Sie sind auf Seite 1von 14

Republic of the Philippines Department of Interior and Local Government National Police Commission

COMMUNICATIONS & ELECTRONICS SERVICE REGIONAL COMMUNICATIONS & ELECTRONICS OFFICE 5


Camp General Simeon A Ola, legazpi City

BASIC SIGNAL COMMUNICATIONS


L

INSTRODUCTIONS:

A. SIGNAL COMMUNICATIONS - A Method or means of a combination use of conveying information of any kind from one person or place to another except by direct conversation. B. MEANS OF SIGNAL COMMUNICATION The medium or equipment which information is conveyed from one person or place to another. C. AGENCY OF SIGNAL COMMUNICATIONS The facility which embraces the personnel and equipment necessary to provide signal communication by any particular means of a combination thereof.

II.

MEANS OF SIGNAL COMMUNICATION:


i.PHYSICAL MEANS OF COMMUNICATIONS A. Messenger B. Message C. Telecommunication A. MESSENGER: Is the oldest means of communication, most secured and best means of transmitting writing message over short distance. ADVANTAGE: 1. 2. 3. 4. 5. Relatively most secure Relieved congestion of electrical means Transmit items in bulk form Not dependent on electrical equipment Eliminate requirement for installation of unnecessary & uneconomical circuits.

DISADVANTAGE: 1. Relatively slow rate of transmission 2. Dont afford person contact 3. Stopped by terrain obstacles 1. TRAINED ANIMALS: Whereby pigeons, dog or other animals are employed to carry messages. 2. MAIL: Means of forwarding messages by an established postal service.

B. MESSAGE: A thought or ideas express briefly in plan or secret language in a form suitable for transmission by means of communication. TYPE OF MESSAGE a. Single addressee b. Multiple addressee PRECEDENCE OF MESSAGE a. Flash Z b. Immediate O c. Priority P d. Routine R FLASH Z Reserved for initial enemy contact or operational combat message (extremely urgent intelligence message) IMMEDIATE O Reserved for message relating to situations which gravely affect the security of nation/allied forces or populace and which required immediate delivery. PRIORITY P Reserved for message which requires expeditious actions by the addressee and /or furnish essential information of the conduct opration when routine precedence will not suffice. ROUTINE R Reserved for all types of messages which justify transmission by rapid means, unless sufficient, urgent requires a high precedence. SECURITY CLASSIFICATION OF MESSAGES a. b. c. d. Top Secret Secret Confidential Restricted

TOP SECRET will be limited to information and materials which requires the highest degree of protection. Reserved for the countrys closet classification and will apply only to those information or material in the defense aspect of which are paramount and unauthorized disclosure of which could cause exceptionally grave damage or danger to the nation politically, economically, military such as; 1. Those that may lead to definite break in the diplomatic relation or armed attack against the nation or its allies or which may affect the defense of our country. 2. Those which may lead to the compromise of military or defense plans, intelligence operations or drastic political or economic projects or technological development vital to national defense. Authority to classify Top Secret. 1. 2. 3. 4. Sec of National Defense CSAFP Major Service Commanders Area and Regional Commanders/Directors

SECRET Will be limited to information and materials that the unauthorized disclosure of which would endanger national security, cause injury to the interest or prestige of the nation of any government activity or would be a great advantage to a foreign nation such as material or information such as; 1. Jeopardized the international relation of the country. 2. Endanger the effectiveness of a program of government scheme or policy vital to the national defense. Authority to Classify Secret. 1. 2. 3. 4. 5. 6. 7. 8. Top Secret authorities Commander of Division General and special Staff AFP General and Special staff of Major Services Superintendent PMA Chief of Military Mission Armed Forces Attache Commandant of Service School

CONFIDENTIAL - Will be limited to information and material the unauthorized disclosure of which, while not endangering national security, would be prejudicial to the interest and prestige of a nation or any government activity or would caused administrative embarrassment or unwanted to the individual. Example of information/Material graded to Confidential are: 1. Routine operational battle report containing information and material vital to the enemy. 2. Routine Intelligence reports. 3. Plans or Government projects, technical matters which are distinct value or requires protection, new weapons, war equipment of standard patent. 4. Military/PNP radio frequency and call signs/words, allocations of special significant or those which are changed frequently for security reasons. 5. Meteorological information of designated areas. 6. Operation and Tactical doctrines or lessons learned in operation. 7. Documents which obtain the following elements of information concerning troops movements or individual travel either directly or by implication. Any commissioned officer in the active service to any material in the performance of his official duties. RESTRICTED - information and material (other than TOPSECRET, SECRET and CONFIDENTIAL) which should not be published or communicated to anyone except for official purpose such as: 1. Training and Technical documents for official use only not intended for releaser to the public. 2. Routine information relating to supply and procurement. 3. Maps and Photographs of remote areas, maps important or related to defense security. 4. Ground photographs, negatives, diagrams or models of restricted matters.

PREPARATION FOR FILLING-UP THE PNP MESSAGE FORM


A.For COMCENTER/Signal use only C.Precedence Action E.Date/Time groups G.Routine Indicator I.Cite Number K.Text of the Messages M.Page Number O.Classified Yes/No Q.Releasers Name/title and Signature B.Security Classification D.Precedence Information F.Message Instruction H.From J.TO L.Refers to Message N.Drafters Name/title and signature P.Number of Pages R.For operators use

A.For COMCENTER/SIGNAL Use routine indicator- No entries are to be made in these space at the time the message is prepared by the drafters or the originator. This space is provided for use of the COMCENTER/Signal personnel. B.SECURITY CLASSIFICATION- it is the responsibility of the originator to ensure the proper security classification indicated on the message before it is forwarded for transmission. Message bearing no security classification should be marked unclass. C.PRECEDENCE ACTION The precedence assigned to all addressee. D.PRECEDENCE INFORMATION- The Precedence assigned to all information addressee and message precedence. E.DATE/TIME GROUP Consist of six digits and zone designation, first pair denotes the date. 2 pair denotes the hours. 3RD pair denotes the minutes. 4th pair denotes the H. 5TH pair denotes the Month and 6TH pair denotes the year.
ND

F.MESSAGE INSTRUCTION - Used by the originator to indicate the desired methods of delivery of message (ex. Coded, confidential). G.ROUTINE INDICATOR Reserved for the message precedence if it is flash or priority or depends on the degree of the contain of the message. H.FROM The designation of the originator. I.CITE/DESIG/ORIG NUMBER This is to be filled-up by the originator with the office/unit or originator office symbols and for service message. J.TO Addressee may be designated as eighter action and information. K.TEXT OF THE MESSAGE Strive for brevity without less or clarity to save transmission of message text should be prepared in block form, meaning without paragraph, numbering or indent. L.REFERS TO MESSAGE If the message refers to another message appropriate identifying data of the reference message will entered in this block. M.CLASSIFIED YES/NO If the reference message is classified by Yes block will be marked, if unclass the No block will be marked. N.PAGENR. and NR. OF PAGE This will be filled in accordance with the number of pages used to complete the message. O.DRAFTERs NAME and PHONE NR. Data identifying the drafters and phone number. P.RELEASERs NAME/TITLE & SIGNATURE Data identifying the individual authorize to released the message.

C. TELECOMMUNICATIONS
1. RADIO: ADVANTAGES: 1. Speed of installation 2. Flexibility 3. Maintained while troops are mobile 4. Integrated with wire 5. Use for air-to-ground and air-to-air commo 6. Provides commo over impassable terrain

DISADVANTAGES: 1. Subject to Atmospheric conditions 2. Subject to Interference a. Natural Interference Ex. Lightning, thunder b. Artificial Interference 3. Least Secure 2.WIRE: ADVANTAGE ; 1. Provide person to person contact 2. Capable of break-in operation DISADVANTAGES; 1. Required time and effort to install 2. Subject to sabotage and destruction 3. Stopped by terrain obstacles 3.VISUAL: ADVANTAGE: 1. 2. 3. 4. DISADVANTAGE: 1. Vulnerable to Interception 2. Subject to imitative deception 4.SOUND: ADVANTAGES: 1. Transmit short-pre-arranged messages 2. Suitable for short distances 3. Stations do not depend on the line-of-sight location DISADVANTAGES: 1. Vulnerable to interception 2. Can be imitated 3. Adverserly affected by battle noises Suitable for short pre-arranged message. Suitable for short distance. Does not require sophisticated installation. Does not use bulky equipment

III. COMMUNICATION SECURITY (COMSEC) = It is a measure taken to protect all information which may be value to the enemy or the deliberate misleading of the enemy for the interpretation of information that may be able to gather. TWO IMPORTANT FACTORS OF COMMUNICATIONS SECURITY 1. The protection of information 2. The deliberate misleading of the enemy in the interpretation of information that may be able to gather. SECURITY IN RADIO COMMUNICATIONS Bear in mind that radio is the least secured means of communications It is assumed that interception takes place each time a transmitter is place in operation. Use a radio may be restricted or prohibited for security reasons. Classified message transmitted by radio must be encrypted except when time element will be delayed. Radio should be silenced within units in contact with the enemy.

1. 2. 3. 4. 5.

SECRECY OF RADIO COMMUNICATIONS The content of radio communications shall not be divulged to any persons or party other than to whom it is addressed as specifically provided in section 7 of Republic Act nr.3846 as amended. ELEMENTS OF RADIO COMMUNICATIONS SECURITY A. Physical Security B. Transmission Security C. Cryptographic Security A. PHYSICAL SECURITY All measures and activities designed to protect and safeguard classified equipment, materials and areas from access by unauthorized personnel. a. Area security b. Classified of materials c. Cryptographic Security clearance d. Evacuation and destruction 1. Routine evacuation and destruction 2. Emergency evacuation and destruction e. Compromise report Two Types of Compromise Report 1. Initial Report 2. Written Report B. TRANSMISSION SECURITY Measures designed to prevent the enemy from deriving information our electrical transmission. a. Reduce length and number of transmission b. Reduce transmission power minimum c. Strict adherence to prescribed procedures d. Operators training e. Circuit discipline f. Jamming and imitative deception defense g. Interception and direction finding defense h. Defense against traffic analysis i. Message authentication

C. CRYPTOGRAPHIC SECURITY It converts communications from an understandable language to an unintelligible text of message which conveys a hidden meaning. In short, cryptographic security transform plain text into secret text message. KINDS OF CRYPTOGRAPHIC SECURITY: 1. CODE SYSTEM Is a procedures whereby a plain text message transformed into a secret text message or a cryptogram by replacing words phrases or sentence with equivalent code words that are found in coded book. 2. CIPHER SYSTEM This system has the same and in view as the code system, convert clear text message into a cryptogram. However, unlike the code system the cipher system treats on individual letters of message text. TWO METHODS OF ENCIPHERING 1. TRANSPOSITION This method converts plain text message to an equivalent cryptogram by transferring the position of individual letters from the original. 2. SUBSTITUTION This method convert clear text message into their equivalent cryptogram by replacing individual letters of the clear text with equivalent letters found in a cipher chart. IV. RADIO TELEPHONE PROCEDURES: A. RADIO NET Two or more radio stations working together on the same frequency constitute a radio net. And must consist the following: a. Radio sets being used must be in the same frequency. b. Must be the same modulation. c. Must be within the working range. NET CONTROL STATION (NCS) is the one who control the flow of communication and enforce circuit discipline. TYPES OF RADIO NET a. FREE NET Can communicate with other station in the same net without obtaining permission from the Net control Station(NCS). b. DIRECT NET May obtained permission from the NCS before communicating to other stations within the network. B. CALL SIGN Is a combination of character(letters & number) or pronounceable words that identifies a communication facility, commend, authority, activity or unit. TYPES OF CALL SIGNS 1. INDIVIDUAL CALL SIGN Identifies a single command or commo facility 2. COLLECTIVE CALL SIGN Identifies two or more stations in a particular radio net but not all stations in the net. 3. NET CALL SIGN Identifies all radio stations operating in a particular radio net. C. CALL Is a method of establishing communications whereby the calling station transmit the identity of the stations called as well as his own identity. FOUR TYPES OF CALL 1. SINGLE CALL Where the calling stations transmit the call sign of single radio station. 2. MULTIPLE CALL Where the calling stations transmit the call sign of two or more stations that are being called.

3. COLLETIVE CALL - When the calling stations transmit the collective call sign which identifies two or more stations operating on the particular net. 4. NET CALL When the calling stations transmit the net call sign which identifies all stations operating in the net.

D. PROCEDURES WORDS Procedures words, or what is normally referred to as prowords are pronounceable words or phrases which have been assigned meaning and used in radiotelephony to facilitate message or traffic handling. E. OPERATING RULES : 1. Practices specifically forbidden: a. Violation of radio silence. b. Unofficial conversation (chatter) between radio operators. c. Transmitting on a directed not without permission. d. Excessive tuning and testing of equipment. e. Transmitting operators personal sign. f. Unauthorized use of plain language in place of applicable prowords of operating signals. g. Use of other than authorized prowords. h. Linkage or compromise of classified call sign or address groups by lain language disclosure of association with unclassified call sign. i. Profane, indecent or obscene language. 2. Practice to be avoided: a. Use of excessive transmitting power. b. Excessive time consumed in tuning, changing frequency or adjusting equipment. c. Transmitting at a speed beyond the capability of the receiving operator. F. TEN (10) COMMANDMENT FOR RADIO OPERATORS DONT ALLOW A RADIO STATION: 1. Be operated by any person not having authority to do so. 2. Fail to identify itself at all times and in the manner prescribed. 3. Transmit any false or superfluous all contrary to the rules and regulations. 4. Interfere with any distress call or distress communication contrary to the rules and regulations. 5. Render a communication service not sanctioned. 6. Fail to respond to official communication. 7. Fail to keep a proper logbook. 8. Permit profane, indecent or obscene language. 9. Willingly permit damage to radio equipment. 10. Allow the interruption use or publication of the contents of a radio message without permission of the proper authority.

G. PHONETIC ALPHABET: 1. Pronounciation a. International Phonetic Alphabet The phonetic alphabet should be used in spelling out unusual names of persons and locations. It is also in spelling out similar and hard to pronounce words. LETTER PHONETIC SPOKEN AS A - - - - - - - - - - - - ALPHA B - - - - - - - - - - - - - BAVO C - - - - - - - -- - - - - CHARLIE D - - - - - - - - - - - - DELTA E - - - - - - - - - - - - - ECHO F - - - - - - - - - - - - FOXTROT G - - - - - - - - - - - - GOLF H -----------HOTEL I -----------INDIA J -----------JULIET K -----------KILO L -----------LIMA M ----------MIKE 2. Uses: 1. To identity individual letters of the alphabet in a message. 2. To spell out difficult to foreign words within a plain text message. This is preceded by the prowordsI SPELL ex. CATENARY as CHARLIE ALPHA TANGO ECHO NOVEMBER ALPHA ROMEO YANKEE; CATENARY. 3. To transmit each character in encrypted groups. This will be done even if occasional groups in the encrypted text area pronounceable. The use of phonetics in this case need not be preceded by the proword I SPELL ex. The encrypted words or text LUXOW JULEP RTLMS RAKES JULIET UNIFORM LIMA ECHO PAPA ROMEO LIMA MIKE SIERRA ROMEO ALPHA KILO ECHO SIERRA. LETTER PHONETIC N----------O----------P - - -- - - - - - - - Q -- - - - - - - - - - R -----------S -----------T -----------U -----------V -----------W-----------X -----------Y -----------Z -----------SPOKEN AS NOVEMBER OSCAR PAPA QUEBIC ROMEO SIERRA TANGO UNIFORM VICTOR WHISKY X-RAY YANKEE ZULU

H. NUMERALS: 1. Pronounciation of numbers: NUMBERS 1 ------2 ------3 ------4 ------5 ------6 ------7 ------8 ------9 ------0 -------SPOKEN AS WUN- with a strong W and N TOO - with strong OO TH-R-EE with slightly rolling R and long EE FO-WER with long O and strong W and final R FIE-YIV with long I changing to short Y and V SIKES with long S and KS SE-VEN with long strong S and V and well sounded VEN ATE with long A and strong T NI-NER with strong N at the beginning and a long I and well sounded NER ZERO with strong Z and short RO

2. Uses: 1. To distinguish numerals from words similarly pronounced, the prowords FIGURESmay be used preceding the number. 2. Numerals will be transmitted digit bydigit except multiple of thousand which may be spoken such as: Example: 9 - - - - NI-NER 25 - - - - TOO FIE-YIV 300 - - - THREE SERO SERO 1245 - - WUN TOO FOWER FIE-YIV 7000 - - SEVEN THOU-SAND 3. Date will be spoken digit by digit with months in full. Example: 17 MARCH 2004 will be spoken as WUN SEVEN MARCH TOO THOU-SAND FOWER.

I. OPERATING PROCEDURE IN RADIO 1. The operator who wish to contact and station in the system must first listen to the circuit before keying the transceiver in order to avoid any interference. 2. Must give the name of the called stations first, then the name of station called for proper identification. 3. If mobile cars when calling or being called by the name, crew must give their 10-20 (location) at once. 4. Long message should be broken into phrases and each phrases repeated once before going to next phrases of the message to avoid too much repetitions. 5. Must transmit message slowly, distinctly at rate of 60 words per min. 6. Acknowledge message properly, giving the time received, date and operator who received, but always be certain that message received is completed. 7. Hold the microphone about two to four inches from the lips, approx 45 degree, press the button down firmly, then speak slowly and clearly in a normal voice. 8. Do not shout into the microphone for it will cause distorted signal even thought there is a great amount of noise in the vicinity. 9. Think and know what you want to say, press button firmly, hesitating as instant speak distinctly. Be brief and concise, be in personal, do not mumble. Do not talk to fast. 10. Do not interfere when someone is transmitting a message unless your message is emergency in nature. 11. If a message received for transmission is long, make a draft first, then transmit same in order to be coherent, afterward type same in the standard form for record purposes. 12. Terminate communication politely and courteously. Omit such words as thank you. Courteously could be shown through words inflection. READABILITY: 1. Unreadable 2. Barely readable, some words distinguishable 3. Readable with practically no difficult 4. Perfectly readable SIGNAL STRENGHT: 1. Very weak signal - - - - -10-1 2. Weak signal 3. Fair signal 4. Good signal - - - - - - - - -10-2

J. PROWORDS AND THEIR MEANING: PROWORDS ADDRESS GROUP ALL AFTER EXPLANATIONS The groups that follow is an address The portion of the message to which I have reference is all which follows. The portion of the message to which I have reference is all that which precedes. The station called is to reply to the challenge which follows. The transmission authentication of this message is ? I hereby indicate the separation of the text from other portion of the message. You are correct or what you have transmitted is correct. The group that follows is the reply to your challegence to authenticate. The following is my response to your instruction to read back. I am repeating the transmission of portion indicated. Transmitting station has additional traffic for the receiving station. This is the end of my transmission to you and no answer is required or expected. This is the end of my transmission to you and a response is necessary. Go ahead, transmit. Repeat this entire transmission back to me exactly as received. Your transmission is too fast, reduce speed of your transmission. I have received your transmission, I understand it, and will comply. To be used only by the address. Since the meaning of ROGER is indicated in the WILCO the two prowords are never used together. Repeat the words which I have reference.

ALL BEFORE

AUTHENTICATE

AUTHENTICATION IS BRAKE

CORRECT

I AUTHENTICATE

I READ BACK

I SAY AGAIN

MORE TO FOLLOW

OUT

OVER

READ BACK

SPEAK SLOWER

WILCO

WORDS AFTER

V. PRINCIPLES OF RADIO COMMUNICATIONS: A. RADIO FREQUENCY SPECTRUM FREQUENCY BAND ABRREVIATION Very Low frequency VLF Low Frequency LF Medium Frequency MF High Frequency HF Very High Frequency VHF Ultra High Frequency UHF Super High Frequency SHF Extremely High Frequency EHF a. Police Frequency b. Citizens Band (CB) c. Amateur VHF Band B. TYPES OF MODULATION 1. AM 2. FM C. Difference between Frequency Modulation (FM) and Amplitude Modulation (AM). AM Modulation in which amplitude of a wave is the characteristic subject to variation. This type of modulation is used in Single side Band (SSB). FM The amplitudes made constant in the carrier wave together with the signal so that variations are found uniformed like a steel spring. This amplitude are used in FM broadcasting TV, VHF Handheld/Base station and others. D. TYPES OF EMISSION 1. Voice (A3/F3) This form of transmission is called radiotelephony, speech intelligence is transmitted by means of microphone which converts energy into electromagnetic wave. 2. Continous Wave (CW) The message is transmitted character by character. A character being a letter, a figure or a symbol. The process of transmitting/receiving information are in forms of dots and dashes. 3. Frequency Shift Keying (FSK) Commonly known as radio teletype. E. FREQUENCY COVERAGE this terms refer to the frequency band that can be covered by particular radio set. F. Maximum Effective Range This pertains to the operating capability of the radio set where the signal can still be hear by distant radio station.

FREQUENCYRANGE 3 30 KHZ 30 300KHZ 300 3000KHZ 3 30MHZ 30 300MHZ 300 3000MHZ 3 30GHZ 30 300GHZ

152.00 153.999 MHZ 86.965 27.405 KHZ Spread in 40 channels 144.00 145.999 KHZ

VI. COMMUNICATION EQUIPMENT: A. FOUR MOST IMPORTANT PART OF RADIO TRANSCEIVERS 1. Microphone An electrical device that converts sound energy to electrical current amplified by the amplifier in a transceiver. Most of these microphones have (PTT) Press to talk switch for transmitting or on receiving mode of operations. 2. Transceiver - Itselt of electronic device that transmit/received signals for communication purposes. 3. Antenna A metallic wire or rod use for radiating waves to and from space and ground. 4. Power Supply A device or equipment wherein a transceiver generates power. It can be a dry cell. Storage battery, Regulated AC/DC converter or a generator. TYPE OF POWER SUPPLY Regulated Power Supply (AC/DC) Dry Cell Primary cell, not Rechargeable Storage Cell Secondary cell, can be rechargeable and can be use for a long period of time. Nicad or Lead Acid Cell this is secondary cell and can be rechargeable also.

1. 2. 3. 4.

B. Descriptive Terminologies in Radio Sets a. TYPE OF SETS 1. Portable Can be carried by a human being Ex. Handheld and Manpack 2. Transportable 3. Vehicular (Mobile) 4. Fixed C. Capabilities and Limitations of Radio Communications a. Subject to interference i.Natural a.weather condition b.Natural barriers such as mountains, creek and body of water. ii.Artifical or Man Made a.Tall building and tension wire b.Jamming- Intentionally done disrupt given operating frequency. D. Mobile Unit techniques Mobile units before dispatched or transferred to another shift should be checked if the two-key mobile radio is operational. Whatever is the status, should be properly logged. E.OPERATOR OF MOBILE UNIT SHOULD PERFORM THE FOLLOWING; 1. Check the condition of the radio equipment. 2. The two-way set must be on at standby and the volume to low but audible to Operator. 3.Before proceeding to a specific point or area, report must be made to Hqs or Central station. 4.Only official calls should be made. 5.Authorized phraseologies and terms should be used. 6. Volume of receiver should be adjusted according to distance. 7.All operational activities should be entered in the log sheet together with status of equipment.

VII. LAW ENFORCEMENT COMMUNICATIONS OPERATING PROCEDURES; A. BASE STATION TECHNIQUES The law enforcement (radio telephone) radio base station is authorized primarily to intercommunicate with its mobile radio units, foot patrols and outpost and to intercommunicate with other law enforcement radio stations. It must be borned in mind that the base operator is the center figure in the radio communications network and therefore he must be aware of the basic importance of his position, and must know how to discharge his duties accordingly. 1. He must be reliable and prompt in performing his duties. 2. He must inform the superior of anything he believe to be a violation of the mobile units. 3. The base operator should keep proper logging of all activities of the mobile units. 4. Base operator should be very inquisitive whenever he receives information through telephone in order to get full picture of the incidents being reported. Remember the five W and one H. 5. Stick to the facts and never jump to conclusions. Complete information can be lead to the preventive and solution of the crime and could protect mobile crew when responding. 6. When he assume his tour of duty, he should sign in the log and must acquaint himself with all the event that happend previously. 7. Operator must know all the stations being monitored. 8. Operator must not adjust the radio equipment except as proved in the nature of the control knob, etc. 9. Base operator must know the administrative function of his own department in order to properly route of the traffic received. 10. The base operator must never have the operating position at the control desk unless absolutely necessary and then only when properly relieved by one is authorized to operate. The Base operator is the coordinator and his short absence from the control desk will paralyze the mobile operator. 11. Courtesy should be maintained in order to have a pleasant atmosphere in the net, never broadcast words that indicate irritation, disgust or sarcasm, relation with other operators remain cordial at all times. 12. Be impersonal, avoid familiarity, use proper names, title or unit identifier at all times. 13. Formal message received for transmission should be recorded and retransmitted exactly as received. 14. The station originating a formal message which is to be relayed on the air by receiving station should monitor the receiving station so as to certify that it is transmitted correctly. 15. Long message should be broken into phrases and each repeated once before next phrases of the message. 16. Operator should not receive for traffic which is not sure to have been copied correctly. 17. If, after calling station or car twice, no reply is received sign off the air. Then call again about a minute. Never fill the air with incessant calls. 18. At the end of a transmission when a reply is expected, the word GO ahead should be used. 19.

Das könnte Ihnen auch gefallen