Two-way radio is alive and well

March 2019 Security Services & Risk Management

A general perception in the market is that the two-way radio is obsolete. This is far from the truth – radio has actually, like a butterfly, morphed into a force to be reckoned with. The major manufacturers are starting to move away from the older analogue technology, which had limited functions and range when compared to digital technology.

Digital technology is designed for group communications from the ground up. It is easy to divide your organisation into different groups and to be able to decide who communicates with whom, when and where. Individual calling is also still available and easy to facilitate.

As standard, radio receivers are more sensitive to data signals, and digital signals are data signals. This already gives digital an advantage by providing much better and clearer audio. As there is no analogue audio, which is prone to fading, the regenerated audio signal can be kept at a constant audio level up to the last moment.

Digital audio is very clear and easily understandable, which is vital in emergency situations where audio quality is imperative. The latest digital radio technology has settings that allow natural voice or analogue voice capability. Due to the high-level microprocessor capabilities used, digital radio comes with many functions and features that were not possible in the analogue technology without advanced boards or add-on units.

Digital two-way radios, such as this model made by Kenwood, provide a host of benefits over analogue technology.
Digital two-way radios, such as this model made by Kenwood, provide a host of benefits over analogue technology.

The main protocols used are DMR (Digital Mobile Radio) dPMR (digital Private Mobile Radio) and NXDN (Kenwood and Icom format). DMR is a TDMA (time division multiple access) protocol. This gives you two time slots in one RF channel and is very dependent on accurate synchronisation. dPMR and NXDN use FDMA (frequency division multiple access) protocol. dPMR is a very narrowband protocol (6,25 kHz) whereas NXDN is a narrow (12,5 kHz) and very narrow band (6,25 kHz) protocol. dPMR and NXDN are not dependent on very accurate synchronisation between slots, and instead rely on the signal synchronisation of the incoming signal.

It was also found that very narrowband signals are less susceptible to interference and higher-quality signals are received. With very narrow channels you can split your 12,5 kHz channel into two side-by-side channels and split it into two repeater sites, extending your coverage. Due to the very narrowband nature of the signals, there is no co-channel interference.

Enhanced features offered by digital radio

Some of the enhanced features of digital radio are as follows:

Emergency button. When the user is in trouble, they can press a button and the identification is sent out and when activated, the GPS position is transmitted and can be monitored. The emergency feature also has a transmit/receive cycle that can be set for a predetermined period and the times it will cycle. This activates the microphone and a control station can listen in and assess the situation.

Lone worker. As the name suggests, this is for people working alone in dangerous situations where no immediate assistance is available. The radio is programmed to alert the user at predetermined periods. Should the user not react and press the button to indicate that all is well, the radio raises an alarm. Their identification and GPS location will then be sent to assist in finding them. There is even a beacon facility with an audio alarm that can assist rescuers to find the user.

Man down. Man down monitors one of three angles when a user is bent over and warns them to straighten up. Should the user not straighten up, the radio assumes the user has fallen over and is incapacitated, and raises the alarm. Again, user identification and GPS location are sent and the audio beacon can help to locate the user.

Stationary and motion. If you monitor yourself, you will discover that you are never completely still – you always move ever so slightly. The radio can detect this and will then see the user as alive. Should the user ever become completely still, the radio will then determine there is something seriously wrong and raise the alarm. Conversely, if the user runs to flee from danger and shakes the radio hard, the radio will detect this and will assume the user doesn’t have time to press the emergency button, and will send an emergency alarm automatically.

Additional functionality and benefits

In the case of misuse it is possible to remotely ‘stun’ the radio (temporarily make it unavailable). The radio can be remotely ‘unstunned’ to return it to normal use when required. Should the radio be stolen, it can be ‘killed’ which would clean the programmed memory and return it to factory default.

The radio can also be remotely monitored. You can discreetly (with permission) switch on the radio’s transmitter and microphone and eavesdrop on what the user is saying. This is a useful feature if you suspect misuse, or in the case of a user not answering the radio and you need to check if they are in a tight situation. It is also a useful feature to monitor a stolen radio before killing it.

There is a status message (two-digit messages) function that does not use a lot of airtime, as well as short data messages that are the same as SMSes. Radios with keypads allow the user to set up a message of 110 to 160 characters, and send this to another radio. On radios with displays, you can read messages and displays identities of radios in your organisation every time they transmit. It is possible to set up caller lists from which you can do individual or group calls. The radios can be part of only one user group or up to as many as the group identification list permits.

A very powerful benefit is the fact that organisations do not need to throw away their analogue radios when migrating to digital, as the digital radios have a mode where the radio will automatically respond to either an analogue or digital signal and can respond in the received call’s format. This makes it painless to move from analogue to digital. The digital radios also come with all the analogue formats built in, so are completely compatible. Some of the manufacturers can even connect an MPT trunking system into their own digital trunking system.

With digital it is also very easy to have multiple high-sites connected through IP technology and with conventional digital RF links. The digital protocol makes it easy to have radios and networks perform auto selection of the strongest channels, and for the user not to worry when and where to change channel and frequency. In DMR, simulcast is made much simpler, where voting systems are technically easier and much more affordable.

Digital radio communication is ideal for the security and manufacturing industries, as well as for farming and rural security. Intrinsically safe radios are also available for industries such as mining. A key advantage of two-way radio is that users own the frequency and are not dependent on a third party. An annual licence fee is payable, but then the rest of the calls are free. Licence-free radios are also available for on-site communications.

High-frequency radios are cheaper to operate than a satellite phone and the improved technology makes radios much more reliable and easier to operate than previously. It is possible to track operators worldwide for only the cost of your annual licence fee. Two-way radio makes good economic sense.

For more information contact Global Communications, +27 12 621 0400, info@globalcomms.co.za, www.globalcomms.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.