中文| English
Search

Products

Network Type:
NB-IoT TD-LTE LTE FDD UMTS CDMA EV-DO TD-SCDMA GSM/GPRS/EDGE CDMA 1x
Form Factor:
LGA LCC Mini PCIE
Function:
Data SMS MMS FOTA GPS BD/GLONASS UART PORT

Introduction to Module Technology

  • 1. RPM
  • 2. Embedded TCP/IP
  • 3. Net-lock, card-lock, interlock of host and card
  • 4. ECALL
  • 5. SMS Trigger Mechanism
  • 6. Remote Wakening
  • 7. Mobile Broadband Interface
  • 8. Low-power Design
Technology Introduction

RPM (The Radio Policy Manager) is the requirement put forward by the operator AT&T, which mainly contains the following aspects:

If the access request is rejected by NAS, or any domain of CS/PS domain is ignored by the network when the device is trying to connect the network, the "Network Access Management and Connection Management" can be used to protect the network.

The module can be restored to default settings to enhance the stability of modules if the device’s network access request failed or was rejected.

Application Scenarios

It is applied by AT&T and other operators, manufacturers who require RPM function.

Technical Advantages

This function can meet the requirements of AT&T and other operators requiring RPM function, protect the network of operators and enhance the stability of modules.

User Interface

Users can enable RPM function and perform relevant parameter settings through AT commands.

Technology Introduction

The embedded TCP/IP protocol stack is applied to partition the application layer data into IP grouping data packets, and submit the received IP packets to the application layer after decapsulation, sorting and regrouping. In the meantime, it will provide AT commands of TCP/IP protocol interface, which can be used for the following functions, such as set up network connection parameters, activate the control module or disconnect PDP wireless data connection, enable/disable TCP/UDP connection with remote server, transmit/receive user data, and query the status of TCP/UDP connection, etc. In order to meet the communication requirements of users in multiple applications, the module is required to set up multiple TCP/UDP connections simultaneously.

Application Scenarios

With the booming of IOT technology, the wireless modules are not restricted to the application of Netbooks or laptops, but are gradually and widely used in information collecting, dispatch, telematics, remote measurement, remote control, positioning and navigation, etc. The wireless module can externally connect to various hosts, and establish high-speed wireless channel in connection with 3G network for those hosts. However, whether or not those hosts can access the Internet or communicate with other hosts in the Internet depends on whether or not they are equipped with TCP/IP protocol stack.



Above is the protocol stack of wireless module's Dial-up Internet Access. In the figure above, TE refers to the external host and MT refers to the wireless module. During the process of Dial-up Internet Access, application layer data partitioning, regrouping, IP packet data encapsulation and decapsulation are realized in TCP/IP protocol stack of the host. And the IP grouping data packets are transparently transmitted by the wireless module. Therefore, without TCP/IP protocol stack in the host, there is no way to access the Internet or communicate with other hosts in the Internet through the wireless channel provided by the wireless module. In order to solve this problem and make full use of the wireless channel provided by the wireless module, we have built in TCP/IP protocol stack inside the module.

Technical Advantages

The built-in TCP/IP protocol stack solves the problem of being unable to access the Internet when there is no TCP/IP protocol stack in the host. Users can send data to the Internet through a simple control module such as single-chip microcomputer. This is especially important to industry applications.

User Interface

Through AT commands, users can set up/release the socket connection and transmit/ receive data, etc.

Technology Introduction

Network Lock is for the purpose of protecting the rights and interests of operators. In order to gain advantages in the competition with numerous operators, network lock is usually applied to terminals. After the network specified by operators is locked, the locked terminals can be used under the locked network only, and can't be used under the unlocked illegal network. Therefore Network Lock enables the terminals to be used under the legal network specified by operators.

SIM Card Lock is to lock the card used by terminals. Operators may impose restrictions on terminals to use the customized services when they release terminals based on their own network. You only need impose restrictions on the SIM card used by terminals if you want to restrict the network service on your mobile phone, since there is direct relationship between network service and SIM card. With SIM Card Lock technology, terminals can only use the SIM card specified by operators, while other SIM cards cannot be used.

Phone and SIM card Interlock enables the bundling of one phone and one SIM card, for example, Phone B which interlocks with SIM card A cannot use other SIM cards except SIM card A, and SIM card A cannot be used on other phones except Phone B.

Application Scenarios

Network Lock: Operators customize their specific functions on a batch of terminals, which means they have made an allowance for those terminals. In order to protect the interests of their own to the largest extent, those terminals cannot be used under other network. With this method Network Lock is achieved on terminals. SIM Card Lock: in order to promote their new business, which may bundle with newly-released SIM cards, operators will perform SIM Card Lock on terminals. The locked SIM cards can be used on the terminals while other SIM cards cannot be used. With this method, business promotion is realized.

Phone and SIM card Interlock: for users, Phone and SIM card Interlock can prevent their SIM card and phone from unauthorized use by others.

Technical Advantages

Network Lock: the ultimate purpose of this technology is to protect the interests of operators, for instance, to realize business expansion through commercial allowance of network locked terminals.

SIM Card Lock: it is convenient for operators to promote their specific business.

Phone and SIM card Interlock: it is used to protect the interests of subscribers. Subscribers can use their own SIM card on their own terminal, while others have no rights to use their SIM card and terminal.

Technology Introduction

ECALL technology, first put forward in Europe, is aimed at timely transmitting information, such as location of accidents, number of casualties, to the Emergency Center and providing first-aid service as soon as possible in case of vehicle accidents. Apart from ECALL system in Europe, the system “Tour buses, passenger buses and special-purpose vehicles” leaded by the State Council of PRC has also raised higher requirements on the safety of vehicles and people. It is expected that the communication module and positioning product can be integrated into the vehicle system, so that accidents location information can be acquired in order to provide first-aid service in case of accidents.

ECALL function integrates GPS technology and wireless communication technology (GSM/UTMS technology) into the communication box, and also integrates digital information into in-band modem technology of voice channel to monitor the status of vehicles. In case of collisions or other accidents, it will automatically transmit the onsite information promptly and accurately to the nearest Public Safety Answer Point (PSAP). And the operation personnel at the local service center will confirm the accurate location of accidents and arrange ambulances for emergency rescue.

In terms of ECALL system, the product reliability must be guaranteed. The product can still work normally after intense collisions. And it can support backup battery when the vehicle power supply stops working. Small-sized communication module is free from limitation of vehicle structure, which minimizes the collision impact caused to the module, and the wireless communication module must have extremely high sensitivity. M2M module plays a very important role in the whole linkage of vehicle-mounted electronic applications, as a bridge to connect the device sensor and the information service center. The vehicle-mounted application environment is very complicated, so it has raised higher and higher requirements on reliability, stability and high/low temperature.

Application Scenarios

In case of accidents, the built-in ECALL system will automatically or manually originate an emergency call to the local Public Safety Answering Point (PSAP) through the wireless network. Different from ordinary emergency calls, it adopts In-band signaling technology while establishing an emergency call, and transfers the vehicle data between In-vehicle System (IVS) of accident vehicles and the local PSAP. The data is called minimum set of data (MSD), which mainly contains location of vehicle, accident time, number of passengers, vehicle identification, etc.

Technical Advantages

The communication module and positioning product are integrated into the vehicle system to send the location and vehicle information to the Service Center in case of accidents, so that the Service Center can obtain the accident location at first time and provide emergency rescue.

User Interface

Users can enable and control the ECALL function through AT commands.

Technology Introduction

SMS triggering mechanism has further expanded the module's SMS function and differentiate from the ordinary SMS through customized key words; it adopts SMS containing defined key words to trigger module actions, which can be defined and expanded.

Application Scenarios

It can be used for scenarios where the module is required to be controlled remotely via SMS.

Technical Advantages

It enables users to control and trigger the module's specific actions through SMS, such as device rebooting, debugging, enabling/disabling of SOCKET connection, inquiry and setup of GPIO status, and inquiry of module status, etc.

User Interface

Users can enable and control the SMS triggering function through AT commands.

Technology Introduction

Modules, as the intermediate products, are more and more widely used in mobile products based on AP+BP structure, such as tablet PC and vehicle-mounted products, which require modules to provide basic wireless services like SMS, voice call, data function, etc. In those products, the basic application requirements on modules focus on remote wake-up function. Currently there are two methods to wake up modules:

1.Report information, wake up AP and then complete the touch screen action through the USB BUS.

2.In addition to USB interface, provide GPIO level wake-up interface (support GPIO wake-up method during hardware design); after receiving a text message or an incoming call in idle mode, the module will send out signals to AP through GPIO interface, and the AP will wake up each function in the upper layer after receiving the signals.

Remote wake-up methods based on GPIO include SMS wake-up and Call wake-up, and on the basis of this function it also supports Wake-up by any SMS, Wake-up by a specific SMS, Not Wake-up by SMS.

Application Scenarios

The ultimate bottleneck of current development of mobile products such as tablet PC, vehicle-mounted products is the problem of endurance. One important means for major manufacturers to improve the product competitiveness and selling points is to prolong the usage time of their products. In order to solve the problem of endurance for mobile terminals to the largest extent, we have developed the remote wake-up function, which provides Wake-up by any SMS, Wake-up by a specific SMS, Not Wake-up by SMS, Wake-up by any call, Wake-up by a specific call and Not Wake up by call, to make sure to wake up the host only when providing the above service; otherwise, it will stay in low battery mode to reduce power consumption and improve the endurance of products.

Technical Advantages

The Module provides three interfaces:

1.One interface for wake-up mode, toggle among Wake-up by any SMS, Wake-up by a specific SMS and Not Wake-up by SMS.

2.One interface for wake-up mode, toggle among Wake-up by any call, Wake-up by a specific call and Not Wake up by call.

3.One interface of setting a specific SMS header of Wake-up by a specific SMS;

4.One interface of setting a specific phone number of Wake-up by a specific call;

Technology Introduction

MBIM, shortly referred to as Mobile Broadband Interface Model, is a new interface standard put forward in November, 2011 by multiple USB/IF members including Intel, Microsoft etc. It is a kind of connection protocol based on USB host and device for desktop computers, laptop computers, tablet PC, and mobile devices. MBIM currently supports Win8, and will support Linux after version 3.8.

Application Scenarios

Ordinary users can directly connect it to the operating systems that support MBIM (e.g. Windows 8) after obtaining a mobile broadband device supporting MBIM. The operating system will automatically identify the mobile broadband device and provide the corresponding functional interface. Users only need to follow the relevant descriptions of the operating system to use all the functions of the mobile broadband device (such as data service, SMS, etc).

Technical Advantages

When a mobile broadband device supporting MBIM is connected to the operating system supporting MBIM, it can be directly used conveniently without installation of a driver. Comparing to the previous standards, MBIM has the following characteristics:

1.Support multiple IP connection through an independent USB interface;

2.Support implementation of flexible, highly-efficient and low cost devices;

3.Support implementation of power-friendly type in multiple operating systems;

4.Support implementation of mobile broadband drivers unrestricted by device in multiple operating systems including desktop computers, laptop computers, tablet PC, and mobile devices;

5.Substitution of troublesome control channel mechanism such as AT commands;

6.Elimination of needs for Ethernet header, minimization of costs and improvement of data transmission efficiency through the transmission of original IP frames.

User interface

Users can directly use the MBIM function through system UI.

Technology Introduction

The module will periodically monitor the OTA paging channel after entering the idle mode, and enter the sleep mode at the end of monitoring. It goes full circle. The large pulse current generated during the process of monitoring will result in rising up of standby average current and power consumption, therefore the standby time will be shortened when the module is powered by the battery. On some application occasions, MT calls are very rare because the application scenario of module is relatively special. In this case, we should properly adjust the monitoring pulse of DRX and reduce the number of pulses in unit time, in order to reduce the average current.

Application Scenarios

It is used for industry terminals requiring the external battery and concerning power consumption, such as power meter, tablet PC, etc.

Technical Advantages

It can greatly reduce the power consumption of modules.