3.2 Calculating the dRSS

3.2.1 Victim link

The victim parameter characteristics summarised in Table 6 should be entered into SEAMCAT.

 

Table 6: Characteristics of the victim link pair of receiver and transmitter

Parameters

Value

Units

Operating Frequency

1000

MHz

Transmitter power

30

dBm

Receiver bandwidth

200

kHz

Tx and Rx antenna type

Omni directional

 

Tx and Rx antenna gain

9

dBi

Tx and Rx antenna height

30

m

C/I protection criteria

19

dB

C/(N+I) protection criteria

16

dB

(N+I)/N

3

dB

I/N

0

dB

Noise floor

-110

dBm

 Each simulation workspace contains one and only one victim link. 

3.2.2 System to be a victim

In order to set up a workspace, the first step is to set the system that will be used as victim: set the characteristics of the receiver  (that will be the victim link receiver (VLR)) and the transmitter (that will be the victim link transmitter (VLT)).

System characteristics can be directly edited in the system tab. This is illustrated in the figure below.

 

image.png

Figure 65: Access to the system environment

For example, a generic system can be selected from the “import system from library button” as shown Figure 67.

 

image.pngFigure 66: Import system from library button

 

image.png

Figure 67: Selecting a system from library

 

 

First, let set the frequency of the victim. The frequency can be changed from 900 MHz (default value) to 1000 MHz as described in Figure 68. In this example a constant value is considered, but in principle any type of distribution can be selected.

 

image.pngFigure 68: Example of setting up the operating frequency

 

3.2.4 Transmitter

Set now the victim link transmitter by selecting the transmitter tab

image.png

Figure 74: Selecting the transmitter tab

The parameters should be filled as follows:

image.png

Figure 75: Example of setting up the victim link transmitter

3.2.5 Positioning the VLT vs VLR

Define now the positions of transmitters and receivers of the victim link.

image.png

Figure 76: Selecting the Tx to Rx path tab

 

SEAMCAT allows defining the locations of the Victim link receiver and the Victim link transmitter in a fixed manner (correlated) or following some distribution (uncorrelated) as summarised in Figure 77. The input parameters are detailed in section 5.4, and the algorithms are detailed in ANNEX 13:

 

image.png

Figure 77: Summary of the VLTVLR location capability in SEAMCAT

 

In this exercise, set the distance between the VLT and the VLR as fixed (correlated distance) (x = y = 2 km) as illustrated in Figure 78. 

image.png

Figure 78: Distance between the Victim link transmitter and the Victim link receiver (Victim Link)

It is assumed that the Tx and Rx are both outdoor as shown in Figure 79.

image.png

Figure 79: Example of setting up the outdoor/indoor ratio

 

For this, select the correlated distance option of SEAMCAT as shown in Figure 80. In SEAMCAT, the origin of the coverage radius (see ANNEX 13:) is the transmitter (this is also reminded in the GUI) of the link.

 

image.png

Figure 80: Illustration of the correlated distance in SEAMCAT

3.2.6 Selecting the propagation model

Since both the transmitter and the receiver characteristics and the location between the two have been defined, the propagation model needed for the simulation can be now selected.

To simplify this task, let us assume that the free space model is used to calculate the attenuation between the Victim link receiver  (VLR) and the Victim link transmitter (VLT).

In addition, the Variation should be disabled as shown in Figure 81. 

image.png

Figure 81: Example of setting up the free space propagation model for Step 1

3.2.7 Calculating the dRSS by hand

Using the Free space equation, the power received by the Victim link receiver (dRSS) can be easily derived:

 image.png (Eq. 17)

image.png

image.png

 

Keep this calculation in mind, as it will be compared with what SEAMCAT calculates in the following sections.

3.2.8 Export/import your system to library

When setting the system is complete, it is possible to export it to the library, so it can be reused in a future point of time.

 

image.pngFigure 82: Example of importing/exporting a system to library

3.2.9 Selecting the victim in the Scenario

Now it’s time to create the victim link. The only thing needed is to select a system to be used as  victim link as shown in (#1) of Figure 83 under the “scenario” tab.

Note that the frequency field at the “scenario” tab level overwrites what was predefined at “system” tab level (#2).

 

image.png

Figure 83: Setting the system of your choice to be the victim link in the “scenario” tab