Efficient User Scheduling for Uplink Hybrid Satellite-Terrestrial Communication
Abstract
Due to increasing demands of seamless connection and massive information exchange across the world, the integrated satellite-terrestrial communication systems develop rapidly. To shed lights on the design of this system, we consider an uplink communication model consisting of a single satellite, a single terrestrial station and multiple ground users. The terrestrial station uses decode-and-forward (DF) to facilitate the communication between ground users and the satellite. The channel between the satellite and the terrestrial station is assumed to be a quasi-static shadowed Rician fading channel, while the channels between the terrestrial station and ground users are assumed to experience independent quasi-static Rayleigh fading. We consider two cases of channel state information (CSI) availability. When instantaneous CSI is available, we derive the instantaneous achievable sum rate of all ground users and formulate an optimization problem to maximize the sum rate. When only channel distribution information (CDI) is available, we derive a closed-form expression for the outage probability and formulate another optimization problem to minimize the outage probability. Both optimization problems correspond to scheduling algorithms for ground users. For both cases, we propose low-complexity user scheduling algorithms and demonstrate the efficiency of our scheduling algorithms via numerical simulations.
Index Terms:
Hybrid satellite-terrestrial communication systems, decode-and-forward, user scheduling, outage probability, space-air-ground integrated networksI Introduction
To expand communication to a broader coverage area and meet the demand of higher throughput [1, 2], satellite communication systems have been extensively studied and utilized across the world. Due to heavy shadowing caused by obstacles when the user moving into buildings or vegetation areas, the line-of-sight (LOS) link between the satellite and terrestrial users might be unavailable [3]. To combat the performance degradation, hybrid satellite-terrestrial relay systems are proposed to improve coverage and reliability of satellite communication with the aid of terrestrial relays [4, 5, 6]. Most current hybrid satellite-terrestrial systems adopt either amplify-and forward (AF) or decode-and-forward (DF) [7, 8] relaying technique.
For a hybrid satellite-terrestrial system, the performance is strongly related to the design of multiuser access schemes [8], relay selection methods [9] and power allocation strategies [10]. For satellite-terrestrial systems with a single relay, multiuser access schemes, especially user scheduling algorithms, are critical and should be optimized jointly with power allocation schemes. Furthermore, the development of integrated space-terrestrial information network (SIN) and the 6th Generation (6G) communication architecture enforces the system to allow access of massive number of devices. To meet the extremely high throughout and massive connectivity demands of future communication systems, it is vital to comprehensively study efficient user scheduling strategies with low complexity for hybrid satellite-terrestrial communication systems.
To shed lights on the design of such a system, we study user scheduling algorithms for the hybrid satellite-terrestrial model with a single satellite, a single terrestrial station and multiple ground users. The channel from the terrestrial station to the satellite is assumed to be a quasi-static shadowed Rician fading channel, and the channel from each user to the terrestrial station is assumed to be a quasi-static Rayleigh fading channel. Our choice of quasi-static fading is validated by information theoretical analysis of low-latency communication in [11, 12]. In particular, under quasi-static fading channels, the asymptotic notion of outage capacity and outage probability provide tight approximations to the non-asymptotic performance at low latency. We choose shadowed Rician fading since it provides a good approximation for the land-mobile satellite communication channel [13]. For the links between each ground user and the relay, we choose Rayleigh fading because it is widely used in wireless communications, and is accurate for most terrestrial environment with rich scatters [14].
I-A Main Contributions
We study the hybrid satellite-terrestrial model with either instantaneous channel state information (CSI) or channel distribution information (CDI) available at the terrestrial station and the satellite. When instantaneous CSI is available, the terrestrial station is informed of the exact channel fading levels of each user, and the satellite is informed of the exact fading level from the terrestrial station. When CDI is available, the terrestrial and the satellite are only provided with the distribution of respective fading models. We study user scheduling algorithms for both cases. Our contributions are summarized as follows.
When instantaneous CSI is available, combining capacity results for the multiple access channel and the relay channel [15], we derive the optimal instantaneous achievable rate region of all ground users. Subsequently, under a homogeneous target rate constraint, we formulate an optimization problem to maximize the achievable sum rate via user scheduling algorithms. The optimal solution requires an exhaustive search and is too complicated for practical use. As a compromise, we first derive theoretical upper and lower bounds on the maximum achievable rate and then propose low-complexity scheduling algorithms. In particular, we propose a greedy algorithm that achieves close-to-optimal performance and a further simplified sub-optimal algorithm that has almost linear complexity. The efficiency, computational complexity and stability of our scheduling algorithms are analytically demonstrated and numerically verified.
When CDI is available, the instantaneous achievable rate region can not be obtained. Instead, under a homogeneous target rate constraint for all ground users, we derive the outage probability of the uplink communication as a function of the rate constraint and CDI. Subsequently, we formulate an optimization problem to minimize the outage probability and derive a theoretical lower bound that serves as the benchmark. Furthermore, to obtain a feasible solution to the optimization problem, we propose a user scheduling algorithm using the idea of alternative optimization (AO) [16, 17]. Via numerical simulations, we find that the outage probability obtained from our user scheduling algorithm converges to our derived benchmark after a small number of iterations. We also numerically illustrate the optimality and computational complexity of our scheduling algorithm by comparing with the optimal exhaustive search method.
I-B Related works
The study on hybrid satellite-terrestrial communication systems has a long history. In contrast to our setting, most papers focused on the downlink model, where a satellite transmits messages to a group of ground users, e.g., [18, 19, 20, 21, 22]. In [18], for a multiuser hybrid AF satellite-terrestrial cooperative network, Yuan et al. proposed an opportunistic user scheduling algorithm using signal-to-noise ratio (SNR)-threshold based feedback. In [19], for a multiuser AF hybrid satellite-terrestrial relay network with opportunistic scheduling, Kang et al. derived the analytical bounds on the ergodic capacity. For a multiuser satellite-terrestrial downlink model with a multi-antenna satellite and a single-antenna AF relay, Bankey and Upadhyay [20] analyzed the ergodic capacity for opportunistic user scheduling with outdated CSI. However, the spectrum efficiency of the orthogonal opportunistic user scheduling algorithms of the above studies is very low since only one user is allowed to access the channel at a time slot. To improve the throughput and spectrum efficiency of the downlink hybrid system, subsequent works apply non-orthogonal multiple access (NOMA) into hybrid satellite-terrestrial systems to support multiple users simultaneously in a time slot, e.g., [21, 22]. However, studies on downlink NOMA-based integrated terrestrial-satellite network are significantly different from our uplink analysis in this paper.
The more related works to ours is the studies of the uplink hybrid satellite-terrestrial system, e.g., [23, 24, 25]. In [23], Yang et al. derived an upper bound on the ergodic capacity for a multi-beam geostationary earth orbit mobile satellite communication system. In [24], Huang et al. proposed a space division multiple access (SDMA) scheme to maximize the average sum rate of a hybrid satellite-terrestrial AF relaying network, where a high-altitude platform is deployed as a relay to assist the transmission from ground users to the satellite. In [25], Arti studied a two-way AF satellite system with only two ground users and one terrestrial relay and designed beamforming and combining vectors for the satellite.
However, none of the above works use Shannon theory [26] to study the critical problem of efficient user scheduling algorithms to achieve the full potential of the uplink hybrid satellite-terrestrial system. Although above works considered multiple antennas, the analysis is mostly achievable without optimality guarantee. Specifically, these studies used dimensional advantage of multiple antennas to improve the throughout with SDMA or a certain beamforming design. Note that the capacity is the maximal rate achievable of any communication scheme and analysis based on specific coding scheme without optimality guarantee is far from satisfactory. In this paper, to complement the existing literature in the uplink hybrid satellite-terrestrial system, we use information theoretical results to study efficient user scheduling algorithms and demonstrate close-to-optimality performance of our proposed algorithms. For simplicity, we present results for the single antenna terminals in this paper. Our results can be generalized to the multi antenna terminals by using corresponding information theoretical results for the multiple input and multiple out channels [27, 28].
II Problem Formulation
Notation
We use , and to denote the set of real numbers, positive numbers and integers respectively. Denote by the minus between set and . For any , we use to denote the maximum integer that is less than or equal to . For any , we use to denote the set of integers between and and use to denote . Furthermore, for any two integers such that , denote by the set of vectors that contain exactly unique elements of and by the set of bijective mappings from to .
II-A The Uplink Communication Model

We consider an uplink model for the hybrid satellite-terrestrial communication system as shown in Fig. 1. There are ground users with indices , one terrestrial relay, and one satellite, all assumed to have a single antenna. Each user wishes to transmit messages to the satellite with the assist of the relay. Since the resource of the satellite is finite, we assume that at most users are allowed to transmit messages in a time slot simultaneously. Let denote the vector of the indices of the selected users by a scheduling algorithm.
At each time slot, after user scheduling, the communication between the selected users and the satellite proceeds in the following two phases. In the first phase, for each , the selected user aims to send a message to the relay with power , rate and blocklength . Each message is then encoded into a length- codeword . The received signal at the terrestrial relay is
(1) |
where is the channel fading coefficient between the user and the relay, and is the independent additive white Gaussian noise (AWGN) with zero mean and unit variance. Using and CSI for all users, the terrestrial relay decodes the messages of each user as . In the second phase, the relay encodes its decoded messages into a combined codeword with power and sends it to the satellite. The received signal at the satellite is
(2) |
where is the channel fading coefficient between the relay and the satellite, and is the independent AWGN with zero mean and unit variance. Finally, using the noisy outputs and CSI on the fading coefficient , the satellite decodes the message .
II-B Fading Channels and Assumptions
We assume that the channel between each ground user and the terrestrial relay is an AWGN with Rayleigh fading, i.e., the fading coefficient satisfies . The fading random variables for different ground users are independent. Furthermore, we assume that the channel gain for the channel from the relay to the satellite follows a Shadowed-Rician (SR) distribution with parameters , i.e., , where , and are positive real numbers. Here, denotes the the average power of the LOS component, is the fading order, and represents for the average power of the scattered component.
To evaluate the fundamental limits of the uplink hybrid satellite-terrestrial system, depending on the availability of CSI, we study the instantaneous sum rate as well as the outage probability and formulate corresponding optimization problems to schedule the transmission of ground users. Specifically, we consider the following two cases.
-
•
Case 1: Perfect Instantaneous CSI
Similar to most existing works, e.g., [29, 30], we assume that perfect CSI of all channels are available. The CSI can be obtained by channel estimation during each transmission time slot via a backhaul channel [21]. In this setting, we derive the achievable instantaneous sum rate and propose efficient user scheduling algorithms to maximize the sum rate.
-
•
Case 2: Statistical CSI
The assumption of perfect instantaneous CSI can be impractical for practical satellite communication systems. To address this concern, we also study the case where only CDI is available. Specifically, the relay only knows the distribution of fading coefficients for channels from each ground user and the satellite only knows the distribution of the fading coefficient for the channel from the relay. In practical systems, CDI can be estimated via channel parameter estimation methods, e.g., the MUSIC algorothm in [31]. Under this setting, we derive the outage probability and propose user scheduling algorithms to minimize the outage probability.
III Main Results for the Case with Perfect Instantaneous CSI
In this section, we analyze the instantaneous achievable rate for the given system and formulate an optimization problem to maximize the sum rate. A solution to the optimization problem is equivalent to a user scheduling algorithm. The optimal solution requires an exhaustive search, which is highly complicated and renders its impossible for practical communication systems. To solve this problem, we first derive theoretical lower and upper bounds and then propose low-complexity user scheduling algorithms that can exploit the tradeoff between the complexity and performance.
III-A Analysis of the Instantaneous Achievable Sum Rate
For each , let denote the received SNR for the channel between user and the relay and let denote the SNR for the channel between the relay and the satellite. Using cut-set bounds for the relay channel and the multiple access channel in [15, Sec. 19.1 and Theorem 19.1], we conclude that given selected users , the instantaneous rate of each user is upper bounded by
(3) |
where is the capacity of an AWGN channel with SNR .
In a full-duplex DF relaying system with perfect CSI, the sum rate upper bound given by (3) can be achieved via block Markov coding and backward decoding ([15, Sec. 16.4.4 and Table 16.2]), when superposition encoding and successive cancellation decoding are used at the relay and the satellite. For subsequent analysis, we consider the case where the rate tuples lies at a corner point on the rate region and thus maximal sum rate is achieved. In particular, let and let be the decoding order of successive cancellation decoding at the relay, then the signal-to-interference plus noise ratio (SINR) for user at the relay satisfies
(4) |
Since the decoding order of successive cancellation at the satellite can be different from that at the relay, we use a bijective mapping and the decoding order at the relay to describe the decoding order at the satellite. Specifically, for any , when is the -th decoded message at the relay, then it is the -th decoded message at the satellite. Thus, the decoding order and the bijective mapping suffice to describe the set of selected users and the decoding orders at both the terrestrial station and the satellite. Note that the transmission power is split among all messages and thus the SINR for each message from the relay to the satellite satisfies
(5) |
where is the power splitting ratio of the message from user and satisfies . Therefore, given and , the instantaneous achievable rate of user satisfies
(6) |
III-B Maximize Instantaneous Achievable Sum Rate via An Optimization Problem
Under the assumption that at most users are allowed to transmit in a time slot, given a per user rate constraint , we formulate the optimization problem in Problem 1 to maximize the achievable instantaneous sum rate as follows:
(7) | ||||
(8) | ||||
(9) | ||||
(10) |
The objective function of Problem 1 is the maximum achievable sum rate and we need to optimize over all possible schedule user decoding orders at the terrestrial station, all possible decoding orders at the satellite determined by and the bijective mapping , all power allocation vectors at the relay. The first constraint in (8) makes sure that every scheduled user satisfies the rate constraint , the second constraint in (9) is the power constraint at the relay to make sure the total transmission power at the relay is , and the third constraint in (10) guarantees that the decoding order at the relay: is in the descend order of received SINRs. To solve the problem, we need to jointly optimize the scheduled users at the terrestrial station, the decoding order at the satellite and power allocation vector at the relay.
We remark that Problem 1 can be decomposed into two sub-problems. This is because and depend on different optimized parameters. Specifically, we have sequential sub-problems Problem 2(a) and Problem 2(b), where Problem 2(b) uses the solution of Problem 2(a) to proceed.
(11) | |||
(12) | |||
(13) |
(14) | |||
(15) | |||
(16) |
By solving Problem 2(a), we obtain the set of scheduled users and its decoding order at the relay that maximizes the sum rates of users satisfying the rate constraint . Given , we can then solve Problem 2(b) for power allocation at the relay to maximize the achievable rate from the relay to the satellite that satisfies for each scheduled user . Note that the objective function of Problem 2(b) only depends on the fading coefficient between the satellite and the relay and is thus independent from user scheduling and power allocation strategies.
With the constraint in (15), the power allocation vector satisfies for and . Thus, . Combined with the power constraint that , we conclude that Problem 2(b) is feasible and we can always find a feasible power allocation vector if the number of users supported with rate satisfies
(17) |
Note that (17) also implies that should be larger than to make sure that at least one user can be served with desired rate, i.e., .
III-C Upper and Lower Bounds on Instantaneous Achievable Sum Rate
To obtain an exact solution of Problem 1, we need to use an exhaustive search method over all possible user scheduling and find the largest achievable sum rate . However, such a method is infeasible, especially when the total number of users is large. As a compromise, we derive closed-form upper and lower bounds on the instantaneous achievable sum rate , which can be used as benchmarks for low complexity user scheduling algorithms.
We assume that (17) holds so that Problem 2(b) is feasible and the achievable rate between the relay and the satellite is . Then, to bound , it suffices to derive upper and lower bounds for the optimal value of Problem 2(a). For any decoding order , let and . Furthermore, let , given any and any set , let . Finally, given any , define the following quantities
(18) | ||||
(19) | ||||
(20) |
Theorem 1.
Given any target rate and corresponding , the following results hold.
-
(i)
Problem 2(a) is feasible if and only if
(21) -
(ii)
If Problem 2(a) is feasible, then
(22) where for and ;
-
(iii)
is upper bounded by
(23)
III-D A Greedy Iterative User Scheduling Algorithm
To efficiently solve Problem 2(a) with low complexity, we propose a user scheduling algorithm that corresponds to a solution of Problem 2(a) and achieves a near optimal performance of exhaustive search. Specifically, our algorithm proceeds in two phases: given CSI, we first derive the maximum number of users that can be served by the system and then propose a greedy iterative user scheduling algorithm to select users to transmit. Details are as follows.
III-D1 Determine the maximum number of supported users
Given an and the terrestrial SNR values , we should first determine the number of supported users. This is because to ensure reliable communication of a multiple-access system, individual rate decreases with the increasing of user numbers [15]. In previous analysis, we derive an upper bound on in (17) that depends on the SNR of the satellite-relay link. However, is also related with channel qualities of users. Combined with effects of both, we determine via the following steps:
-
Step 1:
Initialize .
- Step 2:
III-D2 Schedule users via a greedy iterative scheduling algorithm
Note that has be chosen to ensure that Problem 2(a) is feasible. Solving Problem 2(a) is then equivalent to proposing a user scheduling algorithm based on SNR values of all terrestrial channels. However, Problem 2(a) is a combinatorial optimization problem (COP), which is NP hard and may not have an analytical expression for optimal solution. Furthermore, it is not trivial to solve the problem using traditional integer programming solving methods such as dynamic programming or branch and bound [32], because it is hard to determine the feasible region. To proceed, we propose a greedy algorithm that iteratively selects users and achieves a near optimal performance.
We need several definitions to describe our scheduling algorithm. Given of all terrestrial channels, let be the increasing order and for each , let is the sum of the weakest SINRs of users, i.e., . Furthermore, given target rate and the corresponding , define a sequence where
(24) |
Our greedy user selection algorithm then operates as follows. For each , let denote the set of users that can be selected. To select the first user, we have and we select the first user such that its received SNR equals , i.e., . For the subsequent user selection, given each , let
(25) |
The -th user is then selected as , and . To ensure that we can select all users, we need to consider whether is empty for any . If is empty, we update as and trace back to to select another user other than . Note that this is possible since after choosing , we have already updated . The user selection stops until we select all users .
We summarize our greedy iterative user scheduling (GIUS) scheme in Algorithm 1. Our simulation results demonstrate that in most cases, GIUS has performance close to that of exhaustive search while the computational complexity is significantly reduced.
III-E A Low Complexity User Scheduling Algorithm
The complexity of the user scheduling scheme in Algorithm 1 is strongly related to the channel qualities of terrestrial users, and also scales polynomially with the total number of users and scales exponentially with the selected number of users in the worst case. Such a complexity might still not be feasible for power limited terrestrial stations.
In claim (ii) of Theorem 1, we derive a lower bound on the achievable sum rate using . Inspired by this idea, we propose a lower-bound based user scheduling algorithm (LBUS) by choosing all users to our theoretical derivations except . The user scheduling scheme is summarized in Algorithm 2.
(26) |
III-F Numerical Results
In this section, we present simulation results of our proposed algorithms, i.e., the greedy algorithm GIUS and the lower complexity algorithm LBUS, under the assumption of knowledge of instantaneous CSI for channels. We assume that are generated i.i.d. from a Rayleigh distribution with the variance . To better evaluate the performance of different user scheduling schemes, we assume that the channel between the satellite and the relay is strong enough so that the sum rate is only restricted by user scheduling schemes.
III-F1 Achievable Sum Rate


In Figure 2, we plot the simulated performances of our proposed user scheduling algorithms GIUS and LBUS, versus the optimal exhaustive search, a time division multiple access scheme (TDMA) where each ground user access the channel by a equal time duration, an opportunistic user scheduling scheme where the system always selects the user with the strongest channel gain [19], and our derived upper and lower bounds in Theorem 1. For each user scheduling algorithm, we obtain each data point by averaging the simulated results of independent simulations. Figure 2 shows that our GIUS user scheduling algorithm achieves sum rate with negligible loss compared with exhaustive search and thus demonstrates the efficiency of our GIUS algorithm. Comparing the results in Fig. 2(a) and (b), we conclude that the gap between the performance of GIUS and the upper bound becomes smaller as the total number of users increases. This phenomenon implies that GIUS tends to be “optimal” for large-scale user groups. It is reasonable because the received SNRs of selected users will tend to the optimal solution when is large enough.
Besides, Fig. 2 also shows that the performance of LBUS with nearly-linear complexity has worse performance than GIUS, but still better than TDMA and opportunistic user scheduling. This implies that LBUS algorithm, although simple, is still an effective non-orthogonal user scheduling algorithm. Finally, we remark that as increases, the performance of all user scheduling algorithms becomes identical. This is because when is sufficiently large, only one user can be served with the desired target rate and the user scheduling reduces to the orthogonal case.
III-F2 Computational Complexity
In this section, we discuss the computational complexity of our user scheduling algorithms with respect to the total number of users and the scheduled number of users . From the analysis in Section III-E, we conclude that the user scheduling algorithm LBUS has nearly linear complexity with respect to as it only needs to select the -th user. The computational complexity of GIUS is more complicated. Without loss of generality, assume that the transmit SNR is normalized as and assume that the channel from each user to the terrestrial station is subject to Rayleigh fading with the same variance , i.e., for all . For each , let the number of candidates of GUIS be and its statistical average with respect to channel statistics is . Specifically, we have
(27) | ||||
For large enough, we have , as the received SNRs of selected users will tend to the theoretical optimal solution given by (20) in this case. If , it follows from (27) that , which is further upper bounded by
(28) |
when is large enough. Thus, the average number of candidate users decrease exponentially with , which is the total number of selected users so far. This implies that the set of candidate users shrinks significantly after selecting each user and this is the reason why GIUS has much lower complexity compared to exhaustive search.
Next, we numerically simulate the complexity of user scheduling algorithms. To do so, we run independent simulations of exhaustive search, GIUS, and LBUS algorithms with the target rates . We then calculate the average computing times of each user scheduling algorithm. The simulated results are plotted in Figure 3, where Fig. 3(a) demonstrates the running time and Fig. 3(b) plots the achievable sum rate.


Fig. 3(a) shows that when , the complexity of exhaustive search is much higher than our proposed algorithms GIUS and LBUS. Further, the gaps between the computational complexity of exhaustive search and our algorithms grow when the total number of users grow. On the other hand, Fig. 3(b) shows that for the same case, the achievable sum rates of our GIUS algorithm and exhaustive search are almost the same. This implies that GIUS achieves close-to-optimal performance with much reduced complexity. When the target rate decreases to , the number of selected users grow. In this case, it is out of computing power to simulate exhaustive search and we only compare the performance of our proposed algorithms. As expected, LBUS has a much reduced complexity, especially for . Surprisingly, the loss of achievable rate is tolerable and implies that our linear complexity algorithm LBUS is very useful when the number of selected users is small.


To further compare the computational complexity of our proposed algorithms GIUS and LBUS, we simulate both algorithms for different number of selected users by changing the target rates , when the total number of users . The average computing times are plotted in Figure 5. From Figure 5, we find that the computational complexity of GIUS is much more sensitive to the number of selected users (and thus the target rate ) while LBUS roughly changes linearly with the number of selected users. In particular, the average computing times of GIUS grows quickly and reaches its maximum point roughly for , while LBUS has much smaller running time for almost all cases.
We also compare the stability of computational complexity of our algorithms. To do so, by setting and bit/s/Hz, we simulate both algorithms times independently and record the running time. The results are plotted in 5. We find that GIUS strongly depends on the channel realizations while LBUS is more stable. This is because the distributions of channels will determine how the searching field shrinks during each iteration of GIUS.
IV Main Results for the Case with CDI
When the number of users is large, it is almost impossible to obtain reliable estimates of the fading coefficients for all channels. Thus, we consider the case where only CDI of each channel is available at the relay and the satellite. Under this case, given a target rate, we derive closed-form expressions for the outage probability with two phases of the communication and formulate an optimization problem to minimize the outage probability. We propose a low complexity solution which corresponds to an efficient user scheduling algorithm for terrestrial users.
IV-A Assumptions and Preliminaries
The set of all terrestrial users are divided into groups, where users with the same CDI are grouped together. Specifically, for any two users , they lie in the same group if the fading coefficients for their terrestrial channels to the relay have the same distribution. This is valid since this way, users close in locations are grouped together.
For simplicity, given each , we use to denote users in group , whose channel fading coefficients follow Rayleigh distribution with parameter , i.e., for all and is the CDI of users in group . Note that when only CDI is available, user selection is essentially user group selection. For each time slot, () users are selected to transmit messages. Let be the set of the indices of selected user groups and let be the index vector of the selected users where . Each user in the group is selected in a time division manner.
The communication proceeds in the two phases as described in Section II. After user scheduling, users , each from a group are selected. For each , user sends a message to the satellite with power with the aid of the terrestrial relay, who works in full-duplex DF mode with power . Successive cancellation decoding is done at the relay and the satellite. The decoding order at the relay is given by , which satisfies . This assumption simplifies the theoretical analysis in the following section. The decoding order at the satellite is related with that at the relay via the bijective mapping .
IV-B Expressions of Outage Probabilities
When only CDI is available, we consider the outage probability, which is the probability that the transmission at a given rate is not supported, as the performance criterion. Given , the outage event of user occurs if any one of the first user suffers an outage event. Specifically, given a target rate and thus corresponding (cf. (18)), for each , the outage probability for user during the first phase satisfies
(29) | ||||
(30) |
where is the received SNR of the signals from user .
Recall that DF is used at the relay and a power allocation vector is used to split the power at the relay among messages of users. Recall that is the received SNR of user defined in (5). For the second phase, the outage probability of each user is
(31) |
Note that (31) is subject to the power allocation and the received SNR for the satellite-relay channel. From arguments around (17), if the number of selected users satisfies , we can always find a power allocation scheme that guarantees is larger than the threshold . Thus, the outage probability of each user at the second hop satisfies for , i.e., for .
In Theorem 2, we derive a closed-form expression for , the outage probability for user at the relay. As we shall show, our user scheduling algorithm relies only on .
Theorem 2.
The following claims hold.
-
(i)
Given the selected users and the corresponding CDI for their terrestrial channels to the relay, let for . The outage probability of user during the first phase of uplink communication satisfies
(32) where
(33) -
(ii)
The outage probability for the second phase communication satisfies
(34) where is the Pochhammer symbol and is the unnormalized incomplete Gamma function111The infinite series expression of Eq. (34) is the series expansion of the confluent hypergeometric function in [33] and [34]. Its convergence and other properties are available in [33] and [34]..
-
(iii)
Combining the above two claims, the outage probability for user satisfies .
IV-C Minimize the Outage Probability
Note that the outage probability is a fixed function of the SNR of the satellite-relay channel and does not relay on user scheduling in the first phase. Thus, to minimize the outage probability of uplink communication, it suffices to minimize the outage probability for the first phase. We then have the following optimization problem.
(35) | ||||
(36) | ||||
(37) |
Recall that successive cancellation decoding is used at the relay. Given a decoding order , the outage event of user occurs if any user with suffers an outage. Thus, for and thus .
Problem 3 is an NP-hard problem and it is non-trivial to obtain a closed-form expression for the optimal solution. Note that the objective function of Problem 3 depends only on . As a compromise, we first derive an lower bound on the objective function by assuming that is consistent that satisfies , where and for each . The relaxed optimization problem is as follows.
(38) | ||||
(39) |
Theorem 3.
Problem 4 has unique optimal solution , which satisfies the following equalities
(40) |
where for and . Note that are independent of , and was defined in (33).
IV-D A Low Complexity User Scheduling Algorithm
Note that theoretical solutions in (40) are higher degree equations and don’t have closed-form expressions. In this section, to minimize the outage probability, we propose a solution to Problem 3 which corresponds to a user scheduling algorithm. Recall that for each , is the CDI for users in group and . We define a function for each .
Note that Theorem 3 provides an optimal solution to Problem 4, a relaxed version of Problem 3. To obtain a feasible solution, our user scheduling algorithm proceeds by choosing the close to . As stated before, the user selection is essentially user group selection.
We select user groups as follows. The first user group is selected as the one with the maximal CDI , i.e., . When only two users are allowed, the second one is selected as , where .
When more than two users are allowed, i.e., , the selection of user groups is more involved and we propose an iterative user group selection scheme based on alternate optimization that is summarized in Algorithm 3 and named AOIUS. We remark that AOIUS converges because the outage probability monotonically decreases during iteration rounds. Specifically, for , in the -th iteration, for each , the -th user (group) is selected to minimize the outage probability, which is calculated with respect to parameters updated in the current iteration and obtained in the last iteration. Therefore, the outage probability converges quickly after the first round of the iteration, and slows down as the iteration progresses.
IV-E Numerical Results
To demonstrate the efficiency of our proposed algorithm, we systematically simulate the performance of AOIUS in terms of outage probability and computational complexity. The channel between the relay and the satellite are assumed to be under frequent heavy shadowing, whose parameters are given by [13]. In order to eliminate random effects, we assume that of group is uniformly distributed between , based on which average outage probability is computed after 200 times of average channel parameters realizations. The transmit power at the relay is given by . Note that the effects of the noise and large-scale fading of the terrestrial and the satellite channels are not considered during simulation, as they can be included in the transmit power and and normalized.
IV-E1 Convergence
To illustrate the convergence of our user scheduling algorithm AOIUS, we simulate AOIUS and plot the results in Fig. 7. Without loss of generality, assume that the channel gain between the satellite and the relay is strong enough so that . This assumption doesn’t affect the convergence analysis. The terrestrial average received SNR of group is assumed uniformly distributed over . The target rate is set as bit/s/Hz and the total number of user groups is assumed to be . The threshold for the stopping criterion is set as zero, which means the algorithm stops only when the final outage probability doesn’t change. We simulate AOIUS when the number of allowed users . For each , we simulate AOIUS five times for independent channel realizations and plot calculated outage probabilities versus iterations. From Fig. 7, we find that using AOIUS, the outage probability of scheduled users monotonically decreases with iteration times and finally converges to a fixed value, which is the theoretical lower bound on the outage probability obtained from Theorem 3. This implies that our user scheduling algorithm is close to optimal in this numerical example.
IV-E2 Outage Probability


To demonstrate the efficiency of our proposed algorithm, we simulate AOIUS for the cases of and compare the results with the optimal exhaustive search strategy. We set , and as the stopping criterion. The results are plotted in Fig. 7. The difference between theoretical and simulation results is that the theoretical results correspond to simulations of user schedule algorithms where the outage probability is calculated from (46) and numerical correspond to Monte Carlo simulation of the outage probability, which is calculated as the ratio of outage event for independent realizations of fading channels. For both user scheduling algorithms, the matching of theoretical and numerical simulation results verify the correctness of the calculation of the outage probability in (46). Furthermore, since exhaustive search is optimal, the almost negligible gap between the outage probabilities of AOIUS and exhaustive search implies that our proposed user scheduling algorithm is efficient in minimizing the outage probability. Finally, we comment that the outage probability increases with number of selected users . This is because interference among users is more severe when more users transmit messages simultaneously.
IV-E3 Computational Complexity
The optimal exhaustive search is not practical since its complexity scales exponentially as the number of selected users grows. The complexity of AOIUS depends on channel distribution, the target rate, the total number of user groups and the number of selected user groups . To illustrate the complexity of AOIUS, we simulate the computing times of AOIUS for different and target rates. The complexities of AOIUS and exhaustive search are shown in Fig. 9, where each data point corresponds to the average computing time of a single run of user scheduling algorithms over 100 realizations of . In this case, we set and bit/s/Hz. From Fig. 9, we find that the complexity of AOIUS is much lower and stable, especially for a large number of selected users .


Finally, to explore the effect of the target rate and the selected number of user groups on the computational complexity of AOIUS, we simulate AOIUS for user groups and target rates bit/s/Hz respectively and plot the results in Fig. 9. From Fig. 9, we observe that the computation complexity of AOIUS roughly grows linearly with the number of selected users when bit/s/Hz. However, when bit/s/Hz, the computational complexity does not scale much with . This is because when the target rate is relatively high, the outage event occurs frequently. In extreme case, AOIUS stops at the very beginning of the algorithm as the outage probability is always equals to 1. Thus, the computational complexities for the cases of bit/s/Hz drop down when is larger than a certain threshold (denoted by ), and then grows very slowly as tends to infinity. This implies that the system cannot accommodate as more than users with the desired target rate. However, the exact characterization of is challenging and left as future work.
V Conclusion
We studied the hybrid uplink satellite-terrestrial communication model with a single satellite, a terrestrial station as a relay and finitely many ground users. Under mild conditions on the channel models, we studied user scheduling algorithms to maximize the sum rate when perfect CSI of all channels are available and to minimize the outage probability when only CDI of all channels are available. Specifically, when perfect CSI is available, we first derived theoretical upper and lower bounds on the instantaneous sum rate and then proposed a greedy iterative user scheduling algorithm that achieves a near optimal performance with lower complexity. Furthermore, we also proposed a user scheduling algorithm based on our lower bound that has worse performance than the greedy algorithm but also achieves much lower complexity, especially if one wishes to schedule a large number of users in a time slot. When only CDI is available, we first derived analytical expressions for the outage probabilities of two-phase communication and then proposed an alternative optimization based user scheduling algorithm that strikes a balance between performance and complexity. Our results in this paper could shed lights on and inspire the design of user scheduling algorithms for uplink communication of hybrid satellite-terrestrial models.
There are several avenues for future research. Firstly, one can generalize our results to the case where the satellite, the relay and even all the grounds users are equipped with multiple antennas. To do so, one need to use corresponding information theoretical results for the multiple input and multiple out channels [27, 28]. Secondly, one could generalize our results to the more practical communication models with multiple terrestrial relays and multiple satellites. Such analysis requires novel ideas of terrestrial station selection from the perspective of the satellite. Finally, one can also consider block fading models and derive the corresponding results for both CSI and CDI cases [35, 36].
-A Proof of Theorem 1
Note that the optimizing over is equal to that over SNRs since we select users and decoding orders using SNR.
-
(i)
The if part is easy. If (21) holds, is a feasible solution and Problem 2(a) is feasible. Conversely, the only if part is proved through the following two steps. Firstly, we show that if Problem 2(a) is feasible, then any feasible solution satisfies for each , which implies that lower bounds any feasible solutions to Problem 2(a). Secondly, we use the above lower bound claim to conclude a contradiction if (21) fails to hold and Problem 2(a) is feasible.
We first show that lower bounds any feasible solutions. If is feasible to Problem 2(a) but satisfies for some , we have
(41) (42) However, from the definition of , no such exists. Therefore, any feasible solution satisfies for .
Secondly, if (21) fails to hold, then either or there exists an index that satisfies . For the former case, if Problem 2(a) is feasible, then from our claim above, each feasible solution satisfies that . This is impossible from the definition of . For the latter case, if Problem 2(a) is feasible, then our above claim implies that and each feasible solution satisfies . Again, this is impossible.
Therefore, we have now showed that Problem 2(a) cannot be feasible if (21) fails to hold and thus the only if part is proved.
-
(ii)
The lower bound follows since the chosen user scheduling vector corresponding to is a feasible solution to Problem 2(a).
-
(iii)
The upper bound is obtained by relaxing the constraints in Problem 2(a) and solving the following new linear programming problem
(43) (44) (45) where the optimization parameters are assumed continuous and satisfy . Note that claim (iii) holds since the optimization region of SINRs is enlarged.
-B Proof of Theorem 2
We only provide proofs for claim (i) and (ii) in Theorem 2, as the last claim is straightforward.
-
(i)
For Rayleigh fading channels, the probability dense function (pdf) of the received SNR is , where . Using the properties of exponential distribution, we can derive the close-form of the outage probability during the first hop as
(46) - (ii)
-C Proof of Theorem 3
Note that is a function of . For subsequent analysis, let . This way, the minimization of is equivalent to the maximization of .
The partial derivation of with respect to satisfies
(48) |
We then prove that (48) only has one zero point, which implies only has one global maximum value. The second partial derivative of with respect to for each is , where . Note that monotonically increases with , and the extreme values satisfy , . Thus, there only exists one zero point for such that if and only if , i.e., first decreases in and then increases in with the critical point of . Further, we have and . Thus, there is only one zero point of the first derivative and increases in its parameters first and then decreases with the critical point . As a result, has only one global maximum value for any . The cases of are straightforward so the detailed analysis are omitted. The solution to Problem 4, () meets (40). The theorem is proved.
References
- [1] P. Chini, G. Giambene, and S. Kota, “A survey on mobile satellite systems,” Int. J. Satell. Commun., vol. 28, no. 1, pp. 29–57, 2010.
- [2] Z. Lin, M. Lin, J.-B. Wang, Y. Huang, and W.-P. Zhu, “Robust secure beamforming for 5G cellular networks coexisting with satellite networks,” IEEE J. Sel. Ares. Commun., vol. 36, no. 4, pp. 932–945, 2018.
- [3] K. An, M. Lin, T. Liang, J.-B. Wang, J. Wang, Y. Huang, and A. L. Swindlehurst, “Performance analysis of multi-antenna hybrid satellite-terrestrial relay networks in the presence of interference,” IEEE Trans. Commun., vol. 63, no. 11, pp. 4390–4404, 2015.
- [4] Y. Ruan, Y. Li, C.-X. Wang, and R. Zhang, “Energy efficient adaptive transmissions in integrated satellite-terrestrial networks with SER constraints,” IEEE Trans. Wireless Commun., vol. 17, no. 1, pp. 210–222, 2017.
- [5] K. Guo, K. An, B. Zhang, Y. Huang, and G. Zheng, “Outage analysis of cognitive hybrid satellite-terrestrial networks with hardware impairments and multi-primary users,” IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 816–819, 2018.
- [6] V. Bankey and P. K. Upadhyay, “Secrecy outage analysis of hybrid satellite-terrestrial relay networks with opportunistic relaying schemes,” in IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE, 2017, pp. 1–5.
- [7] N. I. Miridakis, D. D. Vergados, and A. Michalas, “Dual-hop communication over a satellite relay and shadowed Rician channels,” IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4031–4040, 2014.
- [8] P. K. Upadhyay and P. K. Sharma, “Max-max user-relay selection scheme in multiuser and multirelay hybrid satellite-terrestrial relay systems,” IEEE Commun. Lett., vol. 20, no. 2, pp. 268–271, 2015.
- [9] C. Zhang, H. Lin, Y. Huang, and L. Yang, “Performance of integrated satellite-terrestrial relay network with relay selection and outdated CSI,” IEEE Access, vol. 8, pp. 169 652–169 662, 2020.
- [10] P. Hajipour, A. Shahzadi, and S. Ghazi-Maghrebi, “Improved performance for a heterogeneous satellite-cooperative network with best relay node selection,” China Commun., vol. 16, no. 5, pp. 93–105, 2019.
- [11] L. Zhou, A. Wolf, and M. Motani, “On lossy multi-connectivity: Finite blocklength performance and second-order asymptotics,” IEEE J. Sel. Ares. Commun., vol. 37, no. 4, pp. 735–748, 2019.
- [12] W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 4232–4265, 2014.
- [13] A. Abdi, W. C. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile satellite channels: First-and second-order statistics,” IEEE Trans. Wireless Commun., vol. 2, no. 3, pp. 519–528, 2003.
- [14] D. Tse and V. Pramod, Fundamentals of wireless communication. Cambridge university, 2005.
- [15] A. El Gamal and Y.-H. Kim, Network information theory. Cambridge university press, 2011.
- [16] R. Hunger, W. Utschick, D. A. Schmidt, and M. Joham, “Alternating optimization for MMSE broadcast precoding,” in Proc. IEEE International Conference on Acoustics Speech and Signal Processing Proceedings (ICASSP), vol. 4. IEEE, 2006, pp. IV–IV.
- [17] S. S. Christensen, R. Agarwal, E. De Carvalho, and J. M. Cioffi, “Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4792–4799, 2008.
- [18] Z. Yuan, K. Guo, H. Kong, X. Liu, Y. Li, and B. Xu, “Ergodic capacity of multiuser hybrid satellite-terrestrial cooperative networks with SNR-threshold based feedback,” in Proc. 2020 Cross Strait Radio Science & Wireless Technology Conference (CSRSWTC). IEEE, 2020, pp. 1–3.
- [19] K. An, M. Lin, and T. Liang, “On the performance of multiuser hybrid satellite-terrestrial relay networks with opportunistic scheduling,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1722–1725, 2015.
- [20] V. Bankey and P. K. Upadhyay, “Ergodic capacity of multiuser hybrid satellite-terrestrial fixed-gain af relay networks with cci and outdated csi,” IEEE Trans. Veh. Technol., vol. 67, no. 5, pp. 4666–4671, 2018.
- [21] Z. Lin, M. Lin, J.-B. Wang, T. De Cola, and J. Wang, “Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 657–670, 2019.
- [22] X. Zhu, C. Jiang, L. Kuang, N. Ge, and J. Lu, “Non-orthogonal multiple access based integrated terrestrial-satellite networks,” IEEE J. Sel. Ares. Commun., vol. 35, no. 10, pp. 2253–2267, 2017.
- [23] Y. Yang, X. Gao, and X.-G. Xia, “A closed-form capacity upper bound of multibeam GEO MSC uplink channel,” IEEE Wireless Commun. Lett., vol. 5, no. 6, pp. 576–579, 2016.
- [24] Q. Huang, M. Lin, W.-P. Zhu, J. Cheng, and M.-S. Alouini, “Uplink massive access in mixed RF/FSO satellite-aerial-terrestrial networks,” IEEE Trans. Commun., vol. 69, no. 4, pp. 2413–2426, 2021.
- [25] M. Arti, “A novel beamforming and combining scheme for two-way AF satellite systems,” IEEE Trans. Veh. Technol., vol. 66, no. 2, pp. 1248–1256, 2016.
- [26] C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J., vol. 27, no. 1, pp. 379–423, 1948.
- [27] B. Wang, J. Zhang, and A. Host-Madsen, “On the capacity of mimo relay channels,” IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 29–43, 2005.
- [28] A. Goldsmith, S. Jafar, N. Jindal, and S. Vishwanath, “Capacity limits of mimo channels,” IEEE J. Sel. Ares. Commun, vol. 21, no. 5, pp. 684–702, 2003.
- [29] M. Lin, Z. Lin, W.-P. Zhu, and J.-B. Wang, “Joint beamforming for secure communication in cognitive satellite terrestrial networks,” IEEE J. Sel. Ares. Commun., vol. 36, no. 5, pp. 1017–1029, 2018.
- [30] J. Zhang, X. Zhang, M. A. Imran, B. Evans, Y. Zhang, and W. Wang, “Energy efficient hybrid satellite terrestrial 5G networks with software defined features,” J. Commun. Networks, vol. 19, no. 2, pp. 147–161, 2017.
- [31] R. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Trans. Antennas Propag., vol. 34, no. 3, pp. 276–280, 1986.
- [32] L. A. Wolsey, Integer programming. John Wiley & Sons, 2020.
- [33] A. T. James, “Distributions of matrix variates and latent roots derived from normal samples,” The Annals of Mathematical Statistics, vol. 35, no. 2, pp. 475–501, 1964.
- [34] M. Abramowitz, I. A. Stegun, and R. H. Romer, “Handbook of mathematical functions with formulas, graphs, and mathematical tables,” 1988.
- [35] W. Yang, G. Durisi, and E. Riegler, “On the capacity of large-mimo block-fading channels,” IEEE J. Sel. Ares. Commun, vol. 31, no. 2, pp. 117–132, 2013.
- [36] A. Collins and Y. Polyanskiy, “Coherent multiple-antenna block-fading channels at finite blocklength,” IEEE Trans. Inf. Theory, vol. 65, no. 1, pp. 380–405, 2019.
- [37] G. Alfano and A. De Maio, “Sum of squared shadowed-Rice random variables and its application to communication systems performance prediction,” IEEE Trans. Wireless Commun., vol. 6, no. 10, pp. 3540–3545, 2007.