Specifications

Interface Protocols
Operating Characteristics
August 08, 2000 68P81095E55-E 3-15
Over-The-Air Programming
The information needed to define an MSs operating parameters is sent to the MS by
the system using the over-the-air, Radio Link Protocol (RLP).
Other optional data (user convenience options) must be programmed by the user or
service technician with the MS keypad or with a Radio Service Software (RSS)
programmer. The method of programming will depend on the model of the MS. The
RSS programmer can also be used to upgrade the MS operating software version or
to modify the Control Channel Band Map.
Requirements
The MS units are operational from the factory. An MS does not require
programming by the dealer or customer. System access is denied until the service
provider can authorize the MS on the system. To identify and authorize the MS, each
unit is shipped with:
a version of code software
a Control Channel Band Map
an International Mobile Equipment Identifier (IMEI)
an Authentication Ki
Each of these are discussed individually.
Software The mobile operating software is loaded when it is manufactured. Software update
and new revision may be loaded to the mobile as they become available with the
service providers RSS programmer.
Control Channel
Band Map
The Control Channel Band Map is the set of frequencies used as home frequencies.
Each provider has a designated set of frequencies that are used to locate and identify
the MS within the iDEN system. This Band Map is a lookup table. The mobile
scans the frequencies in the band map until an iDEN system is contacted. These
frequencies (Primary Control Channels) are used to register, authenticate and track a
mobile within the iDEN system. The mobile will always return to this channel set to
locate the iDEN system on an error or loss of contact.
International
Mobile Equipment
Identifier
The International Mobile Equipment Identifier (IMESI) is the mobile’s unique
identifier. Analogous to the serial number, each mobile has a unique IMESI.
Authentication Key An authentication Key is a set of algorithms that produce a signature number when
provided with a random number. The FNE sends a random number to the mobile.
The returned signature is compared with the expected result to confirm the mobile’s
identity. This is discussed in greater detail in Authentication in the chapter.