Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.2.21Keywords:
Mobile Network, Wireless Network, Energy Consumption, Multiple Sleeps, N- Policy, Finite capacity.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The primary purpose of green communication is to reduce energy use. The base station (BS) is a radio receiver/transmitter that acts as the wireless network’s hub. It serves as a link between a wired and wireless network. To receive and transmit messages, BS uses a lot of energy. The use of effective sleep and wake-up/setup activities with an acceptable delay helps reduce base station power consumption. In this paper, the BS’s service process is modelled as a finite buffer queue with close down, sleep, and setup. After a certain number of user requests (URs) have accumulated in the system, to awaken the BS from multiple sleeps (MS) the -Policy is implemented. To produce probability generating functions, the supplementary variable approach is applied. The UR’s mean delay and the BS’s mean power consumption are calculated using simulation. According to computational studies, multiple sleeps with -policy consume less power than multiple sleeps without -policy.Abstract
How to Cite
Downloads
Similar Articles
- Surender Singh, Rachna Thakur, Suchitra Devi, Globalization and Indian Negotiation on Agriculture , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Jonnakuti V. G. Rama Rao, Muthuvel Balasubramanian, Chaladi S. Gangabhavani, Mutyala A. Devi, Kona D. Devi, A TLBO algorithm-based optimal sizing in a standalone hybrid renewable energy system , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Rahat Yezdani, S. M. K. Quadri, A PPR-based energy-efficient VM consolidation in cloud computing , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- A. Jabeen, A. R. M. Shanavas, Hazard regressive multipoint elitist spiral search optimization for resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Pavithra M, Dr. R. Neelaveni, Muthuraman K. R , Kamalesh G, Design of an interactive smart band for intellectually disabled person , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- O. Devipriya, K. Kungumaraj, Enhancing cloud efficiency: an intelligent virtual machine selection and migration approach for VM consolidation , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Ratnakaram Raghavendra, Saila K. A. Reddy, Exploring cosmic ray energy loss mechanisms: Insights from Bethe-Bloch, modified bethe-bloch, and inverse compton scattering equations , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.