Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

386 total results found

4.1 iRSSunwanted

4 Example of calculations

The following parameters should be changed in the simulation: (i) the interferer operates at 1000.3 MHz and (ii) outside the emission bandwidth, the attenuation is -23 dBc/200 kHz. The corresponding power may derived using the known equation: (Eq. 20)   ...

4.2 iRSSblocking

4 Example of calculations

Intro

4 Example of calculations 4.2 iRSSblocking

For this exercise, the blocking response from the receiver has a positive sign as shown in Figure 101. Detailed information on the calculation of the iRSSblocking can be found in section A5.2 of ANNEX 5:. Figure 101: Definition of the receiver blo...

4.2.1 User-defined mode

4 Example of calculations 4.2 iRSSblocking

In this case, the Blocking is provided in dB and represents the attenuation of the receiver at a given frequency offset (see A8.7). The resulting receiver attenuation equals the user-defined input values. Then, the iRSSblocking at the interferer operating freq...

4.2.2 Sensitivity mode

4 Example of calculations 4.2 iRSSblocking

In this calculation mode the function blockMax Interf Signal (Df) that you entered represents the absolute power level (in dBm) of maximum interfering signal (maximum acceptable interfering power), which might be tolerated by the receiver at a given frequency ...

4.2.3 Protection ratio

4 Example of calculations 4.2 iRSSblocking

This mode is identical to the “sensitivity” mode since the only difference is that the Blocking value (relative to the noise floor) is provided in dB. The software processes the information using exactly the same method to obtain the value of the receiver atte...

4.3 iRSSintermodulation

4 Example of calculations

The following graphics presents the input parameters to activate when the intermodulation mechanism is to be investigated. The intermodulation rejection mask is expressed in dB versus frequency offset (MHz). Results details can be found in Section 12.3.3. ...

4.4 iRSSoverlaoding

4 Example of calculations

The following graphics presents the input parameters to activate when the overloading mechanism is to be simulated. Figure 107: Activation of the overloading feature in SEAMCAT     The overloading mask is expressed in power (dBm) versus frequency of...

4.5 Coverage radius (VLR-VLT)

4 Example of calculations

In this section the Free Space Model is used to derive the attenuation on the different paths and the Victim Link and Interfering Link operate at the same frequency – 1000 MHz – co-channel interference. Figure 115 presents an illustration of the various radii ...

4.6 Simulation radius (ILT-VLR)

4 Example of calculations

The distance between the Victim link receiver and the Interfering link transmitter is referred to as the simulation radius (see ANNEX 13:). It can be defined as shown in Figure 117. Figure 117: Definition of the minimum distance   Using this feature...

4.7 Uniform distribution of ILT vs VLR

4 Example of calculations

You may define a uniform deployment density of terminals/transmitters per km2 (see ANNEX 13:). This can either be done by using the “Uniform Density” mode combined with the calculation of a simulation radius as described in section 4.7.1 and A13.2 or by using ...

4.7.1 Uniform density mode - simulation radius calculation

4 Example of calculations 4.7 Uniform distribution of ILT vs VLR

The number of active transmitters that will be uniformly located within the simulation radius is given by:                                                                                               (Eq. 28)   Figure 120 presents the GUI with the input valu...

4.7.2 "None" mode

4 Example of calculations 4.7 Uniform distribution of ILT vs VLR

When you select the “None” mode (see ANNEX 13:), he can also define a Uniform density of terminal/transmitter by using the Uniform polar distance defined within the path distance factor and a uniform distributed path azimuth (0 to 360 deg).Uniform polar distan...

4.8 Protection distance

4 Example of calculations

If a minimum protection distance  between the victim link receiver and interfering link transmitter is introduced then the simulation radius may then be calculated by using the following formula:                                                                 ...

4.9 Power Control

4 Example of calculations

Note: The power control is used only in this section. When considering other sections, the power control feature should be deactivated. A power control feature is implemented within SEAMCAT. When this feature is activated it introduces a variation of the inter...

4.10 Antenna gain

4 Example of calculations

For simplification, we consider that the Victim link receiver and the Interfering link transmitter are defined using the following assumptions (again 1 km distance between the Interfering link transmitter and the Victim link receiver). The iRSSunwanted is then...

5 Generic module

As mentioned earlier in this manual, virtually all radio interference scenarios on terrestrial paths can be addressed in both co-channel (sharing) and adjacent frequency (compatibility) interference studies. A number of various radiocommunications services can...

5.1 Generic system tab

5 Generic module