that said at least one burst of information data transmitted from said first location to said second location will contain more recent information describing a location, an event or a condition if A burst of recognition data from said second location is not received at said first location within a predetermined amount of time.
11. A method protocol for inserting a burst data transmission into a voice / data cellular communication link of pitch tuning modulation at half-duplex frequency, said method protocol comprising the steps of: transmit the voice communication from a first location to a second location; alerting said second location to a subsequent transmission of data bits by sending a data table which begins with: a beginning of headboard bites; a bite identifier box; a bite account; and a bite of sequence number; mute said voice communication; alerting said second location for the purpose of transmitting said data bits by sending at least one cyclic redundancy check error detection bite; sending a burst of recognition data in a supervisor box from said second location to said first location after receipt of each data frame transmitted from said first location to said second location; removing the mute to said voice communication after all the data frames and said recognition data burst monitoring frames have been transmitted from the first location and have been received at the second location.
12. The method protocol, as claimed in clause 11, characterized in that said supervisor quad includes: a beginning of bite header; a bite box identifier; a bite of sequence number; and at least one error detection bite d cyclic redundancy check.
13. The method protocol, as claimed in clause 11, characterized in that said bite cuent and sequence number bite include information describing: the information packet number; the length of said information packet; and the location of said at least one bite d cyclic redundancy check error detection.
14. The method protocol, as claimed in clause 11, characterized in that said data bites contain information describing a location, event or condition.
15. The method protocol, as claimed in clause 11, characterized in that voice communication of said cellular voice / data communication link is restored if no data frames are properly transmitted from the first location to the second location in a predetermined amount of time.
16. The method protocol, as claimed in clause 11, characterized in that said bite d sequence number is incremented after reception d said burst of recognition data from said second location in said first location.
17. The method protocol, as claimed in clause 16, characterized in that the data contained in said sequence number bite are used in said second location to determine if said data frame is a retransmission of a previously transmitted data frame od a data box not previously transmitted here.
18. The method protocol, as claimed in clause 11, characterized in that said at least one burst of information data will be retransmitted from said first location to said second location if a burst of recognition data from said second location is not detected. receives in said first location within a predetermined amount of time.
19. The method protocol, as claimed in clause 14, characterized in that said at least one burst of information data transmitted from said first location will make contact with the most recent information describing a location, an event or a condition s Burst of recognition data from said second location is not received in said first location within a predetermined amount of time.
20. The method protocol, as claimed in clause 11, characterized in that transmission of data bits from said first location said second location occurs at regular time intervals.
21. A method protocol for data communication, said method protocol comprises the steps of: initiating a cellular communication link for a first location from a second location using a tuning modulation technique, half duplex frequency change by initiating the call from said second location to said first location; completing said cell communication link between the first location and said second location by sending at least one burst of information data in the data box from said first location to said second location; alerting said second location at the end of the data frame to transmit at least one cyclic redundancy check error detection bit from said first location to said second location; sending a burst of recognition data in a supervisor box from said second location to said first location after receipt of each data frame transmitted from said first location to said second location.
22. The method protocol for data communication, as claimed in clause 21, characterized in that said data table begins with: a start of bite cabecero; a bite identifier box; a bite account; and a bite of sequence number.
23. The method protocol, as claimed in clause 1, characterized in that said supervisor quad includes: a start of a headboard bite; a bite identifier box; a bite of sequence number; and at least one error detection bite d cyclic redundancy check.
24. The method protocol, as claimed in clause 21, characterized in that said binary cuent and said sequence numbered bite includes information describing: packet number information; the length of said information packet; and the location of said at least one bite d cyclic redundancy check error detection.
25. The method protocol, as claimed in clause 21, characterized in that said data bites contain information describing a location, event or condition.
26. The method protocol, as claimed in clause 21, characterized in that said bite d sequence number is incremented after reception d said burst of recognition data from said second location in said first location.
27. The method protocol, as claimed in clause 26, characterized in that the data contained in said sequence-numbered bite are used in said second location to determine whether the data frame is a transmission of a data frame previously transmitted from a data box not previously transmitted here.
28. The method protocol, as claimed in clause 21, characterized in that said at least one burst of information data will be retransmitted from said first location if a burst of data is not acknowledged from said second location in first digit. location within a predetermined amount of time.
29. The method protocol, as claimed in clause 25, characterized in that said at least one burst of information data transmitted from said first location will contain more recent information describing a location, an event or a condition if not received a bursting of recognition data from said second location in said first location within a predetermined amount of time.
30. The method protocol, as claimed in clause 1, characterized in that said first location is a vehicle and said second location is a response center..
31. The method protocol, as claimed in clause 11, characterized in that said first location is a vehicle and said second location is a response center.
32. The method protocol, as claimed in clause 21, characterized in that said first location is a vehicle and said second location is a response center.
33. The messages produced according to method protocol, as claimed in clause 1.
34. The messages produced according to the method protocol, as claimed in clause 11.
35. The messages produced according to the method protocol, as claimed in clause 21. E S U M E N A cell phone communication protocol enables a communication link primarily for voice and data transmission. At predetermined intervals s send data on demand in relation to location, an event a condition by mute the voice audio and sending a data frame having a predetermined sequence. After the transmission of the location, event or condition data, voice and data transmission is started again. The communication link uses a tuning modulation technique of average duplex frequency change.
MXPA/A/1999/004161A 1996-11-08 1999-05-04 Cellular telephone communication protocol MXPA99004161A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60/029,721 1996-11-08
US08965438 1997-11-06

Publications (1)

Publication Number Publication Date
MXPA99004161A true MXPA99004161A (en) 2000-05-01

Family

ID=

Similar Documents

Publication Publication Date Title
US6011806A (en) Cellular telephone communication protocol
CA2075414C (en) Facsimile radio communication system
US5509050A (en) Facsimile radio communication system having multiple data speeds
USRE39427E1 (en) Cellular telephone data communication system and method
CN102792625B (en) Adaptive data transmission for a digital in-band modem operating over a voice channel
US7323973B1 (en) Multiplexed TTY signaling for telematics
USRE37141E1 (en) Cellular telephone data communication system and method
CA2396592A1 (en) Method and apparatus for a selective acknowledgement scheme
BG62346B1 (en) Method and system for signaling of selective call by combined personal call with a wide range of operation and high-speed data transmission by radio telephone receiving-transmition stations
US5694454A (en) Apparatus for message re-transmission on demand
GB2296843A (en) Mobile radio station with automatic transmission of an emergency signal
EP0574455A1 (en) Radio capable of automatic system selection in emergency situations
MXPA99004161A (en) Cellular telephone communication protocol
EP0344169B1 (en) Transmission system
JPH08130501A (en) Mobile communication system
JP2619275B2 (en) Communication device
US9674681B2 (en) In-band voice with security signaling
JPH05207107A (en) Digital cordless telephone
JPS638664B2 (en)
JP2688695B2 (en) Message transmission method
JP2000151853A (en) Voice data.pb signal transmission reception method
JP3749085B2 (en) Telephone equipment
JPH11127274A (en) Information communication system
JPS61205029A (en) Radio telephone equipment
KR20010059638A (en) Method of providing calling identity delivery data in electronic switching system