Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.2.21Keywords:
Mobile Network, Wireless Network, Energy Consumption, Multiple Sleeps, N- Policy, Finite capacity.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The primary purpose of green communication is to reduce energy use. The base station (BS) is a radio receiver/transmitter that acts as the wireless network’s hub. It serves as a link between a wired and wireless network. To receive and transmit messages, BS uses a lot of energy. The use of effective sleep and wake-up/setup activities with an acceptable delay helps reduce base station power consumption. In this paper, the BS’s service process is modelled as a finite buffer queue with close down, sleep, and setup. After a certain number of user requests (URs) have accumulated in the system, to awaken the BS from multiple sleeps (MS) the -Policy is implemented. To produce probability generating functions, the supplementary variable approach is applied. The UR’s mean delay and the BS’s mean power consumption are calculated using simulation. According to computational studies, multiple sleeps with -policy consume less power than multiple sleeps without -policy.Abstract
How to Cite
Downloads
Similar Articles
- K. S. Deepika, Ajay Massand, Influence of Social Media Marketing on Purchase Intention of Gen Z , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Anilkumar K. Varsat, Sociolinguistics competence development in the ESL classroom: Challenges and opportunities , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Brijesh Singh, Ajay Massand, Determinants of Gen Z’s adoption of chatbots in online shopping: An empirical investigation , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Suprabha Amit Kshatriya, Arvind R Yadav, Early detection of fire and smoke using motion estimation algorithms utilizing machine learning , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Ishwar Dan, Viksit Bharat @2047: A vision for India’s sustainable development , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Ayesha Shakith, L. Arockiam, EMSMOTE: Ensemble multiclass synthetic minority oversampling technique to improve accuracy of multilingual sentiment analysis on imbalance data , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Varsha Kachhela, Jalpa Rank, Charmy Kothari, Screening of environmental bacteria for multiple dye decolorization capabilities in textile wastewater , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Nida Syeda, Kishore Selva Babu, Exploring the role of digital humanities in the centralization of knowledge production: Clusters, networks, or echo chambers , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- B Supraja, B Ramachandra, N Venkatasubba Naidu, Analytical Method Development and Validation Analysis for Quantitative Assessment of Thifluzamide by HPLC Procedure , The Scientific Temper: Vol. 13 No. 01 (2022): The Scientific Temper
<< < 10 11 12 13 14 15 16 17 18 19 > >>
You may also start an advanced similarity search for this article.