It's possible to transmit data in ICMP ECHO request and ICMP ECHO reply messages (commonly referred to as ICMP tunneling). Embedding your callsign in a ping packet that is sent out every 10 minutes is a very easy and legal way to identify your reclassified Part 97 wireless network.
Reviewing the Unix ping on-line manual page shows us that the data may be set with: -p (pattern). You may send up to 16 characters (including spaces) per ping packet. This pattern must be specified as hexadecimal digits.
Example looped ID script:#!/bin/sh while true do /bin/ping -c 1 -s 21 -p 574952454C455353204E4F4445 220.127.116.11 # WIRELESS NODE /bin/ping -c 1 -s 24 -p 464343204152532043414C4C5349474E 18.104.22.168 # FCC ARS CALLSIGN /bin/ping -c 1 -s 22 -p 204B42394D575220464F52204944 22.214.171.124 # KB9MWR FOR ID sleep 600 done
Wireless ethernet communications are considered as using a specified digital code to communicate because commercial products are available that facilitate the transmission and reception of the communications and the technical characteristics of wireless ethernet are publicly documented.
The rules no longer really specify how you must ID. Using this method, your callsign will be encapsulated inside an ethernet frame. This conforms with 97.119(b)(3) for specified data emission codes [see 97.309 (3) & (4)]. This is a perfectly reasonable and acceptable method, anyone with a sniffer or running dump on the link will be able to see your callsign:eth1: len 60 00:40:05:44:55:61->00:00:c0:40:0f:25 type = IP IP: len 42 126.96.36.199->188.8.131.52 ihl 20 ttl 64 prot ICMP ICMP: type echo request id 54377 seq 0 Öùù KB9MWR FOR ID
Keep in mind this is just one example of how to fulfill the identification requirement. You may use any other reasonable method you can come up with or an other method that is publicly documented, which can be fulfilled by explaining your method on your internet webpage, as I have just done, for example.