Problem solve Get help with specific problems with your technologies, process and projects.

# Line-of-sight may not be good enough

## Fresnel zone clearances table for some popular frequencies and obstacle distances.

If I can see the distant end antenna, there is line-of-sight and a good microwave path. This is a trap that many...

prospective microwave users fall into. There are rules of clearance that should be obeyed or suffer the consequences. If a user does not follow the rules, the received signal at the distant end can get corrupted with multipath energy. This "corrupted" energy derives from reflections and refraction off obstacles in and around the path. The downside for the user is that more money must be spent to raise tower heights to achieve the additional clearance. If we allow 0.6 of the first Fresnel zone as clearance, we are pretty secure from corrupting multipath. As one might expect, this clearance is a function of the emitted signal's wavelength and obstacle distance from the emitter. However, here are a few 0.6 Fresnel zone clearances in the table below -- for some popular frequencies and obstacle distances (m). 0.6 fresnel zone clearances with distance to obstacle

 FREQUENCY EQUIVALENT WAVELENGTH (m) DISTANCE (m) 0.6 FRESNEL ZONE CLEARANCE MIDPATH 2000 MHz 0.15 10 0.519 m 100 1.64 m 1000 5.19 m 10,000 16.4 m 4000 MHz 0.075 10 0.612 m 100 1.16 m 1000 3.67 m 10,000 11.6 m 6000 MHz 0.05 10 0.3 m 100 0.948 m 1000 3.0 m 10,000 9.48 m 12,000 MHz 0.025 10 0.21 m 100 0.67 m 1000 2.1 m 10,000 6.7 m
The equation used to calculate the radius of the first Fresnel zone, R m, is:
R m = 17.3 Ö(d 1xd 2/FD)

Where d 1 is the distance in meters from one end of the link to the obstacle and
d 2 is the distance from the obstacle to the other end of the link such that d 1 + d 2 = D, the length of the link.
F = the frequency of the emitted signal in GHz.

The values in the right hand column of the table are 0.6 the value of Rm in each case. Increasing clearance over an obstacle implies raising tower heights which costs money. Sometimes a lesser value than 0.6 of the first Fresnel zone may be used depending on modulation type and waveform configuration. Never-the-less, we recommend keeping with the 0.6 criteria and adding a safety factor of 3 m on top of that. This will help greatly to avoid degraded error performance due this self interference phenomena.

What results when we bend these rules and decrease obstacle clearance values? More RF energy is then reflected off the obstacle and additional refracted energy gets passed to the distant receiver. This energy is delayed and tends to spill into the time slot of the following bit(s) or symbol(s) confusing the receiver. Error performance degrades as a result.

Roger Freeman has worked in telecommunications since 1946 when he joined the Navy and became an aviation radioman. Later, Roger served as a radio officer in the merchant marine for nearly 10 years. He then held several positions with ITT assigned to their Spanish Standard Electrica subsidiary. He also served the International Telecommunication Union as Regional Planning Expert for Northern Latin America based in Quito, Ecuador. Roger is bilingual. His last employee position was principal engineer with the Raytheon Company, Marlboro, MA where he took early retirement in 1991 to establish Roger Freeman Associates, Independent Consultants in Telecommunications. He has been giving seminars in telecommunication disciplines at the University of Wisconsin, Madison for nearly 20 years. Roger has been writing books on various telecommunication subjects for John Wiley & Sons since 1973. There are seven titles which he keeps current including the two-volume work, Reference Manual for Telecommunication Engineers, now in 3rd edition. He holds two degrees from NYU. His Web site is www.rogerfreeman.com and his e-mail address is rogerf67@cox.net.
This was last published in December 2004

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### 2018 ONUG conference to tackle IT disruption, building blocks

With the spring 2018 ONUG conference coming up on May 8 to 9, Nick Lippis, ONUG co-founder, discusses how IT teams are facing ...

• ### 128 Technology delivers routing software, SD-WAN on white box

128 Technology integrated its routing software and SD-WAN capabilities with white box CPEs from Lanner. Arrow Electronics will ...

• ### SD-WAN benefits the changing network connectivity landscape

In the latest networking advance, SD-WAN benefits the evolving network connectivity landscape by allowing customers to use less ...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### AV1 video codec carries clout with royalty-free status

Industry giants, including Cisco and Microsoft, have backed AOMedia's new royalty-free codec. So, what does this mean for ...

• ### BroadSoft diversifies Cisco's cloud contact center portfolio

Cisco's cloud contact center portfolio now includes BroadSoft's CC-One. The vendor will use the multi-tenant platform to target ...

• ### Will social messaging apps and Apple Business Chat supplant SMS?

The limitations of SMS are starting to emerge. Meanwhile, social messaging apps and Apple Business Chat offer richer interactions...

## SearchMobileComputing

• ### Printing from mobile devices evolves with EMM market, GDPR

With many organizations using EMM to keep track of devices, apps and data, the information that users must share with printers ...

• ### How well do you know EMM platforms?

Enterprise mobility management is made up of many different facets, including MDM and MCM. Do you know the difference between ...

• ### Explore two major user authentication methods

Both biometric and multifactor authentication can provide high levels of security. Before choosing one -- or a combination of ...

## SearchDataCenter

• ### Guide to buying server performance monitoring software

Integration, storage and vendor support all affect whether a performance monitoring tool is right for an organization. Mull over ...

• ### How IBM's data science team quickens users' AI projects

In this Q&A, IBM's Seth Dobrin discusses the rising user interest in machine learning and AI projects and the help inexperienced ...

• ### IBM blockchain technology spotlights mainframes

IBM's blockchain offerings aim to ease enterprise IT concerns by combining Z system mainframe hardware with industry-specific ...

## SearchITChannel

• ### Unified communications as a service: The next generation

New-look UCaaS solutions are opening opportunities for channel partners that can navigate differing customer needs, regulatory ...

• ### Analyst argues blockchain has no place in networking

Blockchain distributed ledger technology is untested, unproven and overly complex, making it unsuitable for networking, ...

• ### Marketing for MSP companies: Still a struggle

While managed service providers continue to struggle with marketing, the list of vendors committing to the channel sales model ...

Close