Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.2.21Keywords:
Mobile Network, Wireless Network, Energy Consumption, Multiple Sleeps, N- Policy, Finite capacity.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The primary purpose of green communication is to reduce energy use. The base station (BS) is a radio receiver/transmitter that acts as the wireless network’s hub. It serves as a link between a wired and wireless network. To receive and transmit messages, BS uses a lot of energy. The use of effective sleep and wake-up/setup activities with an acceptable delay helps reduce base station power consumption. In this paper, the BS’s service process is modelled as a finite buffer queue with close down, sleep, and setup. After a certain number of user requests (URs) have accumulated in the system, to awaken the BS from multiple sleeps (MS) the -Policy is implemented. To produce probability generating functions, the supplementary variable approach is applied. The UR’s mean delay and the BS’s mean power consumption are calculated using simulation. According to computational studies, multiple sleeps with -policy consume less power than multiple sleeps without -policy.Abstract
How to Cite
Downloads
Similar Articles
- Archana Dhamotharan, Kanthalakshmi Srinivasan, Analog Circuits Based Fault Diagnosis using ANN and SVM , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Amanda Quist Okronipa, Isaac Asampana, Jones Yeboah Nyame, Exploring e-learning system loyalty: The role of system quality and satisfaction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Koyel Naskar, Urmi Satyan, Celebration and protest in art: a Comparative Study of Australia’s Corroboree and West Bengal’s Gambhira as Forms of Socio-Cultural Expression , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- N.S.G. Ganesh, V Arulkumar, R. Lathamanju, Priscilla Joy , Energetic and highly reliable photovoltaic power source assisted water pump control system design using IoT , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Neeraj, Anita Singhrova, A critical review of blockchain-based authentication techniques , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Prerna Khanna, Satinder Kumar, Exploring the expansion trajectory of the Indian automobile sector , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pallavi M. Shimpi, Nitin N. Pise, Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Kanthalakshmi S, Nikitha M. S, Pradeepa G, Classification of weld defects using machine vision using convolutional neural network , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Shiny Bridgette I, Rexlin Jeyakumari S, Fuzzy inventory model with warehouse limits and carbon emission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 11 12 13 14 15 16 17 18 19 20 > >>
You may also start an advanced similarity search for this article.

