A robust mechanism for resource allocation with interference mitigation in femtocellular networks

Najah Abu Ali

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Interference mitigation can be particularly challenging in hybrid 4G cellular networks employing a femtocellular tier, especially given the ad hoc nature in which femtocells are deployed. So far, mitigation mechanisms have been based on simplified models assuming regular (grid-based) deployment, using average interference characterization or satisfying the SINR requirements while ignoring the required data rates. In this paper, we show that such simplifications can be relaxed. Specifically, we derive an interference mitigation mechanism assuming an ad hoc deployment. The mechanism optimizes resource allocations on per-subcarrier basis while satisfying user data rate requirements. It is also based on a rigorous cross-tier interference characterization (macro-femto, femto-femto), and utilizes robust stochastic programming techniques. Simulation results indicate great potential in our proposal as it significantly outperforms a heuristic greedy algorithm.

    Original languageEnglish
    Title of host publication2012 IEEE International Conference on Communications, ICC 2012
    Pages5048-5052
    Number of pages5
    DOIs
    Publication statusPublished - 2012
    Event2012 IEEE International Conference on Communications, ICC 2012 - Ottawa, ON, Canada
    Duration: Jun 10 2012Jun 15 2012

    Publication series

    NameIEEE International Conference on Communications
    ISSN (Print)1550-3607

    Other

    Other2012 IEEE International Conference on Communications, ICC 2012
    Country/TerritoryCanada
    CityOttawa, ON
    Period6/10/126/15/12

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'A robust mechanism for resource allocation with interference mitigation in femtocellular networks'. Together they form a unique fingerprint.

    Cite this