Krige Method Application for the Coverage Analysis of a Node-B in a WCDMA Network

نویسندگان

  • Jazmín Ponce-Rojas
  • Sergio Vidal-Beltrán
  • José L. López-Bonilla
  • Montserrat Jiménez-Licea
چکیده

This paper shows the procedure and application of the Krige Method (or Kriging) for the analysis of the power level radiated by a Base Station (also called Node B), through a group of samples of this power level, measured at different positions and distances. These samples were obtained using an spectrum analyzer, which will allow to have georeferenced measurements, to implement the interpolation process and generate coverage maps, making possible to know the power level distribution and therefore understand the behavior and performance of the Node B.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Experimental Analysis of the CPICH and Ec in a WCDMA Network

This paper presents experimental results of a coverage analysis of a WCDMA network in the 850 MHz band in an urban environment. Obtained coverage estimation maps are based on statistical interpolation method named Krige. Key performance parameters used in this work are the CPICH and Ec. The results could be used to identify problems and help to optimize cell coverage and capacity to the Service...

متن کامل

Experimental Analysis of a Node B Coverage Based on the CPICH and Ec/Io Values

This paper presents experimental results of a coverage analysis in a WCDMA network using the 850 MHz band; an urban electromagnetic propagation environment is considered. Obtained coverage estimation maps are based on Krige statistical method of interpolation. Key performance parameters used in this work are the CPICH and Ec. The results could be used to identify problems and help to optimize c...

متن کامل

Improvement of Coverage Algorithm in WSN in Terms of Sensor Numbers and Power Amount

Wireless sensor networks(WSN) have unique properties that distinguished them from other wireless networks and have special challenges. Not-chargeable, not-changeable and limited power supplies of sensor nodes is the most important challenge of this networks, and if the power supply of node expired, a part of data maybe lost. Because of the importance of covers in wireless sensors, in this work ...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCNS

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2011