This document discusses putting spectrum allocation decisions on a more quantitative footing using risk-informed interference analysis. It outlines a four element method for risk-informed interference assessment that includes: (1) making an inventory of interference hazards, (2) defining consequence metrics, (3) assessing the likelihood and consequence of each hazard, and (4) aggregating the results. The document also provides a case study applying this method to analyze interference risks between meteorological satellite receivers and LTE mobile transmitters.
5th International Disaster and Risk Conference IDRC 2014 Integrative Risk Management - The role of science, technology & practice 24-28 August 2014 in Davos, Switzerland
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Measurement of Electromagnetic Waves Radiated from Base Transceiver Stations...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Measurement Procedures for Design and Enforcement of Harm Claim ThresholdsPierre de Vries
Presentation at DySPAN 2017, March 2017
Paper forthcoming on IEEE Xplore
Paper authors:
Janne Riihijärvi, Petri Mähönen (RWTH Aachen University, Germany)
J. Pierre de Vries (Silicon Flatirons Centre, University of Colorado, USA)
Three Spectrum Reforms - Johannesberg Summit 2014Pierre de Vries
Three spectrum reforms to improve value obtained from wireless services:
1. Reduce the ambiguity over responsibilities for interference harm by introducing Harm Claim Thresholds
2. Overcome the drawbacks of excessive control fragmentation of spectrum bands by instituting Band Agents
3. Improve the reliability and efficacy of interference dispute resolution by moving to fact-based adjudication using judges with expertise in spectrum policy
More Related Content
Similar to Risk-informed Interference Analysis: Putting spectrum allocation decisions on a more quantitative footing
5th International Disaster and Risk Conference IDRC 2014 Integrative Risk Management - The role of science, technology & practice 24-28 August 2014 in Davos, Switzerland
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Measurement of Electromagnetic Waves Radiated from Base Transceiver Stations...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Measurement Procedures for Design and Enforcement of Harm Claim ThresholdsPierre de Vries
Presentation at DySPAN 2017, March 2017
Paper forthcoming on IEEE Xplore
Paper authors:
Janne Riihijärvi, Petri Mähönen (RWTH Aachen University, Germany)
J. Pierre de Vries (Silicon Flatirons Centre, University of Colorado, USA)
Three Spectrum Reforms - Johannesberg Summit 2014Pierre de Vries
Three spectrum reforms to improve value obtained from wireless services:
1. Reduce the ambiguity over responsibilities for interference harm by introducing Harm Claim Thresholds
2. Overcome the drawbacks of excessive control fragmentation of spectrum bands by instituting Band Agents
3. Improve the reliability and efficacy of interference dispute resolution by moving to fact-based adjudication using judges with expertise in spectrum policy
A simple (simplistic) graphic interpretation of the model for core consciousness proposed by Antonio Damasio in "The Feeling of What Happens: Body and Emotion in the Making of Consciousness" (Harcourt, 1999)
Work in progress from the project to extract social network data from the FCC's ECFS database. This deck shows co-filing on docket 01-92, an inter-carrier compensation proceeding.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Risk-informed Interference Analysis: Putting spectrum allocation decisions on a more quantitative footing
1. Silicon Flatirons Center, UC Boulder
Risk-informed Interference Analysis
Putting spectrum allocation decisions
on a more quantitative footing
Pierre de Vries
Senior Adjunct Fellow, Silicon Flatirons Center, UC Boulder
Presentation at TPRC 43
26 September 2015
v. 0.4
2. Context
Insatiable demand for spectrum rights leads to
– Squeezing services together ever more tightly
– Ever-tougher harm/benefit trade-offs
This entails regulatory judgments about harmful interference
– Informed by engineering, typically (unfortunately) worst case analysis
Most agencies nowadays complement worst case with quantitative risk analysis
(NRC, EPA, FAA, FDA, NASA, DHS, etc.) -- but not the FCC
Project goal
– Put harmful interference analysis on a more quantitative, statistical footing
– … in order to yield better decisions about allocations and rules
2
3. Worst case (deterministic extreme value) analysis
Does not represent reality accurately
– Most parameters that influence harm take a range of values
Over-conservative
– Provides too much protection; doesn’t serve public interest, nor economically
efficient
Can lead to false confidence that the resulting rules will avert harm
– There are many kinds of radio interference
– e.g. LightSquared/GPS: fixated on OOBE, but ABI was the real problem
BUT: Worst case is simple, and will continue to be used
– Quickly gives a black & white answer
3
4. Risk examples: Accidents
Accident on Mount Everest
– High likelihood, high consequence
– Overall risk: very high
Skydiving accident
– Low likelihood, high consequence
– Overall risk: moderate
Falling off a bicycle
– Low likelihood, low consequence
– Overall risk: low
4
Likelihood
Low Medium High
Consequence
High
Medium
Low
EverestSkydiving
Bicycling Unicycling
5. Some terminology
Risk
– The combination of likelihood and consequence for multiple hazards
– Kaplan and Garrick’s risk triplet: What can go wrong? How likely is it? What
are the consequences?
– There are other, complementary approaches: economics, psychology,
socio-cultural analysis
Quantitative risk assessment (QRA)
– Apply risk triplet using numerical estimates of likelihoods and consequences
Risk-informed interference assessment
– A systematic analysis of the likelihood and consequence of interference
hazards caused by the interaction between radio systems
5
6. Risk-informed interference assessment
Current scope
– Planning, e.g. allocation, rulemaking, waivers
– Not post-deployment operation (e.g. adjudication & enforcement, service provider ops)
– Leave aside cost/benefit analysis
Related work in spectrum (quantitative risk analysis generally: 30+ years of literature)
– Michael Marcus, IEEE-USA (2012): Noted MCL vs. stochastic modeling, flagged lack of FCC
policy
– Grunwald, Alderfer & Baker (TPRC 2014): Holistic analysis of 5 GHz Wi-Fi/Globalstar
interference
– Littman & De Vries (TPRC 2014): Lessons for FCC from use of QRA in nuclear regulation
– FCC TAC (2015): Noted value of risk assessment in allocation decisions, proposed a method
– Cui & Weiss (TPRC 2015): QoS and monetary risk for different kinds of spectrum sharing
6
7. Four element method
1. Make an inventory of all significant harmful interference hazard
modes
2. Define a consequence metric(s) to characterize the severity of
hazards
3. Assess the likelihood and consequence of each hazard mode
4. Aggregate the results to inform decision making
7
9. Meteorological Satellite (MetSat) & LTE
1675–1710 MHz
– weather satellite receiving
earth stations
– NOAA and DoD
Focus on polar orbiting
satellites
– leave aside geostationary ones
1695–1710 MHz
– AWS-3 cellular mobile uplink
9
10. NTIA Fast Track, CSMAC WG-1 studies
Determine an interference
protection criterion (IPC):
aggregate i/f power not to be
exceeded in MetSat receiver
Assume a “sea” of LTE mobiles
Calculate the smallest radius
without mobiles that satisfies
IPC
Exclude/limit mobile ops within
this zone
Essentially worst case
10
11. 1. Make an inventory of hazards
Interference types
– Co-channel
– Out-of-band emission (OOBE)
– Adjacent band interference (ABI)
Types of interferer
– Point sources and aggregate
interference
– Unintentional and intentional
radiators
– Operators: well-meaning, ignorant or
malicious
Working taxonomy
– Interfering system (“transmitters”)
– Affected system (“receivers”)
– Coupling between transmitters &
receivers
11
12. Transmitter characteristics (LTE)
Cellular mobiles
– Transmit power per mobile, co-
channel and out-of-channel
– Frequency channel width
– Percentage loading of base station
– Location and density of mobiles
– Location and density of base
stations
12
CDF of total EIRP per scheduled mobile
Source: CSMAC (2013), Appendix 3-3
14. Transmitter-Receiver Coupling
– Propagation loss from
transmitter to receiver
– Additional losses
– Antenna heights: satellite
receiver and mobile transmitters
– Earth station antenna elevation
and azimuth
14
Propagation loss:
field measurements and fit
Source: Phillips, Sicker & Grunwald (2012)
15. 2. Define consequence metric(s)
Corporate, aka operational: Cost, ability to complete the mission
– Receiver metrics not available (indications of high baseline
outage)
Service
– Availability: the percentage of time that the link margin is not met
– Quality: bit-error ratio
RF
– Fraction of interference-free margin consumed by interference
– Interfering signal power levels (IPC) to be exceeded no more than
20% or 0.0125% of the time
– Interference-to-noise ratio in the receiver
15
16. 3. Assess likelihood & consequence
Consider co-channel interference, a la Fast Track and CSMAC
WG-1
Calculate received interfering power for each exclusion radius
Determine the probability a given power is exceeded
1. Choose -121 dBm
interference
protection criterion
(IPC)
2. Select 80th percentile, so
that IPC is exceeded no
more than 20% of the time
3. Results in a 34
km protection radius
4. Vertical “slice”
through distribution
yields distribution of
interfering power at
the 34 km radius;
see next slide
17. Probability of exceeding IPC versus radius
Vertical slice through
range/interference
chart
Choose -121 dBm
interference protection
criterion (IPC)
Meets ITU-R SA.1026
long-term IPC:
– Below IPC more than
80% of time
– i.e. exceeded less
than 20% of the time 17
Satisfies -121 dBm IPC
at 34 km exclusion distance
Interference limit
met
> 80% of the time
Likelihoo
d
Consequence
18. 4. Aggregate risks
Non-RF: equipment failure,
operator error, …
Co-channel interference
– sunspot activity
– long-term low-level i/f
– short-term high-level i/f
Interference from adjacent band
– OOBE
– ABI
18
OOBE
(hypothetical)
ITU-R long-term criterion:
with 34 km exclusion, -121
dBm exceeded less than 20%
of time
ITU-R short-term criterion:
with 34 km exclusion, -118
dBm exceeded less than
0.0125% of time (hypothetical)
Likelihoo
d
Consequence
20. Benefits of risk-informed interference assessment
A common currency for comparing
– different interference mechanisms
– competing assessments
More comprehensive analysis
– increases the chances of identifying unexpected harmful interference
mechanisms
Objective information for decision makers
– balancing the benefits of a new service and its adverse technical impact
on existing services
20
21. Action items for regulators
Educate
– Get the community thinking & talking via papers, workshops and consultations
– Develop know-how through lectures and in-house training
Set a good example
– Quantify likelihoods and consequences in own findings
– Request (ideally, require) disclosure and analysis of likelihood & consequence in
filings
Start small, but start soon
– Changing the culture is going to take a long time
– Pilot approach on low risk/impact proceedings, e.g. waivers for services at fixed
locations
21
22. Action items for the Executive & Legislature
Oversight
– Make risk-informed assessment an oversight requirement
– Don’t fall for nightmare scenarios
– Support and encourage regulators that use risk-informed interference
assessments
Require spectrum regulators to do risk analysis
– US: Extend existing requirements for risk and cost/benefit analysis (cf.
Executive Orders, OMB directives) to independent agencies
22
23. Summary
Risk analysis considers the likelihood-consequence combinations for
multiple hazards, and complements a “worst case” analysis
This will yield better spectrum allocation decisions
Four element method: (1) inventory hazards; (2) define metrics; (3)
assess likelihood & consequence; (4) aggregate
Adding this to the toolkit requires culture change, so start small – but
start soon
23
24. We are not able in life to avoid risk
but only to choose between risks
Stanley Kaplan & John Garrick (1981)
24
27. Deterministic methods and worst case analysis
Deterministic methods: evaluate risk in terms of a predetermined set of causes characterized
by single-valued parameters
– potentially interfering transmitter operating at a fixed distance
– at a fixed transmit power
– to a specific receiver
– single-valued path loss
“Worst” case: parameters take extreme values
– transmitter at closest distance
– maximum allowed transmit power
– the least interference-resistant receiver on the market
– direct path without any intervening obstructions
27
Deterministic method
doesn’t necessarily
entail using extreme
values
(but usually does)
28. Utility of extreme value analysis
Extreme value analysis can be useful
– if worst case assumptions show that a particular hazard doesn’t
pose a risk, it can be omitted from subsequent analysis
– if best case assumptions indicate that a hazard poses risks even
in favorable circumstances, further analysis is needed
Typically, though, worst case is used “illogically”
– worst case assumptions showing harm used to justify further
analysis, and perhaps even determine rules
28
29. Interference analysis: a schematic
– Interfering (transmitting)
system
– Affected (receiving)
system
– Coupling between
transmitters & receivers
29
Affected System
Characteristics
Interfering System
Characteristics
Affected System
Locations
Interfering System
Locations
Coupling
Characteristics
Likelihood and
Consequence
Metrics
Risk
Assessment
30. Probability of exceeding IPC versus radius
Horizontal slice through
range/interference chart
As radius increases,
probability that IPC will
met increases
Choose -121 dBm
interference
Meeting IPC 80% of time
means exceeded 20%
of the time: ITU-R
SA.1026 criterion
30
34 km
exclusion
distance
Interference
limit met > 80%
of the time
Co-channel transmitters
Adjacent band transmitters
Out-of-band emission (OOBE, splatter)
Adjacent band interference (blocking, overload, desensitization, spurious, …)
Non-linear effects e.g. intermodulation
Point sources and aggregate interference
Unintentional and intentional radiators
Operators: well-meaning, ignorant or malicious
… etc.