4 Example of calculations

This section presents examples on how to use SEAMCAT to calculate Interference mechanism described in ANNEX 5:

4.1 iRSSunwanted

The following parameters should be changed in the simulation: (i) the interferer operates at 1000.3 MHz and (ii) outside the emission bandwidth, the attenuation is -23 dBc/200 kHz.

The corresponding power may derived using the known equation:

(Eq. 20)

image.png

 

Then, in this example, outside the emission bandwidth (offset between –0.1 MHz and -1 MHz and between 0.1 MHz and 1 MHz), the power is equal to:

 

image.png

 

The complete unwanted emission mask is provided in the below figure.

image.png

Figure 99: Unwanted emission mask

 

Using the previous assumptions, it is possible to derive the interfering power received by the Victim link receiver within its bandwidth as described in ANNEX 5: on page 274. This is called the iRSSunwanted:

                                                         (Eq. 21)

image.png

image.png

image.png

 

 

This can be checked by running a simulation and displaying the iRSSunwanted signal as depicted in Figure 100.

image.pngFigure 100: Mean iRSSunwanted

 

 

image.png

 

In this example there is no bandwidth correction factor to be applied to the calculation of the iRSSunwanted since the VLR bandwidth and the ILT reference bandwidth have the same value (i.e. 200 KHz).

Examples of correction bandwidth can be found in section 3.3.8

4.2 iRSSblocking

4.2 iRSSblocking

Intro

For this exercise, the blocking response from the receiver has a positive sign as shown in Figure 101. Detailed information on the calculation of the iRSSblocking can be found in section A5.2 of ANNEX 5:.


image.png

Figure 101: Definition of the receiver blocking response

 

4.2 iRSSblocking

4.2.1 User-defined mode

In this case, the Blocking is provided in dB and represents the attenuation of the receiver at a given frequency offset (see A8.7). The resulting receiver attenuation equals the user-defined input values. Then, the iRSSblocking at the interferer operating frequency  may be calculated as follows.

(Note: The ILT bandwidth is not considered in the iRSSblocking  calculation):

                                                                          (Eq. 22)

image.png

image.png

image.png

 

This can be checked by running a simulation and displaying the iRSSblocking in case of User-defined mode calculated by SEAMCAT. See the figure below.

image.png

Figure 102: Mean iRSSblocking in case of User-defined mode

 

4.2 iRSSblocking

4.2.2 Sensitivity mode

In this calculation mode the function blockMax Interf Signal (Df) that you entered represents the absolute power level (in dBm) of maximum interfering signal (maximum acceptable interfering power), which might be tolerated by the receiver at a given frequency separation (see A8.7).

In this case SEAMCAT calculates the receiver attenuation, Attenuation (Df), to be applied to the interfering signal by using the following expression:

                    image.png

  (Eq. 23)

 

where:

 

To achieve a realistic value, you may define the sensitivity (sensVLR) as (see the figure below):

Sensitivity = Noise Floor + C/(N+I)                                                              

Sensitivity = -110 dBm + 16 = -94 dBm

image.png

 

 Figure 103: Setting up the sensitivity in SEAMCAT

Then the attenuation may be evaluated:

Attenuation (Df ) = 40 + 94 + 16 - 0 = 150 dB                  

iRSSblocking = Interfering Signal Level (f it )= -54.5 - 150 = -204.5 dBm        

 

This can be checked by running a simulation and displaying the iRSSblocking in case of Sensitivity mode calculated by SEAMCAT see Figure 104.

image.png

Figure 104: Mean iRSSblocking in case of Sensitivity mode

 

4.2 iRSSblocking

4.2.3 Protection ratio

This mode is identical to the “sensitivity” mode since the only difference is that the Blocking value (relative to the noise floor) is provided in dB. The software processes the information using exactly the same method to obtain the value of the receiver attenuation (see A8.7).

The function blockProtection Ratio(Df) that you entered represents the protection ratio, i.e. the ratio of maximum acceptable level of interfering signal to the wanted signal level, at a given frequency separation.

In this case SEAMCAT calculates the receiver attenuation aVLR(Df) to be applied to the interfering signal by using the following expression (see Figure 105):

(Eq. 24)   

image.png

image.png

image.png

 

     

                                            

image.png

Figure 105: Mean iRSSblocking in case of Protection-ratio mode

 

4.3 iRSSintermodulation

The following graphics presents the input parameters to activate when the intermodulation mechanism is to be investigated. The intermodulation rejection mask is expressed in dB versus frequency offset (MHz). Results details can be found in Section 12.3.3.

image.png

Figure 106: Activation of the intermodulation feature in SEAMCAT

 

4.4 iRSSoverlaoding

The following graphics presents the input parameters to activate when the overloading mechanism is to be simulated.

image.png

Figure 107: Activation of the overloading feature in SEAMCAT

 

 

The overloading mask is expressed in power (dBm) versus frequency offset (MHz) and is defined as a function in SEAMCAT. 

image.png

Figure 108: Setting of the overloading mask in SEAMCAT

 

The filtering of the receiver is expressed in power (dB) versus frequency offset (MHz) and is defined as a function in SEAMCAT (see Figure 109). It is set by default to a constant value of zero.

Note that if the blocking attenuation mode in user-defined and the overloading feature have been selected, then a consistency check will remind you that the actual blocking response and the receiver filter are the same element and they should not be accounted twice.

image.png

Figure 109: Example of filling the Rx filter function

 

When a simulation is run the following results are extractable (see Section 12.3.4 for further details)

As an example, this means that for the following overloading mask presented in Figure 3 with a victim frequency of 908 MHz and an interfering frequency of 900 MHz, the delta frequency (i.e. frequency offset) is -8 MHz with an overloading treshold of -8.5 dB and a Rx filter value of 9 dB. This can be found from the log file as shown below in Figure 110.

image.png

Figure 110: Output from logfile

 

image.png

4.5 Coverage radius (VLR-VLT)

In this section the Free Space Model is used to derive the attenuation on the different paths and the Victim Link and Interfering Link operate at the same frequency – 1000 MHz – co-channel interference. Figure 115 presents an illustration of the various radii (i.e. coverage radius and simulation radius) that are used in SEAMCAT and with reference to the various pairs of transmitters and receivers used for a simulation.

image.png

Figure 111: Illustration of the Coverage Radius and the Simulation Radius with respect to the pairs of transmitters and receivers of the victim and interfering links

 

 

The distance between the VLT and the VLR is referred to as the coverage radius (image.png) (see ANNEX 13:). In the case of mobile applications, the number of terminals that may transmit in a given cell of the network is given by:

image.png

        (Eq. 25)

 

The calculation of the coverage radius can be found in ANNEX 13:.

The cluster characterises the frequency re-use of a mobile network (see Figure 112).

image.png

Figure 112: Frequency cluster

 

image.png

 (Eq. 26)

 

 

 

image.png

Figure 113: Calculation of the victim link coverage radius

 

 

(Eq. 27)

image.png

 

 

 

Figure 115 presents the results of the dRSS vector and the results in the coverage radius of the victim link.

The dRSS for a receiver located at the edge of the coverage area may be calculated:

                                           dRSS = 30 (dBm) + 9 + 9 - (32.5 + 10 log(1.43^2) + 20 log(1000)) = -47.5 dBm

image.png

Figure 114: Resulting dRSS distribution

 

 

image.png

Figure 115: Calculation results of the victim link coverage radius

 

 

image.png

Figure 116: Illustration of the VLR and VLT positioning based on the traffic limited network coverage radius (ILT-red, ILR-green, VLR-yellow, VLT-blue)

 

 

4.6 Simulation radius (ILT-VLR)

The distance between the Victim link receiver and the Interfering link transmitter is referred to as the simulation radius (see ANNEX 13:). It can be defined as shown in Figure 117.

image.png

Figure 117: Definition of the minimum distance

 

Using this feature, the interfering link transmitter is located between 1 km (0.1 x 10 km) and 10 km (1 x 10 km) from the Victim link receiver as shown in the SEAMCAT display in Figure 118.

image.pngFigure 118: SEAMCAT display of the minimum distance

 

(ILT-red, ILR-green, VLR-yellow, VLT-blue)

If the interefering link transmitter is located at 10 km, it is possible to derive the iRSSunwanted:

image.png

image.png


                                    

 

If the interefering link transmitter is located at 1 km:

image.png

image.png

The iRSSunwanted extends from -59.5 dBm to -39.5 dBm as confirmed by Figure 119.

 

image.png

Figure 119: iRSSunwanted

 

4.7 Uniform distribution of ILT vs VLR

You may define a uniform deployment density of terminals/transmitters per km (see ANNEX 13:). This can either be done by using the “Uniform Density” mode combined with the calculation of a simulation radius as described in section 4.7.1 and A13.2 or by using the “none” mode combined with the choice of uniform path polar distance as described in section 4.7.2. 

4.7 Uniform distribution of ILT vs VLR

4.7.1 Uniform density mode - simulation radius calculation

image.png

The number of active transmitters that will be uniformly located within the simulation radius is given by:

                                                                               

image.png              (Eq. 28)

 

Figure 120 presents the GUI with the input value.

Settings in the System tab Settings in the Scenario tab

image.png

image.png

Figure 120: Setting up the simulation radius in SEAMCAT
(Note that the results of the simulation radius is displayed only after running simulation)

 

The simulation radius is calculated by using the following formula:

                                                                                  

image.png         (Eq. 29)         

In the example of Figure 120, this gives:


image.png

 

 

image.png

Figure 121: iRSS using the simulation radius for 1 active transmitter (R=0.178)

 

 

image.png

Figure 122: Calculated simulation radius with 1 active transmitter

 

Then for a single interefering link transmitter located at the edge of the simulation radius (R = 0.178 km), the iRSSunwanted may be calculated:

                  

image.png

When increasing the number of active transmitters to 10 (see Figure 123), the simulation radius becomes:

image.png

 

Then, for a single interefering link transmitter located at the edge of that simulation radius (R = 0.564 km), the iRSSunwanted resulting from this terminal may be calculated as:

image.png

If 10 active terminals are located at the edge of the simulation radius, the iRSSunwanted may be calculated in the following way:

image.png


Then the iRSSunwanted should be above -24.5 dBm as shown on Figure 124.

 

image.png

Figure 123: Setting up the simulation radius in SEAMCAT with a different 
number of active transmitters

 

 

image.png

Figure 124: iRSS using the simulation radius calculated for 10 active interferers (R=0.564 km)

 

 

image.pngFigure 125: Calculated simulation radius with 10 active transmitters

 

 

 

 

4.7 Uniform distribution of ILT vs VLR

4.7.2 "None" mode

When you select the “None” mode (see ANNEX 13:), he can also define a Uniform density of terminal/transmitter by using the Uniform polar distance defined within the path distance factor and a uniform distributed path azimuth (0 to 360 deg).Uniform polar distance leads to uniformly distributed terminals in the circular area (area) and the Uniform distance leads to uniformly distributed terminals along the radius (line).

Then using a user-defined radius of 0.178 km and 1 interefering link transmitter (see Figure 126), it is possible to reproduce the results of section 4.7.1. Therefore, the same results as those given in Figure 121 are found as shown in Figure 127.

 

image.png

Figure 126: Uniform density using “None” mode

 

 

image.pngFigure 127: iRSSunwanted / Uniform polar feature / 1 interfering link transmitter and simulation radius of 0.178 km (same results as in Figure 121)

 

Using a user-defined radius of 0.564 km and 10 interefering link transmitters, the same results as those given in Figure 124 are reached as shown in Figure 128.

image.png

Figure 128: iRSSunwanted / Uniform polar feature / 10 interfering link transmitter
(same results as in Figure 121)

 

4.8 Protection distance

If a minimum protection distance  between the victim link receiver and interfering link transmitter is introduced then the simulation radius may then be calculated by using the following formula:

                                                                                

image.png    (Eq. 30)

Note: The calculation of the iRSS at each trial will be performed only if the location of the ILT satisfies the following conditionimage.png.

Figure 129 presents how to set-up SEAMCAT (See also A13.2 for further details).

image.png

Figure 129: Setting up the protection distance related to the simulation radius with 1 active interferer

The simulation radius (see Figure 131) may then be calculated by using the following formula:

image.png


image.png

Figure 130: Calculated simulated radius

image.png

Figure 131: Calculation of the simulation radius and the iRSSunwanted using the protection distance (for 1 active interferer)

If the distance between the VLR and the ILT is equal to the protection distance (0.5 km), then:

                       image.png

 

If the distance between the VLR and the ILT is equal to the simulation radius (0.531 km), then:

 image.png

These results are in line with those depicted on Figure 131. We can then increase the number of active transmitters to 10 as shown in Figure 132.

image.png

Figure 132: Setting up the protection distance related to the simulation radius with 10 active interferer

The simulation radius may then be calculated by using the following formula (see Figure 133 for the result):

 image.png

             

image.pngFigure 133: Calculation of the Rsimu and the iRSSunwanted using the protection distance
(for 10 active interferer)

If the distance between the VLR and a single ILT is equal to the protection distance, then:

                       image.png

If the distance between the VLR and a single ILT is equal to the simulation radius, then:

image.png

If 10 transmitters are deployed around the VLR then:

image.png and 

image.png

image.png  (see Figure 133)

4.9 Power Control

Note: The power control is used only in this section. When considering other sections, the power control feature should be deactivated.

A power control feature is implemented within SEAMCAT. When this feature is activated it introduces a variation of the interefering link transmitter power. More details on the implementation of the power control in SEAMCAT is presented in ANNEX 14:.

When using the scenario provided in section 3 (Victim Link and Interfering Link operate at the same frequency 1000 MHz but with a interfering link receiver antenna gain should be equal to 11 dBi), it becomes possible to define the distance between the Victim link receiver and the Interefering link transmitter.

For simplification, we consider that the Victim link receiver and the Interefering link transmitter are defined using the following assumptions (1 km distance between the Victim and the Interefering link transmitter). This is illustrated in Figure 134.

image.png

Figure 134: Setting up the distance between the Interfering and the Victim pair of transmitter and receiver

 

 

If the power control is not activated then the iRSSunwanted is (see Figure 135):

 image.png

                   

 

image.png

Figure 135: iRSSunwanted without power control

 

 

The same assumption is used for the distance between ILT and the ILR (i.e. x = 0 km and y = 1 km) where the ILT is the (0,0) origin as shown in Figure 136.

image.png

Figure 136: Setting up the distance between the Interfering link transmitter and the Interfering link receiver to evaluate the dRSSInterfering link receiver.

 

The power received by the Interfering link receiver (dRSSInterfering link receiver) is then:

image.png

 

Note: You should not confuse the dRSSInterfering link receiver and the dRSSVictim link receiver. Figure 111 illustrates their differences.

The power control can be input as shown in Figure 137.

 

image.png

Figure 137: Setting up the power control for the interfering link

 

Using these assumptions, the results of the simulation are the same as previously since the threshold (-35 dBm) is above the dRSSInterfering link receiver (-37.5 dB). This corresponds to the Case 1 described in ANNEX 14:.

Now, if the threshold is decreased from –35 dBm to –50 dBm (see Figure 138)

image.png

Figure 138: Reduction of the minimum threshold in the PC

 

Since, the power control feature is activated the gain of the power control is determined according to the guidance given in ANNEX 14: on page 344. Since the dRSSInterfering link receiver is –37.5 dBm and:

image.png

                   

The gain of the power control (git PC) is 10 dB (Case (i+1) in ANNEX 14:). This means that the iRSSunwanted will be decreased by 10 dB, i.e. :

image.png

Finally, if the threshold is decreased from –50 dBm to –70 dBm, the power control feature is activated. Since the dRSSInterfering link receiver is –37.5 dBm, this results in:

image.png

 

The gain of the power control is 20 dB (Case (n_step + 2) in ANNEX 14:). This means that the iRSSunwanted will be decreased by 20 dB, i.e. :

image.png

 

 

4.10 Antenna gain

For simplification, we consider that the Victim link receiver and the Interfering link transmitter are defined using the following assumptions (again 1 km distance between the Interfering link transmitter and the Victim link receiver).

The iRSSunwanted is then:

iRSSunwanted = 33 (dBm) + 11 + Gr - (32.5 + 10 log(1) + 20 log(1000)) = -48.5 dBm + Gr

 

image.png

Figure 139: Definition of the antenna gain

 

 

In order to investigate the evolution of the iRSS versus the antenna radiation pattern with fixed location of the pairs of transmitters and receivers (i.e. to get random angle arrival and consequently random gain of the antenna radiation pattern), it is possible to rotate artificially the antenna pattern defined in Figure 139 in the azimuth domain. This can be done by rotating the antenna from 0 to 360 by applying a uniform distribution from 0 to 360 deg to the main beam direction (0 deg). 

 

image.png

Figure 140: Setting up the rotation in the azimuth domain

 

 

The receiver antenna gain extends from 9 dB + (0  to -50 dB) meaning that it varies from +9 dB to -41 dB depending on the azimuth angle (Figure 140), the iRSSunwanted is then :

                                           -89.5 dBm < iRSSunwanted < -39.5 dBm                                                           

Results generated by SEAMCAT are presented in Figure 141.

 

image.png

Figure 141: iRSSunwanted