Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.2.21Keywords:
Mobile Network, Wireless Network, Energy Consumption, Multiple Sleeps, N- Policy, Finite capacity.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The primary purpose of green communication is to reduce energy use. The base station (BS) is a radio receiver/transmitter that acts as the wireless network’s hub. It serves as a link between a wired and wireless network. To receive and transmit messages, BS uses a lot of energy. The use of effective sleep and wake-up/setup activities with an acceptable delay helps reduce base station power consumption. In this paper, the BS’s service process is modelled as a finite buffer queue with close down, sleep, and setup. After a certain number of user requests (URs) have accumulated in the system, to awaken the BS from multiple sleeps (MS) the -Policy is implemented. To produce probability generating functions, the supplementary variable approach is applied. The UR’s mean delay and the BS’s mean power consumption are calculated using simulation. According to computational studies, multiple sleeps with -policy consume less power than multiple sleeps without -policy.Abstract
How to Cite
Downloads
Similar Articles
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Deepa, I.S. Arafat, M. Sathya Priya, S. Saravanan, An improved spectrum sharing strategy evaluation over wireless network framework to perform error free communications , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- V. Umadevi, S. Ranganathan, IoT based energy aware local approximated MapReduce fuzzy clustering for smart healthcare data transmission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Prince Williams, Nilesh M. Patil, Allanki S. Rao, Chandra M. V. S. Akana, K. Soujanya, Aakansha M. Steele, Transformative effects of connectivity technologies on urban infrastructure and services in smart cities , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- K. Akila, Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

