hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.2.2 Evaluation of UML | UML is particularly used in the information and computational viewpoints of ODP. Although UML could also be applied to other ODP viewpoints, there is currently limited application to these. Since a large number of protocols with which IN needs to interwork are already specified in ASN.1 and SDL, it might be considered ... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.3 TINA | |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.3.1 Introduction to TINA | TINA provides an approach based on ODP and UML and OMG CORBA concepts. This means e.g. that TINA applies the five view points defined ODP. In this section the technology viewpoint is not considered since it is not relevant with respect to IN service modelling. |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.3.2 TINA business modelling | TINA aims to provide a common architecture that can be applied to different service scenarios. It ensures that TINA entities (business roles) can interact in a multi-stakeholder/multi-vendor environment. The TINA reference architecture identifies a number of generic reference points. These reference points specify the ... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.3.3 TINA information modelling | For information modelling TINA uses TINA-C, "Information Modelling Concepts", a notation which is a form of GDMO (Guidelines for the Definition of Managed Objects) with GRM (General Relationship Model). See also TINA–C, "Overall Concepts and Principles of TINA", ISO/IEC DIS 10165-4 | ITU-T Recommendation X.722 [6] and ... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.3.4 TINA computational modelling | TINA applies the TINA ODL (Object Definition Language) for computational modelling. ODL enhances OMG IDL (Interface Definition Language) (see "The OMG Object Model"). An example of an enhancement is the specification of objects that are made up of one or more interfaces. OMG IDL does not have the notion of objects with... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 7.3.5 Evaluation of TINA | TINA is an application of ODP on telecommunications services. TINA is a promising approach for service modelling and is likely to meet most of the service modelling requirements. Although TINA concepts seem to be successfully applicable to IN service modelling, there is currently limited application. Moreover, support ... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.1 Introduction to Video-on-Demand | The VoD Service, as described in [1], provides for the transfer of digitally compressed and encoded video/audio information across a telecommunications network. The source is termed a Video Server and the destination will usually be a Set-Top Box (STB). Commands from the user are relayed across a network to the Video S... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.2 Video-on-Demand business model | Based on the business roles described in subclause 7.3.2, the business model proposed for the VoD Service is shown in Figure 7. Consumer STB Connectivity Provider CNP & ANP Retailer L1GW Ret TCon TCon ConS CSLN LNFed TCon ConS 3Pty 3Pty Service Provider VoD SP Figure 7: Video-on-Demand business model The following busi... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.3 Video-on-Demand computational model | The VoD computational model is based on the TINA service architecture (see TINA-C, "Service Architecture"). This subclause shows as an example of computational modelling four service provisioning steps based on the VoD service architecture: Step 1: User Access, Authentication, and Authorization; Step 2: VoD Service Sel... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.3.1 Introduction of components in the VoD computational model | This subclause shows the overall computational model for Video-on-Demand and briefly introduces the different components used in the Video-on-Demand computational model. UAP namedUAL1GW SSML1GW SFL1GW TCSM CSML1GW VoD_SP CM COs CM COs NPs PAL1GW SubCOsL1GW AccCOsL1GW PAVoD_SP IAL1GW STB L1GW namedUAVoD_SP SFVoD_SP SSMV... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.3.2 User access, authentication and authorization | SSML1GW SFL1GW TCSM CSML1GW PAL1GW SubCOsL1GW AccCOsL1GW PAVoD_SP IAL1GW STB L1GW USML1GW namedUAL1GW UAP 2,5 1,4 6 3 7 Figure 9: User Access, Authentication and Authorization 1) STB - UAP: the user activates the UAP (via the STB) to initiate an access session - when started the UAP prompts the user to enter his user I... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.3.3 VoD service selection and instantiation | namedUAL1GW SFL1GW PAL1GW SubCOsL1GW AccCOsL1GW IAL1GW STB L1GW USML1GW Instantiate TCSM CSML1GW PAVoD_SP SSML1GW UAP 10 1 2,8 3,7 4 5,6 9 Figure 10: VoD Service Session and Instantiation ETSI TR 101 665 V1.1.1 (1999-04) 22 1-3) STB - UAP - PAL1GW - namedUAL1GW: from the list of services the user selects the VoD Servic... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.3.4 VoD service provider selection | namedUAL1GW SSML1GW SFL1GW VoD_SP PAL1GW SubCOsL1GW AccCOsL1GW PAVoD_SP IAL1GW STB L1GW namedUAVoD_SP SFVoD_SP SSMVoD_SP SubCOsVoD_SP AccCOsVoD_SP Video Server IAVoD_SP USML1GW USMVoD_SP Instantiate TCSM CSML1GW UAP 1,11 2,10 3 4 6 7 8 9 12 Figure 11: VoD Service Provider Selection 1-3) STB - UAP - USM(SSM)L1GW - PAVoD... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 8.3.5 VoD content selection | UAP namedUAL1GW SSML1GW SFL1GW VoD_SP PAL1GW SubCOsL1GW AccCOsL1GW PAVoD_SP IAL1GW STB L1GW namedUAVoD_SP SFVoD_SP SSMVoD_SP SubCOsVoD_SP AccCOsVoD_SP Video Server IAVoD_SP USML1GW USMVoD_SP TCSM CSML1GW 2 3 4 1 Figure 12: VoD Content Selection 1-4) STB - UAP - USM(SSM)L1GW - USM(SSM)VoD_SP - Video Server: the user sel... |
a34988f69711a1482d1521f3ced6fd66 | 101 665 | 9 Conclusions | The present document contains a first study on service modelling for IN CS-4. The document described the requirements important for IN service modelling. Then the shortcomings of the SIB approach used for service modelling in IN CS-2 were illustrated, followed by the rationale for using object orientation in IN CS-4 se... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 1 Scope | The present document describes security features which may be used in conjunction with the interconnection of two IN structured networks. The purpose of the present document is to establish a set of technical requirements in order to meet the threats identified and analysed in a previous document. Those main threats du... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 2 References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. • For a specific reference, subsequent revisions do not apply. • Fo... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 3 Definitions and abbreviations | |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: masquerade (spoofing): pretence of an entity to be a different entity. This may be a basis for other threats like unauthorized access or forgery unauthorized access: entity attempts to access data in violation to the security policy in... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: IN CS2 IN Capability Set 2 IN CS3 IN Capability Set 3 IN CS 4 IN Capability Set 4 IN Intelligent Network IP Internet Protocol OSF Operation System Function SCP Service Control Point SDP Service Data Point SMP Service Management Point TMN Telec... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 4 Ordered list of threats | The following table gives the main threats and their risk identified during the threat analysis (see TR 101 365 [3]). The threats identified with a high risk are listed first, then the threats identified with medium risk and last the threats identified with low risk. The reference column refers to the threat analysis d... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5 Security Features | In this clause, possible efficient security measures are described in details. For each of them, some examples of attacks on the IN interconnecting interfaces shown in figure 1 are given. IP SDP SCP SSP SDP SCP SSP Network operator or service provider A Network operator or service provider B IN entities In interconnect... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.1 Access control | Access control is the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner. Access control can be used to protect physical entities, software, data and the use of services. The SCP and the SCP require a particularly efficient access control system as they... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.1.1 Access Control to Services | Prior to accessing IN services, an access control mechanism can check that the user has the access rights to use this service. Access control to the IN service or to certain service functions can be seen as a combined process with identification and authentication of the involved parties, and subsequent authorization t... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.1.2 Access control to data | Users, other networks and differing members of the network operator's staff can access different part of the overall database. It is important to preserve the rights of access to each database. An access control mechanism may include authentication and can restrict access to parts of a database. ETSI TR 101 664 V1.1.1 ... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.1.3 Access control to software | The access to computers' operating software can be controlled. This is particularly important with respect to insertion of viruses. Authentication of personnel and access control in the IN systems may be provided. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.1.4 Access control to hardware | Hardware can be protected against unauthorized actions either from the IN staff or intruders. Authentication of personnel and access control in the IN environment may be provided. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.2 Authentication | Authentication is a property by which the correct identity of an entity or party is established with a required assurance. Authentication is possible for several purposes and between several entities. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.2.1 Authentication between IN entities | Authentication (mutual or unilateral) of the IN entities (SCP and SDP in the interworking case as it is described in figure 1) can be provided for all request or command. The use of MAC can be a mechanism providing an implicit authentication. With a good authentication scheme, an SCP or SDP can be sure of the identity ... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.3 Confidentiality | Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities or processes. It may be used to protect personal communications, personal data, and signalling data. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.3.1 Confidentiality of data transmitted between IN entities | Security and other sensitive data such as session keys authentication data and personal data when sent between two networks can be protected by a number of mechanisms. Encryption is one such mechanism. It will be used to meet the threats 3 and 4. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.3.2 Confidentiality of communications | Some communications could be very interesting for an intruder to eavesdrop. Message sent between two IN entities can be protected by a number of mechanisms. Encryption is one such mechanism. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.3.3 Confidentiality of signalling | The occurrence of a communication may also need to be protected by confidentiality mechanism. ETSI TR 101 664 V1.1.1 (1999-04) 10 |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.4 Data integrity | Integrity mechanisms ensure the prevention of unauthorized or accidental modification or deletion of information. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.4.1 Transmitted data integrity | Data integrity mechanisms can be provided in the IN network for data transfers including: specified call forwarding number, call record data, billing records, messages between entities. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.4.2 Stored data integrity | The update of data may be protected by use of relevant authentication and access control mechanisms. The service profile of each user for instance may be changed by an intruder or accidentally by the staff. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.4.3 Data backup and recovery | To prevent loss of information due to unexpected events, regular backup of sensitive data may be performed. |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.5 Event and fraud monitoring | Recording and reporting the use of security services will allow the network operator to conduct security audits in order to detect actual threats against the IN system. Such audits may be used to investigate unauthorized change of database or abnormal patterns or misbehaviour or abuses. The following data may be audite... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 5.6 Non repudiation | A non repudiation system is a system avoiding the denial of one entity involved in a communication of having participated in all or part of the communication. This kind of scheme is particularly useful regarding charging aspects. If some charging information are transmitted over the IN interworking interfaces such a sc... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 6 Analysis of threats & possible protection features | The following table gives the possible countermeasures to meet the list of threats identified as the main important ones in ETR 083 [2]. The threats are ordered from the most important ones to the less important one according to the risk assessment evaluated in ETR 083 [2]. Therefore the security measures meeting the f... |
3dcc8f7351e520e90c41d6e27e526362 | 101 664 | 7 Conclusion | The security features described in clause 6 offer the capability to meet to some extent almost all the threats identified. The way to use them and to implement them is the subject of the next document. The security architecture for IN systems will mainly rely on those security features. IN CS4 has not been considered d... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 1 Scope | The present document gives guidance on the compatibility of Point-to-Multipoint digital radio fixed service systems intended to operate in the same frequency band and in near or identical geographical location, using different access methods and characteristics. Furthermore, it outlines the strategy for compatibility b... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 2 References | For the purposes of this Technical Report (TR), the following references apply: [1] ETSI EN 302 085: "Fixed Radio Systems; Point-to-Multipoint Antennas; Antennas for point-to- multipoint fixed radio systems in the 3 GHz to 11 GHz band". [2] ETSI EN 300 833: "Fixed Radio Systems; Point to Point Antennas; Antennas for po... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 3 Definitions, symbols and abbreviations | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 3.1 Definitions | For the purposes of the present document, the following definitions apply: Frequency Block: Bandwidth assigned to an operator by a regulatory authority for the operation of a P-MP system within a defined service area Class A interference: This class (and its sub classes of interference A1, A2, A3 and A4) refer to the i... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 3.2 Symbols | For the purposes of the present document, the following symbols apply: C/I Carrier to Interference ratio dB decibel dBm decibels relative to one milliwatt GHz GigaHertz kbit/s kilobits per second km kilometre m metre Mbit/s megabits per second MHz MegaHertz |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: ATPC Automatic transmit power control BER Bit Error Ratio CDMA Code Division Multiple Access CRS Central radio station DL Downlink EIRP Effectively Isotropic Radiated Power EN European Standard FB Frequency block FDD Frequency Division Duplex ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4 Executive summary | This clause contains an executive summary on the report contents and, in particular, on the conclusions derived from the report. The summary is introduced by a general overview on P-MP and P-P radio systems considered in the present document. In particular, the TM4 EN's classification of radio equipment and antennas ac... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.1 P-MP systems | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.1.1 P-MP equipment | For P-MP equipments the frequency bands are usually grouped as follows: • below 1 GHz; • between 1 GHz and 3 GHz; • between 3 GHz and 11 GHz; • between 24,5 GHz and 29,5 GHz; • between 40,5 GHz and 43,5 GHz. Each of TM4 EN's standards, related to a specific access method (TDMA, MC-TDMA, FDMA, DS-CDMA, FH-CDMA, DS-CD/TD... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.1.2 P-MP antenna | The TM4 EN's standards regarding P-MP antennas are usually grouped as follows: • between 1 GHz and 3 GHz; • between 3 GHz and 11 GHz; • between 24 GHz and 30 GHz; • between 40,5 GHz and 43,5 GHz. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.2 P-P systems | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.2.1 P-P equipment | TM4 EN's for P-P equipment specify different classes of systems, depending on channel spacing, order of modulation and capacity, in many of the frequency bands between 1 GHz and 60 GHz. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.2.2 P-P antenna | The TM4 EN's standards regarding P-P antennas are usually grouped as follows: • between 1 GHz and 3 GHz; • between 3 GHz and 60 GHz. ETSI ETSI TR 101 853 V1.1.1 (2000-10) 9 |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 4.3 Executive summary | The present document deals with the problem of co-existence between P-MP and P-P equipment, operated by different network operators, using the same frequency band and the same geographical area. In clause 5 are defined all the possible combinations (classes) of interference between two P-MP systems and between a P-P an... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5 P-MP and P-P deployment scenario | In this clause are reported general considerations upon P-MP and P-P radio networks, on the kind of interference considered in the present document and on propagation conditions. It is also described a quite general set of interference scenarios in order to define the interference classes to be studied in the following... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.1 P-MP radio networks | P-MP systems will be installed in frequency bands starting from below 1 GHz up to 40 GHz (see clause 4), and in the future even higher. In each frequency band propagation characteristics, available bandwidth dictated by the regulation specific to that band, as well as system characteristics will constrain the P-MP syst... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.2 P-P radio networks | P-P systems will be installed in frequency bands starting from 1 GHz up to 58 GHz (see clause 4), and in the future even higher. In each frequency band propagation characteristics, available bandwidth dictated by the regulation specific to that band, as well as system characteristics will constrain the P-P system appli... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.3 Interference to be studied | The interference between P-MP systems which is covered in the present document is mainly concentrated on the interference of P-MP systems belonging to cells operated by different network operators serving the same area that is the so called Inter-Cell Interference (IRCI). Nevertheless a lot of information in respect to... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.4 Propagation considerations | Only Fixed Service P-MP and P-P systems operation (no mobility) are of interest. The characteristics of the propagation, i.e. the channel model which have to be taken into account when the usage of such a systems are considered, depends on the frequency band, the bit rate transported over the air and the channel spacin... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.5 Interference scenarios | Considering the actual constraints given by ERC recommendations about spectrum arrangement and the possible systems that could be allocated in the same frequency bands there are the following combinations of possible interference to be analysed. ETSI ETSI TR 101 853 V1.1.1 (2000-10) 12 |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.5.1 P-MP FDD/FDD combinations | There are two possible arrangements of two FDD P-MP systems to be considered (see note): NOTE: Usually, only case 1 occurs within any country because each administration defines which sub band to use for downstream and which to use for upstream. Case 2 may only occur on the boundary of two country that uses different s... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.5.2 P-MP FDD/TDD combinations | There are two possible arrangements of a FDD P-MP system and a TDD P-MP system to be considered: 1) the TDD system is allocated near the FDD downlink channel; 2) the TDD system is allocated near the FDD uplink channel, as depicted in figure 2. Frequency Frequency Band Gap Sub-band 1 Sub-band 2 FDD Dwn TDD Up/Dwn FDD Up... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.5.3 P-MP TDD/TDD combinations | There is only one possible arrangement of two TDD P-MP systems given the channel adjacency because each system uses only one channel for both uplink and downlink. Given this situation two cases shall be considered depending on the synchronization (time domain) or not of the two systems. 1) TDD systems synchronized: it ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 5.5.4 P-MP/P-P combinations | There are two possible arrangements of a FDD P-MP system and a P-P system to be considered: 1) The P-P channel is allocated near the FDD downlink channel; 2) the P-P channel is allocated near the FDD uplink channel, as depicted in figure 3. Frequency Frequency Band Gap Sub-band 1 Sub-band 2 FDD Dwn PP Rx or Tx FDD Up F... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.1 Basic assumptions and objectives of the study | In order to evaluate the effects of the interference (classes A1, A2, A3 and A4) of two P-MP systems operating on adjacent channels (using the same polarization) all over the cell area, a simple but general scenario shall be considered. The main assumptions regarding the general scenario are the following. • For both t... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.2 Analysis methodology | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.2.1 Net filter discrimination | The physical phenomenon that could generate interference among two systems operating on adjacent channels is represented by the portion of the spectrum, emitted by the interfering (I) system, that is in the band of the useful (U) system receiving filter. This situation is depicted in figure 4 where both the receiving f... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.2.2 Class A1 analysis | This class regards the interference from the CRS of the interfering system to a TS of the useful system. The generic scenario to be considered is depicted in figure 5, characterized with some other elements for the analysis of interference on downlink, i.e. the link from the useful radio base station (CRSu) to the user... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.2.3 Class A2 analysis | This class regards the interference from a TS of the interfering system to the CRS of the useful system. The generic scenario to be considered for uplink analysis is reported in figure 6 where are also indicated, for both cells, the central radio stations (CRSu, CRSi) and the position of terminal stations (TSu, TSi). θ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.3 Worst case analysis | Once analysed the effects of interference all over the useful cell area for the four different scenarios it is useful to consider also the worst case of interference in terms of relative position (of source and victim of interference) and propagation conditions. This scenario, valid for all the four interference classe... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.4 Required P-MP system parameters | In this clause will be listed the system parameters necessary to accomplish the analysis of different interference classes described in clauses 6.2 and 6.3. A definition and a brief discussion on each parameter is carried out, distinguishing between parameters available and not available from the ETSI standard. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.4.1 System parameters available from EN's | • Multiple access method: depending whether the system uses TDMA or CDMA or FDMA access technique different changes shall be applied to analysis methodology. In particular the changes regard the transmitted power to be considered for useful and interfered system. • Frequency bands: the absolute frequency is very import... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.4.2 Systems parameters not available from EN's | • Nominal output power: it is the maximum power generated by the RF power amplifiers of the system and declared by the manufacturer. The nominal output power is usually well short of the specified "Maximum transmitter output power". • Actual receiver sensitivity: the actual receiver sensitivity could be lower than the ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5 Parameters for the evaluation of the degree of interference | Given the previous methodologies for class A interference situations and the considerations regarding the parameters requested for the interference analysis two important classes of parameters must be defined to accomplish a coherent analysis of the degree of co-existence between two P-MP systems. The first class, boun... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.1 Boundary conditions | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.1.1 Frequency band and channel arrangement | The operating frequency band of the systems is the key parameter to define which ETSI standard must be used to pick up system's parameters and to evaluate free space attenuation. The channel arrangement (channel spacing and frequency adjacency between the two systems) must be used to choose which classes (A1, A2, A3 an... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.1.2 Receiver sensitivity, degradation and inter-system interference | To carry out the analysis of intra-system interference between two operators also the inter-system interference (due to cellular planning) must be considered. The simplest way to accomplish the analysis is the following. Provided that in ETSI standards the minimum threshold degradation (on receiver sensitivity at BER=1... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.1.3 Margin on receiver sensitivity | The link (or fade) margin ( M th ) on receiver sensitivity is the margin considered during the planning phase of the system development. In the interference analysis there are two ways to consider this parameter. 1) The power margins used in the analysis are equal to those used during the cell planning; this allows to ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.1.4 Cells radius | The cell radius defines the cell area where the interference will be evaluated or the source of interference will be placed. Therefore, the maximum radius, once given the system parameters and a reasonable margin, shall be considered. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.1.5 Antenna pattern and gain | The antenna parameters are very important in the evaluation of the interference. If the actual values of antenna pattern are not available it is possible to use the masks reported in the relevant ETSI standard for P-MP antennas. Indeed, for the antenna gain is necessary to have the actual values. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.2 Evaluation parameters | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.2.1 Class A1 evaluation parameters | The simplest evaluation parameter is the minimum distance equation (24) between the useful TS and the interfering CRS in worst propagation conditions. The smaller is the distance the better is the degree of co-existence. Another evaluation parameter is the difference (∆[C/I]) between the C/I evaluated for co-sited CRS'... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.2.2 Class A2 evaluation parameters | Due to the symmetry (pointed out in clause 6.3) of this class of interference with respect class A1 the same evaluation parameters described in clause 6.5.2.1 hold. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.2.3 Class A3 evaluation parameters | This class considers the interference between the useful and interfering CRS and there is only one parameter to evaluate the degree of co-existence. This is the minimum distance between CRS's provided by equation (16) or (24), depending on the propagation conditions considered. It must be pointed out that this kind of ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 6.5.2.4 Class A4 evaluation parameters | The simplest evaluation parameter is the minimum distance equation (24) between the useful TS and the interfering TS in worst propagation conditions. As already pointed out in clause 6.3 this parameter is less significant that in classes A1, A2 and A3 because of the low probability to have TS in LOS and the TS antenna ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.1 Basic assumptions and objectives of the study | In order to evaluate the effects of the interference (classes B1, B2, B3 and B4) of a P-MP and a P-P system operating on adjacent channels (using the same polarization) all over the cell area, a simple but general scenario shall be considered. The main assumptions regarding the general scenario are the following. • For... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.2 Analysis methodology | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.2.1 Net filter discrimination | The same evaluation method described in clause 6.2.1 holds. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.2.2 Class B1 analysis | This class regards the interference from the CRS of the P-MP system to the P-P system. The generic scenario to be considered is depicted in figure 10, where the geometric parameters (d and θ) are shown. The P-P station considered for the interference is P-P, while P-P' is depicted only for a better understanding of the... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.2.5 Class B4 analysis | This class regards the interference from the P-P system to the TS of the P-MP system. The generic scenario to be considered is depicted in figure 13, where, in addition to the general geometric parameters (d and θ), the two decoupling angles (α and β) between TS and P-P are shown. CRS PP θ d PMP cell TS α β d2 d1 PP’ F... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.3 Required P-MP system parameters | The required parameters, for the P-MP system, in order to carry out the P-MP/P-P interference analysis are the same reported in clause 6.4. |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.4 Required P-P system parameters | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.4.1 System parameters available from EN's | • Frequency bands: the absolute frequency is very important in order to evaluate minimum distances. In general the frequency band of systems influences other parameters, such as antenna gain and antenna pattern. • Channel arrangements: this determines which classes (one or more) of interference shall be considered, as ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.4.2 Systems parameters not available from EN's | • Nominal output power: it is the maximum power generated by the RF power amplifiers of the system and declared by the manufacturer. The nominal output power is usually well short of the specified "Maximum transmitter output power". • Actual receiver sensitivity: the actual receiver sensitivity could be lower than the ... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.5 Parameters for the evaluation of the degree of interference | Given the previous methodologies for class B interference situations and the considerations regarding the parameters requested for the interference analysis two important classes of parameters must be defined to accomplish a coherent analysis of the degree of co-existence between a P-MP and a P-P system. The first clas... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.5.1 Boundary conditions | |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.5.1.1 Frequency band and channel arrangement | The operating frequency band of the systems is the key parameter to define which ETSI standard must be used to pick up system's parameters and to evaluate free space attenuation. The channel arrangement (channel spacing and frequency adjacency between the two systems) must be used to choose which classes (B1, B2, B3 an... |
41869e024dc6b21d4da074944c39ada9 | 101 853 | 7.5.1.2 Receiver sensitivity, degradation and inter-system interference | To carry out the analysis of intra-system interference between P-P and P-MP systems also the inter-system interference (due to cellular planning for P-MP system and link planning for P-P system) must be considered. The simplest way to accomplish the analysis is the following. Provided that in ETSI standards the minimum... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.