4 Example of calculations
This section presents examples on how to use SEAMCAT to calculate Interference mechanism described in ANNEX 5:
4.1 iRSSunwanted
The following parameters should be changed in the simulation: (i) the interferer operates at 1000...
4.2 iRSSblocking
Intro
For this exercise, the blocking response from the receiver has a positive sign as shown in Figure...
4.2.1 User-defined mode
In this case, the Blocking is provided in dB and represents the attenuation of the receiver at a ...
4.2.2 Sensitivity mode
In this calculation mode the function blockMax Interf Signal (Df) that you entered represents the...
4.2.3 Protection ratio
This mode is identical to the “sensitivity” mode since the only difference is that the Blocking v...
4.3 iRSSintermodulation
The following graphics presents the input parameters to activate when the intermodulation mechani...
4.4 iRSSoverlaoding
The following graphics presents the input parameters to activate when the overloading mechanism i...
4.5 Coverage radius (VLR-VLT)
In this section the Free Space Model is used to derive the attenuation on the different paths and...
4.6 Simulation radius (ILT-VLR)
The distance between the Victim link receiver and the Interfering link transmitter is referred to...
4.7 Uniform distribution of ILT vs VLR
You may define a uniform deployment density of terminals/transmitters per km2 (see ANNEX 13:). Th...
4.8 Protection distance
If a minimum protection distance between the victim link receiver and interfering link transmitt...
4.9 Power Control
Note: The power control is used only in this section. When considering other sections, the power ...
4.10 Antenna gain
For simplification, we consider that the Victim link receiver and the Interfering link transmitte...