Book contents
- Frontmatter
- Contents
- Acknowledgments
- Preface
- Part I Spectrum Sharing Background
- Part II Three-Tier Dynamic Spectrum Models
- Part III Components of a Three-Tier Architecture
- Part IV Protection Processes for Incumbents and Peers
- 8 General Process for Database System Operation
- 9 Protection of Incumbent Satellite Operations
- 10 Protection to and From Terrestrial Access Points and Point-to-Point Networks
- 11 Protection to and From Radar Systems
- 12 Coexistence Between Unprotected Peer Devices
- Part V Example Use of Three-Tier Spectrum: Use of the 3.5 GHz CBRS Band in the USA
- Part VI Future Bands, Network Services, Business Models, and Technology
- Part VII Appendices
- Index
- References
10 - Protection to and From Terrestrial Access Points and Point-to-Point Networks
from Part IV - Protection Processes for Incumbents and Peers
Published online by Cambridge University Press: 30 August 2017
- Frontmatter
- Contents
- Acknowledgments
- Preface
- Part I Spectrum Sharing Background
- Part II Three-Tier Dynamic Spectrum Models
- Part III Components of a Three-Tier Architecture
- Part IV Protection Processes for Incumbents and Peers
- 8 General Process for Database System Operation
- 9 Protection of Incumbent Satellite Operations
- 10 Protection to and From Terrestrial Access Points and Point-to-Point Networks
- 11 Protection to and From Radar Systems
- 12 Coexistence Between Unprotected Peer Devices
- Part V Example Use of Three-Tier Spectrum: Use of the 3.5 GHz CBRS Band in the USA
- Part VI Future Bands, Network Services, Business Models, and Technology
- Part VII Appendices
- Index
- References
Summary
Unique Aspects of Terrestrial Protection
In this chapter, we consider the protection of terrestrial networks from other sources of interference and the reverse problem: how to characterize the aggregate ecosystem impact of terrestrial networks on other terrestrial, space, or sensor networks. Much of the necessary material has been developed in the prior chapters, so this chapter will only introduce, or further refine, the additional elements of interference analysis necessary to fully integrate terrestrial network protection into a fully functional three-tier spectrum regime.
We differentiate access point protection from other point-to-point protection mechanisms because an access point implies that the access point node itself is not the sole protected entity; it also implies a potential cloud of user devices, or clients, that must be protected from interference. Similarly, if an Access Point (AP) is a potential source of interference, the AP is not the sole source of the network's interference, as the cloud of devices that surrounds it may be sources of interference, as well as the access point itself.
In the case of point-to-point networks, we assume a (typically) directional antenna at each endpoint, and protection driven by the angular susceptibility of the receive systems in use. Of course, these two are the notional, but not the only, cases, and some network architectures may make use of hybrids between these two alternatives which will require some integration of both of these “pure” cases.
There are a very wide range of technologies in use in terrestrial networks, and it is likely as networks move from 4th-Generation Wireless (4G) to Fifth-Generation Wireless Systems (5G) technology (whatever 5G turns out to be), and from networks typically below 6 GHz to networks above 20 GHz. There are a wide range of potential topologies that will have to be introduced into themodel. Ten years from now, the simple model laid out in earlier chapters will have to be significantly extended, and made more complicated, to address these emerging topologies and the adaptive nature of many of these technologies.
- Type
- Chapter
- Information
- Publisher: Cambridge University PressPrint publication year: 2017