On the statistics of uplink inter-cell interference with greedy resource allocation

Hina Tabassum, Ferkan Yilmaz, Zaher Dawy, Mohamed-Slim Alouini

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations


In this paper, we introduce a new methodology to model the uplink inter-cell interference (ICI) in wireless cellular networks. The model takes into account both the effect of channel statistics (i.e., path loss, shadowing, fading) and the resource allocation scheme in the interfering cells. Firstly, we derive a semi-analytical expression for the distribution of the locations of the allocated user in a given cell considering greedy resource allocation with maximum signal-to-noise ratio (SNR) criterion. Based on this, we derive the distribution of the uplink ICI from one neighboring cell. Next, we compute the moment generating function (MGF) of the cumulative ICI observed from all neighboring cells and discuss some examples. Finally, we utilize the derived expressions to evaluate the outage probability in the network. In order to validate the accuracy of the developed semi-analytical expressions, we present comparison results with Monte Carlo simulations. The major benefit of the proposed mechanism is that it helps in estimating the distribution of ICI without the knowledge of instantaneous resource allocations in the neighbor cells. The proposed methodology applies to any shadowing and fading distributions. Moreover, it can be used to evaluate important network performance metrics numerically without the need for time-consuming Monte Carlo simulations. © 2011 IEEE.
Original languageEnglish (US)
Title of host publication2011 8th International Symposium on Wireless Communication Systems
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages5
ISBN (Print)9781612844022
StatePublished - Jan 27 2012

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01


Dive into the research topics of 'On the statistics of uplink inter-cell interference with greedy resource allocation'. Together they form a unique fingerprint.

Cite this