Volume 2 covers shared knowledge about private radio communications at the level of the RF air interface and engineering implementation: how modulation and system design consume spectrum, how signals attenuate and reflect in real environments, how antennas and the human body change radiation and reception, and how security and governance go beyond the simple question of "whether there is a password." This volume is positioned as overview-level technical literacy. Its purpose is to build the vocabulary and physical intuition needed to read device manuals, coverage-planning white papers, and standards catalogs. It does not replace formal standards from ETSI, TIA, ITU, or vendor-specific design tools.

In terms of knowledge structure, air-interface systems answer the question "how voice and data are organized on licensed spectrum" through analog FM, squelch, tone signaling, and digital private-radio systems such as DMR, TETRA, P25, NXDN, and dPMR. Introduction to Analog Two-Way Radio and Digital Systems establishes the core terminology and layering, while DMR, TETRA, P25, NXDN: How Common Digital Private-Radio Systems Compare discusses system differences from regional and industry perspectives and can be read together with Volume 1's account of trunking evolution. After understanding the systems, propagation and links explain "why communication distance can vary so widely even when nominal power is the same": Link Budget Basics provides quantitative intuition for power, gain, path loss, and margin, while Propagation, Terrain, and Coverage emphasizes the decisive role of multipath, blockage, and repeater siting. Antennas and terminals then tie the abstract link back to the handheld device form factor: Portable Antenna Basics discusses wavelength, gain, VSWR, and the effect of how the user holds the terminal. Security and system boundaries explain that air-interface encryption is only one part of overall security; terminal lifecycle, dispatch permissions, and cross-network services introduce additional governance concerns, as discussed in Security and Encryption in Two-Way Radio. Push-to-talk over cellular or the internet belongs to the packet domain and service orchestration; its technical path is covered in Volume 5. This volume only marks the boundary between those systems and RF private networks.

The table below lists all entries in Volume 2 by topic for easy lookup. Volume 1 explains from a time-and-industry perspective how radios entered the era of urban private networks and digital systems, while Volume 2 answers "how signals are organized and attenuated within a given spectrum allocation." Readers arriving from consumer-facing or network-PTT applications may find it helpful to browse Volume 5 first and then return to this volume in order to distinguish RF private networks from collaboration models built on IP networks. Electromagnetic compatibility, radiation safety, and site-licensing approval are outside the scope of this volume and should be handled under local regulations and project specifications.

Systems and Overview

File Title
wiki-rf-analog-digital-intro.md Introduction to Analog Two-Way Radio and Digital Systems
wiki-digital-standards-comparison.md DMR, TETRA, P25, NXDN: How Common Digital Private-Radio Systems Compare

Propagation and Link Budget

File Title
wiki-link-budget-basics.md Link Budget Basics for Two-Way Radio
wiki-propagation-coverage-basics.md Propagation, Terrain, and Coverage

Antennas and Terminals

File Title
wiki-antenna-basics-portable.md Portable Antenna Basics and RF Fundamentals

Security and System Boundaries

File Title
wiki-rf-security-encryption-intro.md Security and Encryption in Two-Way Radio

Other Volumes

Transmit power, frequency, and equipment approval requirements are subject to the radio regulations of the user's jurisdiction.