Krige Method Application for the Coverage Analysis of a Node-B in a WCDMA Network
نویسندگان
چکیده
This paper shows the procedure and application of the Krige Method (or Kriging) for the analysis of the power level radiated by a Base Station (also called Node B), through a group of samples of this power level, measured at different positions and distances. These samples were obtained using an spectrum analyzer, which will allow to have georeferenced measurements, to implement the interpolation process and generate coverage maps, making possible to know the power level distribution and therefore understand the behavior and performance of the Node B.
منابع مشابه
Experimental Analysis of the CPICH and Ec in a WCDMA Network
This paper presents experimental results of a coverage analysis of a WCDMA network in the 850 MHz band in an urban environment. Obtained coverage estimation maps are based on statistical interpolation method named Krige. Key performance parameters used in this work are the CPICH and Ec. The results could be used to identify problems and help to optimize cell coverage and capacity to the Service...
متن کاملExperimental Analysis of a Node B Coverage Based on the CPICH and Ec/Io Values
This paper presents experimental results of a coverage analysis in a WCDMA network using the 850 MHz band; an urban electromagnetic propagation environment is considered. Obtained coverage estimation maps are based on Krige statistical method of interpolation. Key performance parameters used in this work are the CPICH and Ec. The results could be used to identify problems and help to optimize c...
متن کاملImprovement of Coverage Algorithm in WSN in Terms of Sensor Numbers and Power Amount
Wireless sensor networks(WSN) have unique properties that distinguished them from other wireless networks and have special challenges. Not-chargeable, not-changeable and limited power supplies of sensor nodes is the most important challenge of this networks, and if the power supply of node expired, a part of data maybe lost. Because of the importance of covers in wireless sensors, in this work ...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCNS
دوره 4 شماره
صفحات -
تاریخ انتشار 2011