This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Efficient User Scheduling for Uplink Hybrid Satellite-Terrestrial Communication

Lina Zhu, Lin Bai, Lin Zhou and Jinho Choi L. Zhu is with the School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, China, 310018 (Email: [email protected]). She was with the School of Electronic and Information Engineering, Beihang University, Beijing, China, 100083 (Email: [email protected])L. Bai and L. Zhou are with the School of Cyber Science and Technology, Beihang University, Beijing, China, 100083 (Emails: {l.bai, lzhou}@buaa.edu.cn). They are also with the Beijing Laboratory for General Aviation Technology, Beihang University, Beijing.J. Choi is with the School of Information Technology, Burwood, Deakin University, Australia (E-mail: [email protected]).
Abstract

Due to increasing demands of seamless connection and massive information exchange across the world, the integrated satellite-terrestrial communication systems develop rapidly. To shed lights on the design of this system, we consider an uplink communication model consisting of a single satellite, a single terrestrial station and multiple ground users. The terrestrial station uses decode-and-forward (DF) to facilitate the communication between ground users and the satellite. The channel between the satellite and the terrestrial station is assumed to be a quasi-static shadowed Rician fading channel, while the channels between the terrestrial station and ground users are assumed to experience independent quasi-static Rayleigh fading. We consider two cases of channel state information (CSI) availability. When instantaneous CSI is available, we derive the instantaneous achievable sum rate of all ground users and formulate an optimization problem to maximize the sum rate. When only channel distribution information (CDI) is available, we derive a closed-form expression for the outage probability and formulate another optimization problem to minimize the outage probability. Both optimization problems correspond to scheduling algorithms for ground users. For both cases, we propose low-complexity user scheduling algorithms and demonstrate the efficiency of our scheduling algorithms via numerical simulations.

Index Terms:
Hybrid satellite-terrestrial communication systems, decode-and-forward, user scheduling, outage probability, space-air-ground integrated networks

I Introduction

To expand communication to a broader coverage area and meet the demand of higher throughput [1, 2], satellite communication systems have been extensively studied and utilized across the world. Due to heavy shadowing caused by obstacles when the user moving into buildings or vegetation areas, the line-of-sight (LOS) link between the satellite and terrestrial users might be unavailable [3]. To combat the performance degradation, hybrid satellite-terrestrial relay systems are proposed to improve coverage and reliability of satellite communication with the aid of terrestrial relays [4, 5, 6]. Most current hybrid satellite-terrestrial systems adopt either amplify-and forward (AF) or decode-and-forward (DF) [7, 8] relaying technique.

For a hybrid satellite-terrestrial system, the performance is strongly related to the design of multiuser access schemes [8], relay selection methods [9] and power allocation strategies [10]. For satellite-terrestrial systems with a single relay, multiuser access schemes, especially user scheduling algorithms, are critical and should be optimized jointly with power allocation schemes. Furthermore, the development of integrated space-terrestrial information network (SIN) and the 6th Generation (6G) communication architecture enforces the system to allow access of massive number of devices. To meet the extremely high throughout and massive connectivity demands of future communication systems, it is vital to comprehensively study efficient user scheduling strategies with low complexity for hybrid satellite-terrestrial communication systems.

To shed lights on the design of such a system, we study user scheduling algorithms for the hybrid satellite-terrestrial model with a single satellite, a single terrestrial station and multiple ground users. The channel from the terrestrial station to the satellite is assumed to be a quasi-static shadowed Rician fading channel, and the channel from each user to the terrestrial station is assumed to be a quasi-static Rayleigh fading channel. Our choice of quasi-static fading is validated by information theoretical analysis of low-latency communication in [11, 12]. In particular, under quasi-static fading channels, the asymptotic notion of outage capacity and outage probability provide tight approximations to the non-asymptotic performance at low latency. We choose shadowed Rician fading since it provides a good approximation for the land-mobile satellite communication channel [13]. For the links between each ground user and the relay, we choose Rayleigh fading because it is widely used in wireless communications, and is accurate for most terrestrial environment with rich scatters [14].

I-A Main Contributions

We study the hybrid satellite-terrestrial model with either instantaneous channel state information (CSI) or channel distribution information (CDI) available at the terrestrial station and the satellite. When instantaneous CSI is available, the terrestrial station is informed of the exact channel fading levels of each user, and the satellite is informed of the exact fading level from the terrestrial station. When CDI is available, the terrestrial and the satellite are only provided with the distribution of respective fading models. We study user scheduling algorithms for both cases. Our contributions are summarized as follows.

When instantaneous CSI is available, combining capacity results for the multiple access channel and the relay channel [15], we derive the optimal instantaneous achievable rate region of all ground users. Subsequently, under a homogeneous target rate constraint, we formulate an optimization problem to maximize the achievable sum rate via user scheduling algorithms. The optimal solution requires an exhaustive search and is too complicated for practical use. As a compromise, we first derive theoretical upper and lower bounds on the maximum achievable rate and then propose low-complexity scheduling algorithms. In particular, we propose a greedy algorithm that achieves close-to-optimal performance and a further simplified sub-optimal algorithm that has almost linear complexity. The efficiency, computational complexity and stability of our scheduling algorithms are analytically demonstrated and numerically verified.

When CDI is available, the instantaneous achievable rate region can not be obtained. Instead, under a homogeneous target rate constraint for all ground users, we derive the outage probability of the uplink communication as a function of the rate constraint and CDI. Subsequently, we formulate an optimization problem to minimize the outage probability and derive a theoretical lower bound that serves as the benchmark. Furthermore, to obtain a feasible solution to the optimization problem, we propose a user scheduling algorithm using the idea of alternative optimization (AO) [16, 17]. Via numerical simulations, we find that the outage probability obtained from our user scheduling algorithm converges to our derived benchmark after a small number of iterations. We also numerically illustrate the optimality and computational complexity of our scheduling algorithm by comparing with the optimal exhaustive search method.

I-B Related works

The study on hybrid satellite-terrestrial communication systems has a long history. In contrast to our setting, most papers focused on the downlink model, where a satellite transmits messages to a group of ground users, e.g., [18, 19, 20, 21, 22]. In [18], for a multiuser hybrid AF satellite-terrestrial cooperative network, Yuan et al. proposed an opportunistic user scheduling algorithm using signal-to-noise ratio (SNR)-threshold based feedback. In [19], for a multiuser AF hybrid satellite-terrestrial relay network with opportunistic scheduling, Kang et al. derived the analytical bounds on the ergodic capacity. For a multiuser satellite-terrestrial downlink model with a multi-antenna satellite and a single-antenna AF relay, Bankey and Upadhyay [20] analyzed the ergodic capacity for opportunistic user scheduling with outdated CSI. However, the spectrum efficiency of the orthogonal opportunistic user scheduling algorithms of the above studies is very low since only one user is allowed to access the channel at a time slot. To improve the throughput and spectrum efficiency of the downlink hybrid system, subsequent works apply non-orthogonal multiple access (NOMA) into hybrid satellite-terrestrial systems to support multiple users simultaneously in a time slot, e.g., [21, 22]. However, studies on downlink NOMA-based integrated terrestrial-satellite network are significantly different from our uplink analysis in this paper.

The more related works to ours is the studies of the uplink hybrid satellite-terrestrial system, e.g., [23, 24, 25]. In [23], Yang et al. derived an upper bound on the ergodic capacity for a multi-beam geostationary earth orbit mobile satellite communication system. In [24], Huang et al. proposed a space division multiple access (SDMA) scheme to maximize the average sum rate of a hybrid satellite-terrestrial AF relaying network, where a high-altitude platform is deployed as a relay to assist the transmission from ground users to the satellite. In [25], Arti studied a two-way AF satellite system with only two ground users and one terrestrial relay and designed beamforming and combining vectors for the satellite.

However, none of the above works use Shannon theory [26] to study the critical problem of efficient user scheduling algorithms to achieve the full potential of the uplink hybrid satellite-terrestrial system. Although above works considered multiple antennas, the analysis is mostly achievable without optimality guarantee. Specifically, these studies used dimensional advantage of multiple antennas to improve the throughout with SDMA or a certain beamforming design. Note that the capacity is the maximal rate achievable of any communication scheme and analysis based on specific coding scheme without optimality guarantee is far from satisfactory. In this paper, to complement the existing literature in the uplink hybrid satellite-terrestrial system, we use information theoretical results to study efficient user scheduling algorithms and demonstrate close-to-optimality performance of our proposed algorithms. For simplicity, we present results for the single antenna terminals in this paper. Our results can be generalized to the multi antenna terminals by using corresponding information theoretical results for the multiple input and multiple out channels [27, 28].

II Problem Formulation

Notation

We use \mathbb{R}, +\mathbb{R}_{+} and \mathbb{N} to denote the set of real numbers, positive numbers and integers respectively. Denote by 𝒜\mathcal{A}\setminus\mathcal{B} the minus between set 𝒜\mathcal{A} and \mathcal{B}. For any xx\in\mathbb{R}, we use x\lfloor x\rfloor to denote the maximum integer that is less than or equal to xx. For any (a,b)2(a,b)\in\mathbb{N}^{2}, we use [a:b][a:b] to denote the set of integers between aa and bb and use [a][a] to denote [1:a][1:a]. Furthermore, for any two integers (a,b)2(a,b)\in\mathbb{N}^{2} such that a<ba<b, denote by [b]a[b]_{a} the set of vectors that contain exactly aa unique elements of [b][b] and by (a,b)\mathcal{F}(a,b) the set of bijective mappings from [b]a[b]_{a} to [b]a[b]_{a}.

II-A The Uplink Communication Model

Refer to caption
Figure 1: System model of the hybrid satellite-terrestrial communication network.

We consider an uplink model for the hybrid satellite-terrestrial communication system as shown in Fig. 1. There are NN ground users with indices 𝒩=[N]\mathcal{N}=[N], one terrestrial relay, and one satellite, all assumed to have a single antenna. Each user wishes to transmit messages to the satellite with the assist of the relay. Since the resource of the satellite is finite, we assume that at most KK users are allowed to transmit messages in a time slot simultaneously. Let 𝐮={u1,,uK}[N]K\mathbf{u}=\{u_{1},\ldots,u_{K}\}\in[N]_{K} denote the vector of the indices of the selected users by a scheduling algorithm.

At each time slot, after user scheduling, the communication between the selected KK users and the satellite proceeds in the following two phases. In the first phase, for each k[K]k\in[K], the selected user uku_{k} aims to send a message Muk[1:2nRuk]M_{u_{k}}\in[1:2^{nR_{u_{k}}}] to the relay with power P1P_{1}, rate RukR_{u_{k}} and blocklength nn. Each message MukM_{u_{k}} is then encoded into a length-nn codeword XuknX_{u_{k}}^{n}. The received signal at the terrestrial relay is

YRn=k[K]hukXukn+Zukn,Y_{\mathrm{R}}^{n}=\sum_{k\in[K]}h_{u_{k}}X_{u_{k}}^{n}+Z_{u_{k}}^{n}, (1)

where hukh_{u_{k}} is the channel fading coefficient between the user uku_{k} and the relay, and ZuknZ_{u_{k}}^{n} is the independent additive white Gaussian noise (AWGN) with zero mean and unit variance. Using YRnY_{\mathrm{R}}^{n} and CSI for all KK users, the terrestrial relay decodes the messages of each user as {M~uk}k[K]\{\tilde{M}_{u_{k}}\}_{k\in[K]}. In the second phase, the relay encodes its decoded messages {M~uk}k[K]\{\tilde{M}_{u_{k}}\}_{k\in[K]} into a combined codeword XRnX_{\mathrm{R}}^{n} with power P2P_{2} and sends it to the satellite. The received signal at the satellite is

YDn=hD,RXRn+ZD,Rn,\displaystyle Y_{\mathrm{D}}^{n}=h_{\mathrm{D},\mathrm{R}}X_{\mathrm{R}}^{n}+Z_{\mathrm{D},\mathrm{R}}^{n}, (2)

where hD,Rh_{\mathrm{D},\mathrm{R}} is the channel fading coefficient between the relay and the satellite, and ZD,RnZ_{\mathrm{D},\mathrm{R}}^{n} is the independent AWGN with zero mean and unit variance. Finally, using the noisy outputs YDnY_{\mathrm{D}}^{n} and CSI on the fading coefficient hD,Rh_{\mathrm{D},\mathrm{R}}, the satellite decodes the message {M^uk}k[K]\{\hat{M}_{u_{k}}\}_{k\in[K]}.

II-B Fading Channels and Assumptions

We assume that the channel between each ground user i[N]i\in[N] and the terrestrial relay is an AWGN with Rayleigh fading, i.e., the fading coefficient satisfies hi𝒞𝒩(0,2σi2𝐈)h_{i}\sim\mathcal{CN}(0,2\sigma_{i}^{2}\mathbf{I}). The fading random variables for different ground users are independent. Furthermore, we assume that the channel gain |hD,R||h_{\mathrm{D},\mathrm{R}}| for the channel from the relay to the satellite follows a Shadowed-Rician (SR) distribution with parameters (Ω,b0,ms)(\Omega,b_{0},m_{s}), i.e., |hD,R|SR(Ω,b0,ms)|h_{\mathrm{D},\mathrm{R}}|\sim\mathrm{SR}(\Omega,b_{0},m_{s}), where Ω\Omega, b0b_{0} and msm_{s} are positive real numbers. Here, Ω\Omega denotes the the average power of the LOS component, msm_{s} is the fading order, and 2b02b_{0} represents for the average power of the scattered component.

To evaluate the fundamental limits of the uplink hybrid satellite-terrestrial system, depending on the availability of CSI, we study the instantaneous sum rate as well as the outage probability and formulate corresponding optimization problems to schedule the transmission of ground users. Specifically, we consider the following two cases.

  • Case 1: Perfect Instantaneous CSI

    Similar to most existing works, e.g., [29, 30], we assume that perfect CSI of all channels are available. The CSI can be obtained by channel estimation during each transmission time slot via a backhaul channel [21]. In this setting, we derive the achievable instantaneous sum rate and propose efficient user scheduling algorithms to maximize the sum rate.

  • Case 2: Statistical CSI

    The assumption of perfect instantaneous CSI can be impractical for practical satellite communication systems. To address this concern, we also study the case where only CDI is available. Specifically, the relay only knows the distribution of fading coefficients for channels from each ground user and the satellite only knows the distribution of the fading coefficient for the channel from the relay. In practical systems, CDI can be estimated via channel parameter estimation methods, e.g., the MUSIC algorothm in [31]. Under this setting, we derive the outage probability and propose user scheduling algorithms to minimize the outage probability.

III Main Results for the Case with Perfect Instantaneous CSI

In this section, we analyze the instantaneous achievable rate for the given system and formulate an optimization problem to maximize the sum rate. A solution to the optimization problem is equivalent to a user scheduling algorithm. The optimal solution requires an exhaustive search, which is highly complicated and renders its impossible for practical communication systems. To solve this problem, we first derive theoretical lower and upper bounds and then propose low-complexity user scheduling algorithms that can exploit the tradeoff between the complexity and performance.

III-A Analysis of the Instantaneous Achievable Sum Rate

For each k[K]k\in[K], let Suk:=P1|huk|2S_{u_{k}}:=P_{1}|h_{u_{k}}|^{2} denote the received SNR for the channel between user uk[N]u_{k}\in[N] and the relay and let SD,R:=P2|hD,R|2S_{\mathrm{D},\mathrm{R}}:=P_{2}|h_{\mathrm{D},\mathrm{R}}|^{2} denote the SNR for the channel between the relay and the satellite. Using cut-set bounds for the relay channel and the multiple access channel in [15, Sec. 19.1 and Theorem 19.1], we conclude that given selected users 𝐮=(u1,,uK)\mathbf{u}=(u_{1},\ldots,u_{K}), the instantaneous rate of each user RujR_{u_{j}} is upper bounded by

j[K]Rujmin{C(j[K]Suj),C(SD,R)},\displaystyle\sum_{j\in[K]}R_{u_{j}}\leq\min\left\{C\left(\sum_{j\in[K]}S_{u_{j}}\right),C(S_{\mathrm{D},\mathrm{R}})\right\}, (3)

where C(a)=log(1+a)C(a)=\log(1+a) is the capacity of an AWGN channel with SNR a+a\in\mathbb{R}_{+}.

In a full-duplex DF relaying system with perfect CSI, the sum rate upper bound given by (3) can be achieved via block Markov coding and backward decoding ([15, Sec. 16.4.4 and Table 16.2]), when superposition encoding and successive cancellation decoding are used at the relay and the satellite. For subsequent analysis, we consider the case where the rate tuples {Ruk}k[K]\{R_{u_{k}}\}_{k\in[K]} lies at a corner point on the rate region and thus maximal sum rate is achieved. In particular, let 𝐮:=(u1,,uK)[N]K\mathbf{u}:=(u_{1},\ldots,u_{K})\in[N]_{K} and let u1u2uKu_{1}\rightarrow u_{2}\rightarrow\ldots\rightarrow u_{K} be the decoding order of successive cancellation decoding at the relay, then the signal-to-interference plus noise ratio (SINR) for user uku_{k} at the relay satisfies

γuk=Suki[k+1:K]Sui+1,k[K1]andγuK=SuK.\gamma_{u_{k}}=\frac{S_{u_{k}}}{\sum_{i\in[k+1:K]}S_{u_{i}}+1},k\in[K-1]\mathrm{~{}and~{}}\gamma_{u_{K}}=S_{u_{K}}. (4)

Since the decoding order of successive cancellation at the satellite can be different from that at the relay, we use a bijective mapping Ψ(K,N)\Psi\in\mathcal{F}(K,N) and the decoding order 𝐮\mathbf{u} at the relay to describe the decoding order at the satellite. Specifically, for any k[K]k\in[K], when uku_{k} is the kk-th decoded message at the relay, then it is the Ψ(uk)\Psi(u_{k})-th decoded message at the satellite. Thus, the decoding order 𝐮\mathbf{u} and the bijective mapping Ψ(K,N)\Psi\in\mathcal{F}(K,N) suffice to describe the set of selected users and the decoding orders at both the terrestrial station and the satellite. Note that the transmission power P2P_{2} is split among all KK messages and thus the SINR for each message from the relay to the satellite satisfies

γΨ(uk)=αΨ(uk)i[Ψ(uk)+1:K]αi+1/SD,R,k[K]s.t.Ψ(uk)KγΨ(uk)=αΨ(uk)SD,R,Ψ(uk)=K,\begin{split}\gamma_{\Psi(u_{k})}&=\frac{\alpha_{\Psi(u_{k})}}{\sum_{i\in[\Psi(u_{k})+1:K]}\alpha_{i}+1/S_{\mathrm{D},\mathrm{R}}},~{}\forall~{}k\in[K]\mathrm{~{}s.t.~{}}\Psi(u_{k})\neq K\\ \gamma_{\Psi(u_{k})}&=\alpha_{\Psi(u_{k})}S_{\mathrm{D},\mathrm{R}},\Psi(u_{k})=K,\end{split} (5)

where αΨ(uk)\alpha_{\Psi(u_{k})} is the power splitting ratio of the message from user uku_{k} and satisfies k[K]αΨ(uk)=1\sum_{k\in[K]}\alpha_{\Psi(u_{k})}=1. Therefore, given 𝐮\mathbf{u} and Ψ\Psi, the instantaneous achievable rate of user uku_{k} satisfies

Ruk=min{C(γuk),C(γΨ(uk))},k[K].R_{u_{k}}=\min\left\{C(\gamma_{u_{k}}),C(\gamma_{{\Psi(u_{k})}})\right\},~{}k\in[K]. (6)

III-B Maximize Instantaneous Achievable Sum Rate via An Optimization Problem

Under the assumption that at most KK users are allowed to transmit in a time slot, given a per user rate constraint Rk+R_{k}\in\mathbb{R}_{+}, we formulate the optimization problem in Problem 1 to maximize the achievable instantaneous sum rate as follows:

𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟏:Rsum:=\displaystyle\mathrm{\bf Problem~{}1:}\quad R_{\mathrm{sum}}^{*}:= max𝐮([N]K),Ψ(K,N),(αΨ(u1),,αΨ(uK))[0,1]Kmin{C(j[K]Suj),C(SD,R)}\displaystyle\max_{\begin{subarray}{c}\mathbf{u}\in([N]_{K}),\Psi\in\mathcal{F}(K,N),\\ (\alpha_{\Psi(u_{1})},\ldots,\alpha_{\Psi(u_{K})})\in[0,1]^{K}\end{subarray}}\min\left\{C\left(\sum_{j\in[K]}S_{u_{j}}\right),C(S_{\mathrm{D},\mathrm{R}})\right\} (7)
s.t.RukRtarget,\displaystyle\mathrm{s.t.}~{}R_{u_{k}}\geq R_{\mathrm{target}}, (8)
k[K]αΨ(uk)=1,\displaystyle\quad\sum_{k\in[K]}\alpha_{\Psi(u_{k})}=1, (9)
SuiSujfor(i,j)[K]2andi>j.\displaystyle\quad S_{u_{i}}\geq S_{u_{j}}~{}\mathrm{for~{}}(i,j)\in[K]_{2}\mathrm{~{}and~{}}i>j. (10)

The objective function of Problem 1 is the maximum achievable sum rate and we need to optimize over all possible schedule user decoding orders 𝐮\mathbf{u} at the terrestrial station, all possible decoding orders at the satellite determined by 𝐮\mathbf{u} and the bijective mapping Ψ\Psi, all power allocation vectors (αΨ(u1),,αΨ(uK))(\alpha_{\Psi(u_{1})},\ldots,\alpha_{\Psi(u_{K})}) at the relay. The first constraint in (8) makes sure that every scheduled user satisfies the rate constraint RtargetR_{\mathrm{target}}, the second constraint in (9) is the power constraint at the relay to make sure the total transmission power at the relay is P2P_{2}, and the third constraint in (10) guarantees that the decoding order at the relay: u1u2uKu_{1}\rightarrow u_{2}\rightarrow\ldots\rightarrow u_{K} is in the descend order of received SINRs. To solve the problem, we need to jointly optimize the scheduled users 𝐮\mathbf{u} at the terrestrial station, the decoding order {Ψ(uk)}k[K]\{\Psi(u_{k})\}_{k\in[K]} at the satellite and power allocation vector {αΨ(uk)}k[K]\{\alpha_{\Psi(u_{k})}\}_{k\in[K]} at the relay.

We remark that Problem 1 can be decomposed into two sub-problems. This is because C(uj𝒰Suj)C(\sum_{u_{j}\in\mathcal{U}}S_{u_{j}}) and C(SD,R)C(S_{\mathrm{D},\mathrm{R}}) depend on different optimized parameters. Specifically, we have sequential sub-problems Problem 2(a) and Problem 2(b), where Problem 2(b) uses the solution of Problem 2(a) to proceed.

𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟐(𝐚):\displaystyle\mathrm{\bf Problem2(a):}
max𝐮[N]KC(uk𝒰Suk)\displaystyle\max_{\mathbf{u}\in[N]_{K}}C\left(\sum_{u_{k}\in\mathcal{U}}S_{u_{k}}\right) (11)
s.t.C(γuk)Rtarget,k[K],\displaystyle\mathrm{s.t.}~{}C(\gamma_{u_{k}})\geq R_{\rm{target}},~{}k\in[K], (12)
SuiSujfor(i,j)[N]2andi>j.\displaystyle~{}\quad S_{u_{i}}\geq S_{u_{j}}~{}\mathrm{for~{}}(i,j)\in[N]_{2}\mathrm{~{}and~{}}i>j. (13)
𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟐(𝐛):\displaystyle\mathrm{\bf Problem2(b):}
maxΨ(K,N),(αΨ(u1),,α(Ψ(uK)))[0,1]KC(SD,R)\displaystyle\max_{\begin{subarray}{c}\Psi\in\mathcal{F}(K,N),(\alpha_{\Psi(u_{1})},\ldots,\alpha(\Psi_{(}u_{K})))\in[0,1]^{K}\end{subarray}}C(S_{\mathrm{D},\mathrm{R}}) (14)
s.t.C(γΨ(uk))Rtarget,k[K],\displaystyle\mathrm{s.t.~{}}C(\gamma_{\Psi(u_{k})})\geq R_{\mathrm{target}},k\in[K], (15)
k[K]αΨ(uk)=1.\displaystyle\quad~{}\sum_{k\in[K]}\alpha_{\Psi(u_{k})}=1. (16)

By solving Problem 2(a), we obtain the set of scheduled users and its decoding order 𝐮\mathbf{u} at the relay that maximizes the sum rates of KK users satisfying the rate constraint RtargetR_{\mathrm{target}}. Given 𝐮\mathbf{u}, we can then solve Problem 2(b) for power allocation at the relay to maximize the achievable rate from the relay to the satellite that satisfies RtargetR_{\mathrm{target}} for each scheduled user uku_{k}. Note that the objective function of Problem 2(b) only depends on the fading coefficient hD,Rh_{\mathrm{\mathrm{D},\mathrm{R}}} between the satellite and the relay and is thus independent from user scheduling and power allocation strategies.

With the constraint in (15), the power allocation vector {αΨ(uk)}k[K]\{\alpha_{\Psi(u_{k})}\}_{k\in[K]} satisfies αΨ(uk)i=Ψ(uk)+1Kαi+1/SD,R2Rtarget1\frac{\alpha_{\Psi(u_{k})}}{\sum_{i=\Psi(u_{k})+1}^{K}\alpha_{i}+1/S_{\mathrm{D},\mathrm{R}}}\geq 2^{R_{\mathrm{target}}}-1 for Ψ(uk)[K1]\Psi(u_{k})\in[K-1] and SD,RαK2Rtarget1S_{\mathrm{D},\mathrm{R}}\alpha_{K}\geq 2^{R_{\mathrm{target}}}-1. Thus, αΨ(uk)2Rtarget1SD,R2Rtarget(KΨ(uk))\alpha_{\Psi(u_{k})}\geq\frac{2^{R_{\mathrm{target}}}-1}{S_{\mathrm{D},\mathrm{R}}}2^{R_{\mathrm{target}}(K-\Psi(u_{k}))}. Combined with the power constraint that k[K]αΨ(uk)=1\sum_{k\in[K]}\alpha_{\Psi(u_{k})}=1, we conclude that Problem 2(b) is feasible and we can always find a feasible power allocation vector {αΨ(uk)}k[K]\{\alpha_{\Psi(u_{k})}\}_{k\in[K]} if the number of users supported with rate RtargetR_{\mathrm{target}} satisfies

Klog(SD,R+1)Rtarget.K\leq\frac{\log(S_{\mathrm{D},\mathrm{R}}+1)}{R_{\mathrm{target}}}. (17)

Note that (17) also implies that SD,RS_{\mathrm{D},\mathrm{R}} should be larger than 2Rtarget12^{R_{\mathrm{target}}}-1 to make sure that at least one user can be served with desired rate, i.e., K1K\geq 1.

III-C Upper and Lower Bounds on Instantaneous Achievable Sum Rate RsumR_{\mathrm{sum}}^{*}

To obtain an exact solution of Problem 1, we need to use an exhaustive search method over all possible user scheduling 𝒰[N]K\mathcal{U}\in[N]_{K} and find the largest achievable sum rate RsumR_{\mathrm{sum}}^{*}. However, such a method is infeasible, especially when the total number of users NN is large. As a compromise, we derive closed-form upper and lower bounds on the instantaneous achievable sum rate RsumR_{\mathrm{sum}}^{*}, which can be used as benchmarks for low complexity user scheduling algorithms.

We assume that (17) holds so that Problem 2(b) is feasible and the achievable rate between the relay and the satellite is C(SD,R)C(S_{\mathrm{D},\mathrm{R}}). Then, to bound RsumR_{\mathrm{sum}}^{*}, it suffices to derive upper and lower bounds for the optimal value of Problem 2(a). For any decoding order 𝐮[N]K\mathbf{u}\in[N]_{K}, let Smax:=maxk[N]SkS_{\mathrm{max}}:=\max_{k\in[N]}S_{k} and Smin:=mink[N]SkS_{\mathrm{min}}:=\min_{k\in[N]}S_{k}. Furthermore, let 𝒮={Si}i[N]\mathcal{S}=\{S_{i}\}_{i\in[N]}, given any a+a\in\mathbb{R}_{+} and any set 𝒜\mathcal{A}, let ϕ(a,𝒜):=minSi𝒜:SiaSi\phi(a,\mathcal{A}):=\min_{S_{i}\in\mathcal{A}:S_{i}\geq a}S_{i}. Finally, given any Rtarget+R_{\mathrm{target}}\in\mathbb{R}_{+}, define the following quantities

γtarget\displaystyle\gamma_{\mathrm{target}} :=2Rtarget1,\displaystyle:=2^{R_{\mathrm{target}}}-1, (18)
S^uKlb\displaystyle\hat{S}_{u_{K}}^{\mathrm{lb}} :=ϕ(γtarget,𝒮),S^uklb:=ϕ(γtarget(i[k+1:K]S^uilb+1),𝒮{S^ujlb}j[k+1,K]),k[K1],\displaystyle:=\phi\left(\gamma_{\mathrm{target}},\mathcal{S}\right),~{}\hat{S}_{u_{k}}^{\mathrm{lb}}:=\phi\left(\gamma_{\mathrm{target}}\left(\sum_{i\in[k+1:K]}\hat{S}_{u_{i}}^{\mathrm{lb}}+1\right),\mathcal{S}\setminus\{\hat{S}_{u_{j}}^{\mathrm{lb}}\}_{j\in[k+1,K]}\right),k\in[K-1], (19)
Sukub\displaystyle S_{u_{k}}^{\mathrm{ub}} :=Smax(γtarget+1)k1,k[K1],SuKub:=Smax(γtarget+1)K2γtarget1\displaystyle:=\frac{S_{\mathrm{max}}}{(\gamma_{\mathrm{target}}+1)^{k-1}},k\in[K-1],~{}S_{u_{K}}^{\mathrm{ub}}:=\frac{S_{\mathrm{max}}}{(\gamma_{\mathrm{target}}+1)^{K-2}\gamma_{\mathrm{target}}}-1 (20)
Theorem 1.

Given any target rate RtargetR_{\mathrm{target}} and corresponding γtarget\gamma_{\mathrm{target}}, the following results hold.

  1. (i)

    Problem 2(a) is feasible if and only if

    γtarget/Smaxmin{1,1/(i[k+1:K]S^uilb+1)}\displaystyle\gamma_{\mathrm{target}}/S_{\mathrm{max}}\leq\min\left\{1,1/\left(\sum_{i\in[k+1:K]}\hat{S}_{u_{i}}^{\mathrm{lb}}+1\right)\right\} (21)
  2. (ii)

    If Problem 2(a) is feasible, then

    Rsummin{C(k=1KSuklb),C(SD,R)},\displaystyle R_{\mathrm{sum}}^{*}\geq\min\left\{C\left(\sum_{k=1}^{K}S_{u_{k}}^{\mathrm{lb}}\right),C(S_{\mathrm{D},\mathrm{R}})\right\}, (22)

    where Suklb=S^uklbS_{u_{k}}^{\mathrm{lb}}=\hat{S}_{u_{k}}^{\mathrm{lb}} for k[2,K]k\in[2,K] and Su1lb=SmaxS_{u_{1}}^{\mathrm{lb}}=S_{\mathrm{max}};

  3. (iii)

    RsumR_{\mathrm{sum}}^{*} is upper bounded by

    Rsummin{C(k=1KSukub),C(SD,R)}.\displaystyle R_{\mathrm{sum}}^{*}\leq\min\left\{C\left(\sum_{k=1}^{K}S_{u_{k}}^{\mathrm{ub}}\right),C(S_{\mathrm{D},\mathrm{R}})\right\}. (23)

The proof of Theorem 1 is available in Appendix -A.

III-D A Greedy Iterative User Scheduling Algorithm

To efficiently solve Problem 2(a) with low complexity, we propose a user scheduling algorithm that corresponds to a solution of Problem 2(a) and achieves a near optimal performance of exhaustive search. Specifically, our algorithm proceeds in two phases: given CSI, we first derive the maximum number of users KK that can be served by the system and then propose a greedy iterative user scheduling algorithm to select KK users to transmit. Details are as follows.

III-D1 Determine the maximum number of supported users KK

Given an RtargetR_{\mathrm{target}} and the terrestrial SNR values 𝒮\mathcal{S}, we should first determine the number of supported users. This is because to ensure reliable communication of a multiple-access system, individual rate decreases with the increasing of user numbers [15]. In previous analysis, we derive an upper bound on KK in (17) that depends on the SNR SD,RS_{\mathrm{D,R}} of the satellite-relay link. However, KK is also related with channel qualities of users. Combined with effects of both, we determine KK via the following steps:

  1. Step 1:

    Initialize K=min{N,log(SD,R+1)Rtarget}K=\min\left\{N,\left\lfloor\frac{\log(S_{D,R}+1)}{R_{\mathrm{target}}}\right\rfloor\right\}.

  2. Step 2:

    Given KK, if (21) in Theorem 1 holds, end the algorithm; otherwise, reduce the value of KK by 11 and repeat Step 2 until K=0K=0.

III-D2 Schedule users via a greedy iterative scheduling algorithm

Note that KK has be chosen to ensure that Problem 2(a) is feasible. Solving Problem 2(a) is then equivalent to proposing a user scheduling algorithm based on SNR values of all terrestrial channels. However, Problem 2(a) is a combinatorial optimization problem (COP), which is NP hard and may not have an analytical expression for optimal solution. Furthermore, it is not trivial to solve the problem using traditional integer programming solving methods such as dynamic programming or branch and bound [32], because it is hard to determine the feasible region. To proceed, we propose a greedy algorithm that iteratively selects users and achieves a near optimal performance.

We need several definitions to describe our scheduling algorithm. Given {Si}i[N]\{S_{i}\}_{i\in[N]} of all terrestrial channels, let {Si}i[N]\{S_{i}^{\uparrow}\}_{i\in[N]} be the increasing order and for each n[N]n\in[N], let Lmin(n)L_{\mathrm{min}}(n) is the sum of the weakest nn SINRs of users, i.e., Lmin(n):=i[n]SiL_{\mathrm{min}}(n):=\sum_{i\in[n]}S_{i}^{\uparrow}. Furthermore, given target rate RtargetR_{\mathrm{target}} and the corresponding γtarget=2Rtarget1\gamma_{\mathrm{target}}=2^{R_{\mathrm{target}}}-1, define a sequence 𝐓=(T1,,TK)\mathbf{T}=(T_{1},\ldots,T_{K}) where

T1=Smaxγtarget,T2=min{T1Su2,Su2γtarget},Tk1=min{Tk2Suk1,Suk1γtarget},k[3:K].\displaystyle T_{1}=\frac{S_{\mathrm{max}}}{\gamma_{\mathrm{target}}},~{}T_{2}=\min\left\{T_{1}-S_{u_{2}^{*}},\frac{S_{u_{2}^{*}}}{\gamma_{\mathrm{target}}}\right\},~{}T_{k-1}=\min\left\{T_{k-2}-S_{u_{k-1}^{*}},\frac{S_{u_{k-1}^{*}}}{\gamma_{\mathrm{target}}}\right\},~{}k\in[3:K]. (24)

Our greedy user selection algorithm then operates as follows. For each k[K]k\in[K], let 𝒰k\mathcal{U}_{k} denote the set of users that can be selected. To select the first user, we have 𝒰1=[N]\mathcal{U}_{1}=[N] and we select the first user u1u_{1}^{*} such that its received SNR equals SmaxS_{\mathrm{max}}, i.e., u1=argmaxi[N]Siu_{1}^{*}=\operatorname*{arg\,max}_{i\in[N]}S_{i}. For the subsequent user selection, given each k[K]k\in[K], let

𝒱k\displaystyle\mathcal{V}_{k} :={i𝒰k:Si[Smin,min{Tk1Lmin(k)1,Suk1}]}.\displaystyle:=\big{\{}i\in\mathcal{U}_{k}:~{}S_{i}\in[S_{\mathrm{min}},\min\{T_{k-1}-L_{\mathrm{min}}(k)-1,S_{u_{k-1}^{*}}\}]\big{\}}. (25)

The kk-th user uku_{k}^{*} is then selected as uk=argmaxi𝒱kSiu_{k}^{*}=\operatorname*{arg\,max}_{i\in\mathcal{V}_{k}}S_{i}, and 𝒰k=𝒰k1{uk}\mathcal{U}_{k}=\mathcal{U}_{k-1}\setminus\{u_{k}^{*}\}. To ensure that we can select all KK users, we need to consider whether 𝒱k\mathcal{V}_{k} is empty for any k[K]k\in[K]. If 𝒱k\mathcal{V}_{k} is empty, we update 𝒰k1\mathcal{U}_{k-1} as 𝒰k\mathcal{U}_{k} and trace back to k1k-1 to select another user other than uk1u_{k-1}^{*}. Note that this is possible since after choosing uk1u_{k-1}^{*}, we have already updated 𝒰k1\mathcal{U}_{k-1}. The user selection stops until we select all KK users 𝐮=(u1,u2,,uK)\mathbf{u}^{*}=(u_{1}^{*},u_{2}^{*},\ldots,u_{K}^{*}).

We summarize our greedy iterative user scheduling (GIUS) scheme in Algorithm 1. Our simulation results demonstrate that in most cases, GIUS has performance close to that of exhaustive search while the computational complexity is significantly reduced.

Algorithm 1 Greedy iterative user scheduling algorithm (GIUS)
NN, KK, terrestrial channel coefficients {hk}k[K]\{h_{k}\}_{k\in[K]}, transmission power P1P_{1}, target rate RtargetR_{\mathrm{target}}
Scheduled users 𝐮={u1,u2,,uK}\mathbf{u}^{*}=\{u_{1}^{*},u_{2}^{*},\ldots,u_{K}^{*}\}.
𝒰1=[N]\mathcal{U}_{1}=[N]; Calculate SiS_{i} for i[K]i\in[K], and SmaxS_{\mathrm{max}}, SminS_{\mathrm{min}}, γtarget\gamma_{\mathrm{target}}.
Choose the first user as u1=argmaxi[N]Siu_{1}^{*}=\operatorname*{arg\,max}_{i\in[N]}S_{i}, k2k\leftarrow 2,
𝒰2=𝒰1{u1}\mathcal{U}_{2}=\mathcal{U}_{1}\setminus\{u_{1}^{*}\},
while kKk\leq K do
     Calculate the set 𝒱k\mathcal{V}_{k} from (25)
     if The set 𝒱k\mathcal{V}_{k} is empty then
         kk1k\leftarrow k-1
     else
         Select the kk-th user as uk=argmaxi𝒱kSiu_{k}^{*}=\operatorname*{arg\,max}_{i\in\mathcal{V}_{k}}S_{i}
         𝒰k𝒰k{uk}\mathcal{U}_{k}\leftarrow\mathcal{U}_{k}\setminus\{u_{k}^{*}\}, 𝒰k+1𝒰k\mathcal{U}_{k+1}\leftarrow\mathcal{U}_{k}
         kk+1k\leftarrow k+1
     end if
end while

III-E A Low Complexity User Scheduling Algorithm

The complexity of the user scheduling scheme in Algorithm 1 is strongly related to the channel qualities of terrestrial users, and also scales polynomially with the total number of users NN and scales exponentially with the selected number of users KK in the worst case. Such a complexity might still not be feasible for power limited terrestrial stations.

In claim (ii) of Theorem 1, we derive a lower bound on the achievable sum rate using {Suklb}k[K]\{S_{u_{k}}^{\mathrm{lb}}\}_{k\in[K]}. Inspired by this idea, we propose a lower-bound based user scheduling algorithm (LBUS) by choosing all users to our theoretical derivations {Suklb}k[K]\{S_{u_{k}}^{\mathrm{lb}}\}_{k\in[K]} except uKu_{K}^{*}. The user scheduling scheme is summarized in Algorithm 2.

Algorithm 2 lower-bound based user scheduling algorithm (LBUS)
NN, KK, terrestrial channel coefficients {hk}k[K]\{h_{k}\}_{k\in[K]}, transmission power P1P_{1}, target rate RtargetR_{\mathrm{target}}
Scheduled users 𝐮={u1,u2,,uK}\mathbf{u}^{*}=\{u_{1}^{*},u_{2}^{*},\ldots,u_{K}^{*}\}.
Calculate SiS_{i} for i[K]i\in[K], and SmaxS_{\mathrm{max}}, SminS_{\mathrm{min}}, γtarget\gamma_{\mathrm{target}}.
Choose the first user as u1=argmaxi[N]Siu_{1}^{*}=\operatorname*{arg\,max}_{i\in[N]}S_{i}; Initialize the candidate user set as 𝒰=[N]{u1}\mathcal{U}=[N]\setminus\{u_{1}^{*}\}.
Calculate the candidate set of KK-th user as 𝒰K:={i𝒰:SKminSiSKmax}\mathcal{U}_{K}:=\{i\in\mathcal{U}:~{}S_{K}^{\mathrm{min}}\leq S_{i}\leq S_{K}^{\mathrm{max}}\}, where SKmin=S^uKlbS_{K}^{\mathrm{min}}=\hat{S}_{u_{K}}^{\mathrm{lb}}, SKmax=Smax(γtarget+1)K2γtarget1S_{K}^{\mathrm{max}}=\frac{S_{\mathrm{\mathrm{max}}}}{(\gamma_{\mathrm{target}}+1)^{K-2}\gamma_{\mathrm{target}}}-1.
while 𝒰K\mathcal{U}_{K}\neq\emptyset do
     uKu_{K}^{*} is selected by uK=argmaxi𝒰KSiu_{K}^{*}=\operatorname*{arg\,max}_{i\in\mathcal{U}_{K}}S_{i}.
     Update candidate user set as 𝒰\mathcal{U} as 𝒰{uK}\mathcal{U}\setminus\{u_{K}^{*}\}
     for i=2,,K1i=2,\dots,K-1 do
         User uku_{k}^{*} is chosen as
uk=argmini𝒰:Simax{γtarget(i=k+1KSui+1),Suk+1}Si.\displaystyle u_{k}^{*}=\operatorname*{arg\,min}_{i\in\mathcal{U}:S_{i}\geq\max\big{\{}\gamma_{\mathrm{target}}\big{(}\sum_{i=k+1}^{K}S_{u_{i}^{*}}+1\big{)},S_{u_{k+1}^{*}}\big{\}}}S_{i}. (26)
         Update the candidate user set as 𝒰{uk}\mathcal{U}\setminus\{u_{k}^{*}\}.
     end for
     if (26) does not have a solution for any k[2:K]k\in[2:K] then
         Update the candidate user set as 𝒰=[N]{u1}\mathcal{U}=[N]\setminus\{u_{1}^{*}\}
         Update 𝒰K\mathcal{U}_{K} as 𝒰K{uK}\mathcal{U}_{K}\setminus\{u_{K}^{*}\}.
     else
         Break.
     end if
end while

III-F Numerical Results

In this section, we present simulation results of our proposed algorithms, i.e., the greedy algorithm GIUS and the lower complexity algorithm LBUS, under the assumption of knowledge of instantaneous CSI for channels. We assume that {Si}i[N]\{S_{i}\}_{i\in[N]} are generated i.i.d. from a Rayleigh distribution with the variance P1σ2=10P_{1}\sigma^{2}=10. To better evaluate the performance of different user scheduling schemes, we assume that the channel between the satellite and the relay is strong enough so that the sum rate is only restricted by user scheduling schemes.

III-F1 Achievable Sum Rate

Refer to caption
(a) N=10N=10
Refer to caption
(b) N=20N=20
Figure 2: Achievable sum rate of user scheduling schemes for different number of users as a function of the target rate RtargetR_{\mathrm{target}}.

In Figure 2, we plot the simulated performances of our proposed user scheduling algorithms GIUS and LBUS, versus the optimal exhaustive search, a time division multiple access scheme (TDMA) where each ground user access the channel by a equal time duration, an opportunistic user scheduling scheme where the system always selects the user with the strongest channel gain [19], and our derived upper and lower bounds in Theorem 1. For each user scheduling algorithm, we obtain each data point by averaging the simulated results of 50005000 independent simulations. Figure 2 shows that our GIUS user scheduling algorithm achieves sum rate with negligible loss compared with exhaustive search and thus demonstrates the efficiency of our GIUS algorithm. Comparing the results in Fig. 2(a) and (b), we conclude that the gap between the performance of GIUS and the upper bound becomes smaller as the total number of users NN increases. This phenomenon implies that GIUS tends to be “optimal” for large-scale user groups. It is reasonable because the received SNRs of selected users will tend to the optimal solution {Sukub}k[K]\{S_{u_{k}}^{\mathrm{ub}}\}_{k\in[K]} when NN is large enough.

Besides, Fig. 2 also shows that the performance of LBUS with nearly-linear complexity has worse performance than GIUS, but still better than TDMA and opportunistic user scheduling. This implies that LBUS algorithm, although simple, is still an effective non-orthogonal user scheduling algorithm. Finally, we remark that as RtargetR_{\mathrm{target}} increases, the performance of all user scheduling algorithms becomes identical. This is because when RtargetR_{\mathrm{target}} is sufficiently large, only one user can be served with the desired target rate and the user scheduling reduces to the orthogonal case.

III-F2 Computational Complexity

In this section, we discuss the computational complexity of our user scheduling algorithms with respect to the total number of users NN and the scheduled number of users KK. From the analysis in Section III-E, we conclude that the user scheduling algorithm LBUS has nearly linear complexity with respect to NN as it only needs to select the KK-th user. The computational complexity of GIUS is more complicated. Without loss of generality, assume that the transmit SNR is normalized as 11 and assume that the channel from each user to the terrestrial station is subject to Rayleigh fading with the same variance σ2\sigma^{2}, i.e., hi𝒞𝒩(0,2σ2𝐈)h_{i}\sim\mathcal{CN}(0,2\sigma^{2}\mathbf{I}) for all i[N]i\in[N]. For each k[K]k\in[K], let the number of candidates of GUIS be NkN_{k} and its statistical average with respect to channel statistics is 𝔼(Nk)=NSminmin{T(k1)Lmin(k)1,Suk1}12σ2ex2σ2𝑑x\mathbb{E}\left({N_{k}}\right)=N\int_{S_{\rm{min}}}^{\min\left\{T(k-1)-{L_{{\rm{min}}}}(k)-1,S_{u_{k-1}^{*}}\right\}}\frac{1}{2{\sigma^{2}}}{e^{-\frac{x}{2{\sigma^{2}}}}}dx. Specifically, we have

𝔼(Nk)\displaystyle\mathbb{E}\left({N_{k}}\right) =NSminmin{T(k1)Lmin(k)1,Suk1}12σ2ex2σ2𝑑xNSminT(k1)Lmin(k)112σ2ex2σ2\displaystyle=N\int_{S_{\rm{min}}}^{\min\left\{T(k-1)-{L_{{\rm{min}}}}(k)-1,S_{u_{k-1}^{*}}\right\}}\frac{1}{2{\sigma^{2}}}{e^{-\frac{x}{2{\sigma^{2}}}}}dx\leq N\int_{S_{\rm{min}}}^{T(k-1)-{L_{{\rm{min}}}}(k)-1}\frac{1}{2{\sigma^{2}}}{e^{-\frac{x}{2{\sigma^{2}}}}} (27)
=N(eSmin2σ2e12σ2(T(k1)Lmin(k)1))N(eSmin2σ2e12σ2(Smax/γtargeti=2k1Suk1Lmin(k)1))\displaystyle=N\left(e^{-\frac{{{S_{{\rm{min}}}}}}{{2{\sigma^{2}}}}}-e^{-\frac{1}{{2{\sigma^{2}}}}\left({T(k-1)-{L_{\rm{min}}}(k)-1}\right)}\right)\leq N\left({e^{-\frac{S_{\rm{min}}}{2{\sigma^{2}}}}-e^{-\frac{1}{{2{\sigma^{2}}}}\left({{S_{\rm{max}}}/{\gamma_{\rm{target}}}-\sum\limits_{i=2}^{k-1}{S_{u_{k-1}^{*}}-}{L_{\rm{min}}}(k)-1}\right)}}\right)

For NN large enough, we have Suk1Suk1ubS_{u_{k-1}^{*}}\approx S_{u_{k-1}}^{\mathrm{ub}}, as the received SNRs of selected users will tend to the theoretical optimal solution given by (20) in this case. If Smaxγtargetk2(γtarget1)Lmin(k)1>Smin\frac{S_{\rm{max}}}{\gamma_{\rm{target}}^{k-2}(\gamma_{\rm{target}}-1)}-L_{\rm{min}}(k)-1>S_{\rm{min}}, it follows from (27) that 𝔼(Nk)NeSmin2σ2(1e12σ2(Smaxγtargetk2(γtarget1)Lmin(k)1Smin))\mathbb{E}\left({N_{k}}\right)\leq Ne^{-\frac{S_{\rm{min}}}{{2{\sigma^{2}}}}}\left(1-e^{-\frac{1}{{2{\sigma^{2}}}}\left({\frac{S_{\rm{max}}}{{\gamma_{\rm{target}}^{k-2}(\gamma_{\rm{target}}-1)}}-L_{\rm{min}}(k)-1-S_{{\rm{min}}}}\right)}\right), which is further upper bounded by

𝔼(Nk)NeSmin2σ2(1e12σ2(Lmin(k)+1+Smin)),\mathbb{E}\left({N_{k}}\right)\leq Ne^{-\frac{{{S_{{\rm{min}}}}}}{{2{\sigma^{2}}}}}\left(1-e^{\frac{1}{2{\sigma^{2}}}\left(L_{\rm{min}}(k)+1+S_{{\rm{min}}}\right)}\right), (28)

when kk is large enough. Thus, the average number of candidate users 𝔼(Nk)\mathbb{E}\left({N_{k}}\right) decrease exponentially with kk, which is the total number of selected users so far. This implies that the set of candidate users shrinks significantly after selecting each user and this is the reason why GIUS has much lower complexity compared to exhaustive search.

Next, we numerically simulate the complexity of user scheduling algorithms. To do so, we run 20002000 independent simulations of exhaustive search, GIUS, and LBUS algorithms with the target rates Rtarget=0.6/1.2bit/s/HzR_{\mathrm{target}}=0.6/1.2\mathrm{bit/s/Hz}. We then calculate the average computing times of each user scheduling algorithm. The simulated results are plotted in Figure 3, where Fig. 3(a) demonstrates the running time and Fig. 3(b) plots the achievable sum rate.

Refer to caption
(a) Computational complexity
Refer to caption
(b) Achievable sum rate
Figure 3: The complexity and performance comparison between three user scheduling algorithms.

Fig. 3(a) shows that when Rtarget=1.2bit/s/HzR_{\mathrm{target}}=1.2\mathrm{bit/s/Hz}, the complexity of exhaustive search is much higher than our proposed algorithms GIUS and LBUS. Further, the gaps between the computational complexity of exhaustive search and our algorithms grow when the total number of users grow. On the other hand, Fig. 3(b) shows that for the same case, the achievable sum rates of our GIUS algorithm and exhaustive search are almost the same. This implies that GIUS achieves close-to-optimal performance with much reduced complexity. When the target rate decreases to Rtarget=0.6bit/s/HzR_{\mathrm{target}}=0.6\mathrm{bit/s/Hz}, the number of selected users KK grow. In this case, it is out of computing power to simulate exhaustive search and we only compare the performance of our proposed algorithms. As expected, LBUS has a much reduced complexity, especially for K20K\geq 20. Surprisingly, the loss of achievable rate is tolerable and implies that our linear complexity algorithm LBUS is very useful when the number of selected users is small.

Refer to caption
Figure 4: The average computing times versus KK.
Refer to caption
Figure 5: The average computing times versus channel variation.

To further compare the computational complexity of our proposed algorithms GIUS and LBUS, we simulate both algorithms for different number of selected users KK by changing the target rates RtargetR_{\mathrm{target}}, when the total number of users N=40N=40. The average computing times are plotted in Figure 5. From Figure 5, we find that the computational complexity of GIUS is much more sensitive to the number of selected users KK (and thus the target rate RtargetR_{\mathrm{target}}) while LBUS roughly changes linearly with the number of selected users. In particular, the average computing times of GIUS grows quickly and reaches its maximum point roughly for K=20K=20, while LBUS has much smaller running time for almost all cases.

We also compare the stability of computational complexity of our algorithms. To do so, by setting N=40N=40 and Rtarget=0.4R_{\mathrm{target}}=0.4 bit/s/Hz, we simulate both algorithms 5050 times independently and record the running time. The results are plotted in 5. We find that GIUS strongly depends on the channel realizations while LBUS is more stable. This is because the distributions of channels will determine how the searching field shrinks during each iteration of GIUS.

IV Main Results for the Case with CDI

When the number of users NN is large, it is almost impossible to obtain reliable estimates of the fading coefficients for all channels. Thus, we consider the case where only CDI of each channel is available at the relay and the satellite. Under this case, given a target rate, we derive closed-form expressions for the outage probability with two phases of the communication and formulate an optimization problem to minimize the outage probability. We propose a low complexity solution which corresponds to an efficient user scheduling algorithm for terrestrial users.

IV-A Assumptions and Preliminaries

The set of all terrestrial users 𝒩=[N]\mathcal{N}=[N] are divided into MNM\leq N groups, where users with the same CDI are grouped together. Specifically, for any two users (i,j)[N]2(i,j)\in[N]_{2}, they lie in the same group if the fading coefficients (hi,hj)(h_{i},h_{j}) for their terrestrial channels to the relay have the same distribution. This is valid since this way, users close in locations are grouped together.

For simplicity, given each k[M]k\in[M], we use k\mathcal{M}_{k} to denote users in group kk, whose channel fading coefficients follow Rayleigh distribution with parameter σk2\sigma_{k}^{2}, i.e., hj𝒞𝒩(0,2σk2𝐈)h_{j}\sim\mathcal{CN}(0,2\sigma_{k}^{2}\mathbf{I}) for all jkj\in\mathcal{M}_{k} and σk2\sigma_{k}^{2} is the CDI of users in group k\mathcal{M}_{k}. Note that when only CDI is available, user selection is essentially user group selection. For each time slot, KK (KMK\leq M) users are selected to transmit messages. Let 𝐰:={w1,,wK}[M]K\mathbf{w}:=\{w_{1},\ldots,w_{K}\}\in[M]_{K} be the set of the indices of selected user groups and let 𝐯:=(v1,,vK)[N]K\mathbf{v}:=(v_{1},\ldots,v_{K})\in[N]_{K} be the index vector of the selected users where vkwkv_{k}\in\mathcal{M}_{w_{k}}. Each user vkv_{k} in the group wk\mathcal{M}_{w_{k}} is selected in a time division manner.

The communication proceeds in the two phases as described in Section II. After user scheduling, KK users 𝐯\mathbf{v}, each from a group are selected. For each k[K]k\in[K], user vkv_{k} sends a message MvkM_{v_{k}} to the satellite with power P1P_{1} with the aid of the terrestrial relay, who works in full-duplex DF mode with power P2P_{2}. Successive cancellation decoding is done at the relay and the satellite. The decoding order at the relay is given by v1v2vKv_{1}\rightarrow v_{2}\rightarrow\ldots\rightarrow v_{K}, which satisfies σv12>σv22>>σvK2\sigma_{v_{1}}^{2}>\sigma_{v_{2}}^{2}>\ldots>\sigma_{v_{K}}^{2}. This assumption simplifies the theoretical analysis in the following section. The decoding order at the satellite is related with that at the relay via the bijective mapping Ψ(K,M)\Psi^{\prime}\in\mathcal{F}(K,M).

IV-B Expressions of Outage Probabilities

When only CDI is available, we consider the outage probability, which is the probability that the transmission at a given rate is not supported, as the performance criterion. Given 𝐯=(v1,,vK)\mathbf{v}=(v_{1},\ldots,v_{K}), the outage event of user vjv_{j} occurs if any one of the first j1j-1 user suffers an outage event. Specifically, given a target rate RtargetR_{\mathrm{target}} and thus corresponding γtarget\gamma_{\mathrm{target}} (cf. (18)), for each k[K]k\in[K], the outage probability for user vkv_{k} during the first phase satisfies

vk,out1\displaystyle\mathbb{P}_{v_{k},\mathrm{out}}^{1} =1(Svj(i[j+1:k]Svi+1)γtarget,j[k]),k[K1],\displaystyle=1-\mathbb{P}\left(S_{{v_{j}}}\geq\left(\sum\limits_{i\in[j+1:k]}S_{{v_{i}}}+1\right)\gamma_{\mathrm{target}}~{},j\in[k]\right),~{}k\in[K-1], (29)
vK,out1\displaystyle\mathbb{P}_{v_{K},\mathrm{out}}^{1} =1(Svj(i[j+1:k]Svi+1)γtarget,j[K1];SvKγtarget),\displaystyle=1-\mathbb{P}\left(S_{{v_{j}}}\geq\left(\sum_{i\in[j+1:k]}S_{{v_{i}}}+1\right)\gamma_{\mathrm{target}},j\in[K-1];S_{{v_{K}}}\geq\gamma_{\mathrm{target}}\right), (30)

where Svk=P1|hvk|2S_{v_{k}}=P_{1}|h_{v_{k}}|^{2} is the received SNR of the signals from user vkv_{k}.

Recall that DF is used at the relay and a power allocation vector is used to split the power P2P_{2} at the relay among KK messages of users. Recall that γΨ(vk)\gamma_{\Psi(v_{k})} is the received SNR of user vkv_{k} defined in (5). For the second phase, the outage probability of each user vkv_{k} is

vk,out2=1(γΨ(vk)γtarget,j[k]),k[K].\mathbb{P}_{v_{k},\mathrm{out}}^{2}=1-\mathbb{P}\left(\gamma_{\Psi(v_{k})}\geq\gamma_{\mathrm{target}}~{},j\in[k]\right),~{}k\in[K]. (31)

Note that (31) is subject to the power allocation {αψ(vk)}k[K]\{\alpha_{\psi(v_{k})}\}_{k\in[K]} and the received SNR SD,RS_{\mathrm{D},\mathrm{R}} for the satellite-relay channel. From arguments around (17), if the number of selected users satisfies Klog(SD,R+1)RtargetK\leq\frac{\log(S_{\mathrm{D},\mathrm{R}}+1)}{R_{\mathrm{target}}}, we can always find a power allocation scheme that guarantees γΨ(vk)\gamma_{\Psi(v_{k})} is larger than the threshold γtarget\gamma_{\mathrm{target}}. Thus, the outage probability of each user at the second hop satisfies vk,out2=1(Klog(SD,R+1)Rtarget)\mathbb{P}_{v_{k},\mathrm{out}}^{2}=1-\mathbb{P}\left(K\leq\frac{\log(S_{\mathrm{D},\mathrm{R}}+1)}{R_{\mathrm{target}}}\right) for k[K]k\in[K], i.e., vk,out2=out2=(SD,R<2KRtarget1)\mathbb{P}_{v_{k},\mathrm{out}}^{2}=\mathbb{P}_{\mathrm{out}}^{2}=\mathbb{P}(S_{\mathrm{D},\mathrm{R}}<2^{KR_{\mathrm{target}}}-1) for k[K]k\in[K].

In Theorem 2, we derive a closed-form expression for vK,out\mathbb{P}_{v_{K},\mathrm{out}}, the outage probability for user vKv_{K} at the relay. As we shall show, our user scheduling algorithm relies only on vK,out\mathbb{P}_{v_{K},\mathrm{out}}.

Theorem 2.

The following claims hold.

  1. (i)

    Given the selected users 𝐯={v1,v2,,vK}\mathbf{v}=\{v_{1},v_{2},\ldots,v_{K}\} and the corresponding CDI {σvk2}k[K]\{\sigma_{v_{k}}^{2}\}_{k\in[K]} for their terrestrial channels to the relay, let λvk:=12P1σvk2\lambda_{v_{k}}:=\frac{1}{2P_{1}\sigma_{v_{k}}^{2}} for k[K]k\in[K]. The outage probability vK,out1\mathbb{P}_{v_{K},\mathrm{out}}^{1} of user vKv_{K} during the first phase of uplink communication satisfies

    vK,out1=1λvKAK1γtargetBK1+λvKeγtarget((1+γtarget)BK1+λvK),\mathbb{P}_{v_{K},\mathrm{out}}^{1}=1-\frac{\lambda_{v_{K}}A_{K-1}}{\gamma_{\mathrm{target}}B_{K-1}+\lambda_{v_{K}}}e^{-\gamma_{\mathrm{target}}\left((1+\gamma_{\mathrm{target}})B_{K-1}+\lambda_{v_{K}}\right)}, (32)

    where

    A1\displaystyle A_{1} =1,B1=λv1,Ak\displaystyle=1,B_{1}=\lambda_{v_{1}},~{}A_{k} =λvkAk1γtargetBk1+λvk,Bk=(1+γtarget)Bk1+λvk,k[2,K1].\displaystyle=\frac{\lambda_{v_{k}}A_{k-1}}{\gamma_{\mathrm{target}}B_{k-1}+\lambda_{v_{k}}},B_{k}=(1+\gamma_{target})B_{k-1}+\lambda_{v_{k}},k\in[2,K-1]. (33)
  2. (ii)

    The outage probability out2\mathbb{P}_{\mathrm{out}}^{2} for the second phase communication satisfies

    out2=(2b0ms2b0ms+Ω)msn=0(ms)n(n!)2(Ω2b0ms+Ω)nΓ(n+1,2KRtarget12b0P2),\begin{split}\mathbb{P}_{\mathrm{out}}^{2}=\left(\frac{2b_{0}m_{s}}{2b_{0}m_{s}+\Omega}\right)^{m_{s}}\cdot\sum_{n=0}^{\infty}\frac{(m_{s})_{n}}{(n!)^{2}}\left(\frac{\Omega}{2b_{0}m_{s}+\Omega}\right)^{n}\Gamma\left(n+1,\frac{2^{KR_{\mathrm{target}}}-1}{2b_{0}P_{2}}\right),\end{split} (34)

    where (x)n(x)_{n} is the Pochhammer symbol and Γ(a,x)=0xta1et𝑑t\Gamma(a,x)=\int_{0}^{x}t^{a-1}e^{-t}dt is the unnormalized incomplete Gamma function111The infinite series expression of Eq. (34) is the series expansion of the confluent hypergeometric function 𝐹11(a,b,x)\sideset{{}_{1}}{{}_{1}}{\mathop{F}}(a,b,x) in [33] and [34]. Its convergence and other properties are available in [33] and [34]..

  3. (iii)

    Combining the above two claims, the outage probability for user uKu_{K} satisfies vK,out=1(1vK,out1)(1out2)\mathbb{P}_{v_{K},\mathrm{out}}=1-(1-\mathbb{P}_{v_{K},\mathrm{out}}^{1})(1-\mathbb{P}_{\mathrm{out}}^{2}).

The proof of Theorem 2 is available in Appendix -B.

IV-C Minimize the Outage Probability

Note that the outage probability out2\mathbb{P}_{\mathrm{out}}^{2} is a fixed function of the SNR of the satellite-relay channel and does not relay on user scheduling in the first phase. Thus, to minimize the outage probability of uplink communication, it suffices to minimize the outage probability for the first phase. We then have the following optimization problem.

𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟑:pout:=\displaystyle\mathrm{\bf Problem~{}3:}\quad p_{\mathrm{out}}^{*}:= min𝐯[N]K,𝐰[M]Kvkwk,k[K]maxk[K]{vk,out}\displaystyle\min_{\begin{subarray}{c}\mathbf{v}\in[N]_{K},\mathbf{w}\in[M]_{K}\\ v_{k}\in\mathcal{M}_{w_{k}},k\in[K]\end{subarray}}\max_{k\in[K]}\{\mathbb{P}_{v_{k},\mathrm{out}}\} (35)
s.t.vk,out=1(1vk,out1)(1out2),\displaystyle\mathrm{s.t.}~{}\quad\mathbb{P}_{v_{k},\mathrm{out}}=1-(1-\mathbb{P}_{v_{k},\mathrm{out}}^{1})(1-\mathbb{P}_{\mathrm{out}}^{2}), (36)
λvi<λvj,for(i,j)[K]2s.t.i<j.\displaystyle\quad\lambda_{v_{i}}<\lambda_{v_{j}},~{}\mathrm{for~{}}(i,j)\in[K]_{2}\mathrm{~{}s.t.~{}}i<j. (37)

Recall that successive cancellation decoding is used at the relay. Given a decoding order 𝐯=(v1,,vK)\mathbf{v}=(v_{1},\ldots,v_{K}), the outage event of user vkv_{k} occurs if any user viv_{i} with i<ki<k suffers an outage. Thus, vK,out1vk,out1\mathbb{P}_{v_{K},\mathrm{out}}^{1}\geq\mathbb{P}_{v_{k},\mathrm{out}}^{1} for k[K1]k\in[K-1] and thus maxk[K]vk,out=vK,out\max_{k\in[K]}\mathbb{P}_{v_{k},\mathrm{out}}=\mathbb{P}_{v_{K},\mathrm{out}}.

Problem 3 is an NP-hard problem and it is non-trivial to obtain a closed-form expression for the optimal solution. Note that the objective function vK,out\mathbb{P}_{v_{K},\mathrm{out}} of Problem 3 depends only on {λvk}k[K]\{\lambda_{v_{k}}\}_{k\in[K]}. As a compromise, we first derive an lower bound on the objective function by assuming that λvk\lambda_{v_{k}} is consistent that satisfies λvkλmin\lambda_{v_{k}}\geq\lambda_{\mathrm{min}}, where λmin:=mink[M]{λk}\lambda_{\mathrm{min}}:=\min\limits_{k\in[M]}\{\lambda_{k}\} and λk:=12P1σk2\lambda_{k}:=\frac{1}{2P_{1}\sigma_{k}^{2}} for each k[M]k\in[M]. The relaxed optimization problem is as follows.

𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟒:\displaystyle\mathrm{\bf Problem~{}4:} minλvkλmin,k[K]vK,out\displaystyle\min\limits_{\lambda_{v_{k}}\geq\lambda_{\mathrm{min}},k\in[K]}\mathbb{P}_{v_{K},\mathrm{out}} (38)
s.t.vK,out=1(1vK,out1)(1out2)\displaystyle\mathrm{s.t.~{}}\mathbb{P}_{v_{K},\mathrm{out}}=1-(1-\mathbb{P}_{v_{K},\mathrm{out}}^{1})(1-\mathbb{P}_{\mathrm{out}}^{2}) (39)
Theorem 3.

Problem 4 has unique optimal solution {λvkop}\{\lambda_{v_{k}}^{\rm{op}}\}, which satisfies the following equalities

{λv1op=12σmax2,λvKop=γtargetBK12+γtarget2BK12+4BK12λvkop=1/(i[k:K]1λvkop+Dk,i+γtarget(1+γtarget)Kk),k[2:K1]\left\{\begin{aligned} \lambda_{v_{1}}^{\rm{op}}&=\frac{1}{2\sigma_{max}^{2}},\lambda_{v_{K}}^{\rm{op}}=-\frac{\gamma_{\mathrm{target}}B_{K-1}}{2}+\frac{\sqrt{\gamma_{\mathrm{target}}^{2}B_{K-1}^{2}+4B_{K-1}}}{2}\\ \lambda_{v_{k}}^{\rm{op}}&=1/\left(\sum_{i\in[k:K]}\frac{1}{\lambda_{v_{k}}^{\rm{op}}+D_{k,i}}+\gamma_{\mathrm{target}}(1+\gamma_{\mathrm{target}})^{K-k}\right),~{}k\in[2:K-1]\end{aligned}\right. (40)

where Dk,i=1γtarget(1+γtarget)i1k(γtargetBi1+λviop)λvkopD_{k,i}=\frac{1}{\gamma_{\mathrm{target}}(1+\gamma_{\mathrm{target}})^{i-1-k}}(\gamma_{\mathrm{target}}B_{i-1}+\lambda_{v_{i}}^{\rm{op}})-\lambda_{v_{k}}^{\rm{op}} for i[k+1:K]i\in[k+1:K] and Dk,k=γtargetBk1D_{k,k}=\gamma_{\mathrm{target}}B_{k-1}. Note that {Dk,i}i[k:K]\{D_{k,i}\}_{i\in[k:K]} are independent of λvkop\lambda_{v_{k}}^{\rm{op}}, and BkB_{k} was defined in (33).

The proof of Theorem 3 is available in Appendix -C. Theorem 3 provides a lower bound to the minimal outage probability via solutions to Problem 4 and thus can be used as a benchmark to evaluate the performance of any user scheduling algorithm.

IV-D A Low Complexity User Scheduling Algorithm

Algorithm 3 AO iterative user group selection algorithm (AOIUS)
User group numbers MM, user group indices k\mathcal{M}_{k} (k[M]k\in[M]), CDI parameters {σk2}k[M]\{\sigma_{k}^{2}\}_{k\in[M]}, the transmit power P1P_{1}, the target SINR γtarget\gamma_{\mathrm{target}} , the threshold δ\delta.
Scheduled user groups 𝐰={w1,w2,,wK}\mathbf{w}^{*}=\{w_{1}^{*},w_{2}^{*},\ldots,w_{K}^{*}\}.
Calculate λk=12P1σk2\lambda_{k}=\frac{1}{2P_{1}\sigma_{k}^{2}} for k[M]k\in[M]; Choose the first user group as w1=argmink[M]{λk}w_{1}^{*}=\arg\min_{\begin{subarray}{c}k\in[M]\end{subarray}}\{\lambda_{k}\}.
Initialize 𝒲={w1,w20,w30,,wK0}\mathcal{W}=\{w_{1}^{*},w_{2}^{0},w_{3}^{0},\ldots,w_{K}^{0}\} by randomly selecting from [M][M];
Set out1(0)=1\mathbb{P}_{\mathrm{out}}^{1}(0)=1. Calculate the outage probability out1(1)\mathbb{P}_{\mathrm{out}}^{1}(1) according to (32); i=1i=1.
while |out1(i)out1(i1)|>δ|\mathbb{P}_{out}^{1}(i)-\mathbb{P}_{\mathrm{out}}^{1}(i-1)|>\delta do
     for k=2,,K1k=2,\dots,K-1 do
         𝒲𝒲wki1\mathcal{W}\leftarrow\mathcal{W}\setminus w_{k}^{i-1}.
         Calculate the zero point zwkz_{w_{k}} of h(λwk)h(\lambda_{w_{k}}).
         Calculate wkiw_{k}^{i} by wki=argminj[M]𝒲λwk1i<λj<λwk+1i1|λjzwk|w_{k}^{i}=\arg\min_{\begin{subarray}{c}j\in[M]\setminus\mathcal{W}\\ \lambda_{w_{k-1}^{i}}<\lambda_{j}<\lambda_{w_{k+1}^{i-1}}\end{subarray}}|\lambda_{j}-z_{w_{k}}|.
         𝒲𝒲{wki}\mathcal{W}\leftarrow\mathcal{W}\cup\{w_{k}^{i}\}.
         Update the value of {Bj}j[k:K]\{B_{j}\}_{j\in[k:K]} according to the current 𝒲\mathcal{W} based on (32).
     end for
     𝒲𝒲wKi1\mathcal{W}\leftarrow\mathcal{W}\setminus w_{K}^{i-1}.
     Calculate wKiw_{K}^{i} by wKk=argminj[M]𝒲λwK1i<λj<λmax|λjzwK|w_{K}^{k}=\arg\min_{\begin{subarray}{c}j\in[M]\setminus\mathcal{W}\\ \lambda_{w_{K-1}^{i}}<\lambda_{j}<\lambda_{\mathrm{max}}\end{subarray}}|\lambda_{j}-z_{w_{K}}|, where zwK=γtargetBK12+γtarget2BK12+4BK12z_{w_{K}}=-\frac{\gamma_{\mathrm{target}}B_{K-1}}{2}+\frac{\sqrt{\gamma_{\mathrm{target}}^{2}B_{K-1}^{2}+4B_{K-1}}}{2}.
     𝒲𝒲{wKi}\mathcal{W}\leftarrow\mathcal{W}\cup\{w_{K}^{i}\}.
     ii+1i\leftarrow i+1. Calculate out1(i)\mathbb{P}_{\mathrm{out}}^{1}(i) and BjB_{j} (j[K]j\in[K]) based on (32).
end while
𝐰𝒲\mathbf{w}^{*}\leftarrow\mathcal{W}.

Note that theoretical solutions in (40) are higher degree equations and don’t have closed-form expressions. In this section, to minimize the outage probability, we propose a solution to Problem 3 which corresponds to a user scheduling algorithm. Recall that for each k[M]k\in[M], σk2\sigma_{k}^{2} is the CDI for users in group k\mathcal{M}_{k} and λk=12P1σk2\lambda_{k}=\frac{1}{2P_{1}\sigma_{k}^{2}}. We define a function h(λwk)=1λwki[k:K]1λwk+Dk,iγtarget(1+γtarget)Kkh(\lambda_{w_{k}})=\frac{1}{\lambda_{w_{k}}}-\sum_{i\in[k:K]}\frac{1}{\lambda_{w_{k}}+D_{k,i}}-\gamma_{\mathrm{target}}(1+\gamma_{\mathrm{target}})^{K-k} for each k[2,K1]k\in[2,K-1].

Note that Theorem 3 provides an optimal solution {λvkop}k[K]\{\lambda_{v_{k}}^{\rm{op}}\}_{k\in[K]} to Problem 4, a relaxed version of Problem 3. To obtain a feasible solution, our user scheduling algorithm proceeds by choosing the λvk\lambda_{v_{k}} close to λvkop\lambda_{v_{k}}^{\rm{op}}. As stated before, the user selection is essentially user group selection.

We select user groups 𝐰=(w1,,wK)\mathbf{w}^{*}=(w_{1}^{*},\ldots,w_{K}^{*}) as follows. The first user group w1w_{1}^{*} is selected as the one with the maximal CDI σk2\sigma_{k}^{2}, i.e., w1=argmink[M]{λk}w_{1}^{*}=\arg\min_{\begin{subarray}{c}k\in[M]\end{subarray}}\{\lambda_{k}\}. When only two users are allowed, the second one is selected as w2=argmink[M]w1|λkzw2|w_{2}^{*}=\arg\min_{\begin{subarray}{c}k\in[M]\setminus w_{1}^{*}\end{subarray}}|\lambda_{k}-z_{w_{2}}|, where zw2:=γtargetλw12+γtarget2λw12+4λw12z_{w_{2}}:=-\frac{\gamma_{\mathrm{target}}\lambda_{w_{1}^{*}}}{2}+\frac{\sqrt{\gamma_{\mathrm{target}}^{2}\lambda_{w_{1}^{*}}2+4\lambda_{w_{1}^{*}}}}{2}.

When more than two users are allowed, i.e., K>2K>2, the selection of user groups is more involved and we propose an iterative user group selection scheme based on alternate optimization that is summarized in Algorithm 3 and named AOIUS. We remark that AOIUS converges because the outage probability monotonically decreases during iteration rounds. Specifically, for ii\in\mathbb{N}, in the ii-th iteration, for each k[2:K]k\in[2:K], the kk-th user (group) is selected to minimize the outage probability, which is calculated with respect to parameters {σwji2}j[1:k1]\left\{\sigma_{w_{j}^{i}}^{2}\right\}_{j\in[1:k-1]} updated in the current iteration and {σwji12}j[k+1:K]\left\{\sigma_{w_{j}^{i-1}}^{2}\right\}_{j\in[k+1:K]} obtained in the last iteration. Therefore, the outage probability converges quickly after the first round of the iteration, and slows down as the iteration progresses.

IV-E Numerical Results

To demonstrate the efficiency of our proposed algorithm, we systematically simulate the performance of AOIUS in terms of outage probability and computational complexity. The channel between the relay and the satellite are assumed to be under frequent heavy shadowing, whose parameters are given by (b0,ms,Ω)=(0.063,0.739,8.97×104)(b_{0},m_{s},\Omega)=(0.063,0.739,8.97\times 10^{-4}) [13]. In order to eliminate random effects, we assume that P1σk2P_{1}\sigma_{k}^{2} of group kk is uniformly distributed between (,20 dB](-\infty,20\text{ dB}], based on which average outage probability is computed after 200 times of average channel parameters realizations. The transmit power at the relay is given by P2=30 dBP_{2}=30\text{ dB}. Note that the effects of the noise and large-scale fading of the terrestrial and the satellite channels are not considered during simulation, as they can be included in the transmit power P1P_{1} and P2P_{2} and normalized.

IV-E1 Convergence

To illustrate the convergence of our user scheduling algorithm AOIUS, we simulate AOIUS and plot the results in Fig. 7. Without loss of generality, assume that the channel gain between the satellite and the relay is strong enough so that out21\mathbb{P}_{out}^{2}\approx 1. This assumption doesn’t affect the convergence analysis. The terrestrial average received SNR P1σk2P_{1}\sigma_{k}^{2} of group kk is assumed uniformly distributed over (,20 dB](-\infty,20\text{ dB}]. The target rate is set as Rtarget=0.02R_{\mathrm{target}}=0.02bit/s/Hz and the total number of user groups MM is assumed to be 70007000. The threshold δ\delta for the stopping criterion is set as zero, which means the algorithm stops only when the final outage probability doesn’t change. We simulate AOIUS when the number of allowed users K=5,10,15K=5,10,15. For each KK, we simulate AOIUS five times for independent channel realizations and plot calculated outage probabilities versus iterations. From Fig. 7, we find that using AOIUS, the outage probability of scheduled users monotonically decreases with iteration times and finally converges to a fixed value, which is the theoretical lower bound on the outage probability obtained from Theorem 3. This implies that our user scheduling algorithm is close to optimal in this numerical example.

IV-E2 Outage Probability

Refer to caption
Figure 6: Illustration of the quick convergence of AOIUS.
Refer to caption
Figure 7: Simulated Outage probabilities.

To demonstrate the efficiency of our proposed algorithm, we simulate AOIUS for the cases of K=2,3K=2,3 and compare the results with the optimal exhaustive search strategy. We set M=10M=10, and δ=0\delta=0 as the stopping criterion. The results are plotted in Fig. 7. The difference between theoretical and simulation results is that the theoretical results correspond to simulations of user schedule algorithms where the outage probability is calculated from (46) and numerical correspond to Monte Carlo simulation of the outage probability, which is calculated as the ratio of outage event for 10410^{4} independent realizations of fading channels. For both user scheduling algorithms, the matching of theoretical and numerical simulation results verify the correctness of the calculation of the outage probability in (46). Furthermore, since exhaustive search is optimal, the almost negligible gap between the outage probabilities of AOIUS and exhaustive search implies that our proposed user scheduling algorithm is efficient in minimizing the outage probability. Finally, we comment that the outage probability increases with number of selected users KK. This is because interference among users is more severe when more users transmit messages simultaneously.

IV-E3 Computational Complexity

The optimal exhaustive search is not practical since its complexity scales exponentially as the number of selected users grows. The complexity of AOIUS depends on channel distribution, the target rate, the total number of user groups MM and the number of selected user groups KK. To illustrate the complexity of AOIUS, we simulate the computing times of AOIUS for different KK and target rates. The complexities of AOIUS and exhaustive search are shown in Fig. 9, where each data point corresponds to the average computing time of a single run of user scheduling algorithms over 100 realizations of {σi}i[M]\{\sigma_{i}\}_{i\in[M]}. In this case, we set M=40M=40 and Rtarget=0.02R_{\mathrm{target}}=0.02bit/s/Hz. From Fig. 9, we find that the complexity of AOIUS is much lower and stable, especially for a large number of selected users KK.

Refer to caption
Figure 8: Computing times of exhaustive search and AOIUS.
Refer to caption
Figure 9: Computing times of AOIUS.

Finally, to explore the effect of the target rate RtargetR_{\mathrm{target}} and the selected number of user groups KK on the computational complexity of AOIUS, we simulate AOIUS for M=5000M=5000 user groups and target rates Rtarget=0.04/0.1/0.4/1R_{\mathrm{target}}=0.04/0.1/0.4/1bit/s/Hz respectively and plot the results in Fig. 9. From Fig. 9, we observe that the computation complexity of AOIUS roughly grows linearly with the number of selected users when Rtarget=0.04/0.1R_{\mathrm{target}}=0.04/0.1bit/s/Hz. However, when Rtarget=0.4/1R_{\mathrm{target}}=0.4/1bit/s/Hz, the computational complexity does not scale much with KK. This is because when the target rate is relatively high, the outage event occurs frequently. In extreme case, AOIUS stops at the very beginning of the algorithm as the outage probability is always equals to 1. Thus, the computational complexities for the cases of Rtarget=0.4/1R_{\mathrm{target}}=0.4/1bit/s/Hz drop down when KK is larger than a certain threshold (denoted by K0K_{0}), and then grows very slowly as KK tends to infinity. This implies that the system cannot accommodate as more than K0K_{0} users with the desired target rate. However, the exact characterization of K0K_{0} is challenging and left as future work.

V Conclusion

We studied the hybrid uplink satellite-terrestrial communication model with a single satellite, a terrestrial station as a relay and finitely many ground users. Under mild conditions on the channel models, we studied user scheduling algorithms to maximize the sum rate when perfect CSI of all channels are available and to minimize the outage probability when only CDI of all channels are available. Specifically, when perfect CSI is available, we first derived theoretical upper and lower bounds on the instantaneous sum rate and then proposed a greedy iterative user scheduling algorithm that achieves a near optimal performance with lower complexity. Furthermore, we also proposed a user scheduling algorithm based on our lower bound that has worse performance than the greedy algorithm but also achieves much lower complexity, especially if one wishes to schedule a large number of users in a time slot. When only CDI is available, we first derived analytical expressions for the outage probabilities of two-phase communication and then proposed an alternative optimization based user scheduling algorithm that strikes a balance between performance and complexity. Our results in this paper could shed lights on and inspire the design of user scheduling algorithms for uplink communication of hybrid satellite-terrestrial models.

There are several avenues for future research. Firstly, one can generalize our results to the case where the satellite, the relay and even all the grounds users are equipped with multiple antennas. To do so, one need to use corresponding information theoretical results for the multiple input and multiple out channels [27, 28]. Secondly, one could generalize our results to the more practical communication models with multiple terrestrial relays and multiple satellites. Such analysis requires novel ideas of terrestrial station selection from the perspective of the satellite. Finally, one can also consider block fading models and derive the corresponding results for both CSI and CDI cases [35, 36].

-A Proof of Theorem 1

Note that the optimizing over 𝐮\mathbf{u} is equal to that over SNRs since we select users and decoding orders using SNR.

  1. (i)

    The if part is easy. If (21) holds, {S^uklb}k[K]\{\hat{S}_{u_{k}}^{\mathrm{lb}}\}_{k\in[K]} is a feasible solution and Problem 2(a) is feasible. Conversely, the only if part is proved through the following two steps. Firstly, we show that if Problem 2(a) is feasible, then any feasible solution {Suk}k[K]\{S_{u_{k}}\}_{k\in[K]} satisfies SukS^uklbS_{u_{k}}\geq\hat{S}_{u_{k}}^{\mathrm{lb}} for each k[K]k\in[K], which implies that {S^uklb}k[K]\{\hat{S}_{u_{k}}^{\mathrm{lb}}\}_{k\in[K]} lower bounds any feasible solutions to Problem 2(a). Secondly, we use the above lower bound claim to conclude a contradiction if (21) fails to hold and Problem 2(a) is feasible.

    We first show that {S^uklb}k[K]\{\hat{S}_{u_{k}}^{\mathrm{lb}}\}_{k\in[K]} lower bounds any feasible solutions. If {Suk}k[K]\{S_{u_{k}}\}_{k\in[K]} is feasible to Problem 2(a) but satisfies Sui<S^uilbS_{u_{i}}<\hat{S}_{u_{i}}^{\mathrm{lb}} for some i[K]i\in[K], we have

    γtarget\displaystyle\gamma_{\mathrm{target}} SuK<ϕ(γtarget,𝒮) if i=K;\displaystyle\leq S_{u_{K}}<\phi(\gamma_{\mathrm{target}},\mathcal{S})\text{~{}if~{}}i=K; (41)
    γtarget(j[i+1:K]S^ujlb+1)\displaystyle\gamma_{\mathrm{target}}\left(\sum_{j\in[i+1:K]}\hat{S}_{u_{j}}^{\mathrm{lb}}+1\right) Sui<ϕ(γtarget(j[i+1:K]S^ujlb+1),𝒮{S^utlb}t[i+1,K]) if i[K1]\displaystyle\leq S_{u_{i}}<\phi\left(\gamma_{\mathrm{target}}\left(\sum_{j\in[i+1:K]}\hat{S}_{u_{j}}^{\mathrm{lb}}+1\right),\mathcal{S}\setminus\{\hat{S}_{u_{t}}^{\mathrm{lb}}\}_{t\in[i+1,K]}\right)\text{~{}if~{}}i\in[K-1] (42)

    However, from the definition of ϕ()\phi(\cdot), no such SuiS_{u_{i}} exists. Therefore, any feasible solution {Suk}k[K]\{S_{u_{k}}\}_{k\in[K]} satisfies SukS^uklbS_{u_{k}}\geq\hat{S}_{u_{k}}^{\mathrm{lb}} for k[K]k\in[K].

    Secondly, if (21) fails to hold, then either γtarget>Smax\gamma_{\mathrm{target}}>S_{\mathrm{max}} or there exists an index i[K1]i\in[K-1] that satisfies γtarget(j[i+1:K]S^ujlb+1)>Smax\gamma_{\mathrm{target}}\left(\sum_{j\in[i+1:K]}\hat{S}_{u_{j}}^{\mathrm{lb}}+1\right)>S_{\mathrm{max}}. For the former case, if Problem 2(a) is feasible, then from our claim above, each feasible solution {Suk}k[K]\{S_{u_{k}}\}_{k\in[K]} satisfies that SuKSuKlb>SmaxS_{u_{K}}\geq S_{u_{K}}^{\mathrm{lb}}>S_{\mathrm{max}}. This is impossible from the definition of SmaxS_{\mathrm{max}}. For the latter case, if Problem 2(a) is feasible, then our above claim implies that S^uilb>γtarget(j[i+1:K]S^ujlb+1)\hat{S}_{u_{i}}^{\mathrm{lb}}>\gamma_{\mathrm{target}}\left(\sum_{j\in[i+1:K]}\hat{S}_{u_{j}}^{\mathrm{lb}}+1\right) and each feasible solution {Suk}k[K]\{S_{u_{k}}\}_{k\in[K]} satisfies SuiSuilb>SmaxS_{u_{i}}\geq S_{u_{i}}^{\mathrm{lb}}>S_{\mathrm{max}}. Again, this is impossible.

    Therefore, we have now showed that Problem 2(a) cannot be feasible if (21) fails to hold and thus the only if part is proved.

  2. (ii)

    The lower bound follows since the chosen user scheduling vector 𝐮\mathbf{u} corresponding to {Suklb}k[K]\{S_{u_{k}}^{\mathrm{lb}}\}_{k\in[K]} is a feasible solution to Problem 2(a).

  3. (iii)

    The upper bound is obtained by relaxing the constraints in Problem 2(a) and solving the following new linear programming problem

    𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟐(𝐚)𝐋𝐏:\displaystyle\mathrm{\bf Problem~{}2(a)~{}LP:~{}} maxSukSmaxC(k[K]Suk)\displaystyle\max_{\begin{subarray}{c}S_{u_{k}}\leq S_{\mathrm{max}}\end{subarray}}C\left(\sum_{k\in[K]}S_{u_{k}}\right) (43)
    s.t.C(γuk)Rtarget,k[K],\displaystyle\mathrm{s.t.~{}}C(\gamma_{u_{k}})\geq R_{\rm{target}},k\in[K], (44)
    Sui>Suj,(i,j)[N]2andij,\displaystyle~{}\quad S_{u_{i}}>S_{u_{j}},~{}(i,j)\in[N]_{2}\mathrm{~{}and~{}}i\neq j, (45)

    where the optimization parameters SR,ukS_{\mathrm{R},u_{k}} are assumed continuous and satisfy SukSmaxS_{u_{k}}\leq S_{\mathrm{max}}. Note that claim (iii) holds since the optimization region of SINRs is enlarged.

-B Proof of Theorem 2

We only provide proofs for claim (i) and (ii) in Theorem 2, as the last claim is straightforward.

  1. (i)

    For Rayleigh fading channels, the probability dense function (pdf) of the received SNR SR,kS_{R,k} is PSk(x)=λkeλkxP_{S_{k}}(x)=\lambda_{k}e^{-\lambda_{k}x}, where λk=12P1σk2\lambda_{k}=\frac{1}{2P_{1}\sigma_{k}^{2}}. Using the properties of exponential distribution, we can derive the close-form of the outage probability during the first hop as

    uK,out1=1xKγtargetxK1γtarget(xK+1)x1γtarget(x2+x3+,,+xK+1)pSR,uK,SR,uK1,,SR,u1(xK,xK1,,x1)dxKdxK1,.,dx1=1xKγtargetxK1γtarget(xK+1)x1γtarget(x2+x3+,,+xK+1)(j=1Kλuj)ei=1KλuixuidxKdxK1,.,dx1=1λuKAK1γtargetBK1+λuKeγtarget((1+γtarget)BK1+λuK)\begin{split}\mathbb{P}_{u_{K},\mathrm{out}}^{1}&=1-\oiint\limits_{\begin{subarray}{c}x_{K}\geq\gamma_{\mathrm{target}}\\ x_{K-1}\geq\gamma_{\mathrm{target}}(x_{K}+1)\\ \ldots\\ x_{1}\geq\gamma_{\mathrm{target}}(x_{2}+x_{3}+,...,+x_{K}+1)\end{subarray}}p_{S_{R,u_{K}},S_{R,u_{K-1}},\ldots,S_{R,{u_{1}}}}(x_{K},x_{K-1},...,x_{1})d{x_{K}}d{x_{K-1}},....,d{x_{1}}\\ &=1-\oiint\limits_{\begin{subarray}{c}x_{K}\geq\gamma_{\mathrm{target}}\\ x_{K-1}\geq\gamma_{\mathrm{target}}(x_{K}+1)\\ \ldots\\ x_{1}\geq\gamma_{\mathrm{target}}(x_{2}+x_{3}+,...,+x_{K}+1)\end{subarray}}\left(\prod\limits_{j=1}^{K}\lambda_{u_{j}}\right)e^{-\sum\limits_{i=1}^{K}\lambda_{u_{i}}x_{u_{i}}}d{x_{K}}d{x_{K-1}},....,d{x_{1}}\\ &=1-\frac{\lambda_{u_{K}}A_{K-1}}{\gamma_{\mathrm{target}}B_{K-1}+\lambda_{u_{K}}}e^{-\gamma_{\mathrm{target}}\left((1+\gamma_{\mathrm{target}})B_{K-1}+\lambda_{u_{K}}\right)}\end{split} (46)
  2. (ii)

    The outage probability during the second transmission phase is given by out2=(SD,R<2KRtarget1)=02KRtarget1pSD,R(s)𝑑s\mathbb{P}_{\mathrm{out}}^{2}=\mathbb{P}(S_{\mathrm{D},\mathrm{R}}<2^{KR_{\mathrm{target}}}-1)=\int_{0}^{2^{KR_{\mathrm{target}}}-1}p_{S_{\mathrm{D},\mathrm{R}}}(s)ds, where pSD,R(s)p_{S_{\mathrm{D},\mathrm{R}}}(s) is the pdf of SD,RS_{\mathrm{D},\mathrm{R}}. Using [13] (Eq. (3)), the pdf of SD,RS_{\mathrm{D},\mathrm{R}} is derived as (47)

    pSD,R(s)=12P2b0(2b0ms2b0ms+Ω)msexp(s2P2b0)𝐹11(ms,1,Ωs2P2b0(2b0ms+Ω))p_{S_{\mathrm{D},\mathrm{R}}}(s)=\frac{1}{2P_{2}b_{0}}\left(\frac{2b_{0}m_{s}}{2b_{0}m_{s}+\Omega}\right)^{m_{s}}\exp\left(-\frac{s}{2P_{2}b_{0}}\right)\sideset{{}_{1}}{{}_{1}}{\mathop{F}}\left(m_{s},1,\frac{\Omega s}{2P_{2}b_{0}(2b_{0}m_{s}+\Omega)}\right) (47)

    where 𝐹11(a,b,x)\sideset{{}_{1}}{{}_{1}}{\mathop{F}}(a,b,x) is the confluent hyper-geometric function [34]. The proof is done by using the fact that 𝐹11(a,b,x)\sideset{{}_{1}}{{}_{1}}{\mathop{F}}(a,b,x) can be simplified as 𝐹11(a,b,x)=n=0(a)nn!(b)nxn\sideset{{}_{1}}{{}_{1}}{\mathop{F}}(a,b,x)=\sum_{n=0}^{\infty}\frac{(a)_{n}}{n!(b)_{n}}x^{n} [37].

-C Proof of Theorem 3

Note that uK,out\mathbb{P}_{u_{K},\mathrm{out}} is a function of λu1,,λuK\lambda_{u_{1}},\ldots,\lambda_{u_{K}}. For subsequent analysis, let f(λu1,,λuK):=log(1uK,out1)f(\lambda_{u_{1}},\ldots,\lambda_{u_{K}}):=\log(1-\mathbb{P}_{u_{K},\mathrm{out}}^{1}). This way, the minimization of uK,out\mathbb{P}_{u_{K},\mathrm{out}} is equivalent to the maximization of f()f(\cdot).

The partial derivation of f()f(\cdot) with respect to λuk\lambda_{u_{k}} satisfies

f()λuk=γtargetBk1λuk(γtargetBk1+λuk)(γtarget(γtarget+1)Kk+i=k+1Kγtarget(γtarget+1)ik1γtargetBi1+λui)=1λuki[k:K]1λuk+Dk,iγtarget(1+γtarget)Kk,k[2,K1].\begin{split}\frac{\partial f(\cdot)}{\partial\lambda_{u_{k}}}&=\frac{\gamma_{\mathrm{target}}B_{k-1}}{\lambda_{u_{k}}(\gamma_{\mathrm{target}}B_{k-1}+\lambda_{u_{k}})}-\left(\gamma_{\mathrm{target}}(\gamma_{\mathrm{target}}+1)^{K-k}+\sum\limits_{i=k+1}^{K}\frac{\gamma_{\mathrm{target}}(\gamma_{\mathrm{target}}+1)^{i-k-1}}{\gamma_{\mathrm{target}}B_{i-1}+\lambda_{u_{i}}}\right)\\ &=\frac{1}{\lambda_{u_{k}}}-\sum_{i\in[k:K]}\frac{1}{\lambda_{u_{k}}+D_{k,i}}-\gamma_{\mathrm{target}}(1+\gamma_{\mathrm{target}})^{K-k},k\in[2,K-1].\end{split} (48)

We then prove that (48) only has one zero point, which implies f()f(\cdot) only has one global maximum value. The second partial derivative of f()f(\cdot) with respect to λuk\lambda_{u_{k}} for each k[2,K1]k\in[2,K-1] is 2f()λuk2=1λuk2+i[k:K](1λuk+Dk,i)2=g(λuk)λuk2\frac{\partial^{2}f(\cdot)}{\partial\lambda_{u_{k}}^{2}}=-\frac{1}{\lambda_{u_{k}}^{2}}+\sum_{i\in[k:K]}\left(\frac{1}{\lambda_{u_{k}}+D_{k,i}}\right)^{2}=\frac{g(\lambda_{u_{k}})}{\lambda_{u_{k}}^{2}}, where g(λuk):=1+i[k:K](λukλuk+Dk,i)2g(\lambda_{u_{k}}):=-1+\sum_{i\in[k:K]}\left(\frac{\lambda_{u_{k}}}{\lambda_{u_{k}}+D_{k,i}}\right)^{2}. Note that g(λuk)g(\lambda_{u_{k}}) monotonically increases with λuk\lambda_{u_{k}}, and the extreme values satisfy limλuk0i[k:K]g(λuk)=1\lim_{\lambda_{u_{k}}\rightarrow 0}\sum_{i\in[k:K]}g(\lambda_{u_{k}})=-1, limλuk+g(λuk)=Kk\lim_{\lambda_{u_{k}}\rightarrow+\infty}g(\lambda_{u_{k}})=K-k. Thus, there only exists one zero point z0z_{0} for 2f()λuk2\frac{\partial^{2}f(\cdot)}{\partial\lambda_{u_{k}}^{2}} such that 2f()λuk20\frac{\partial^{2}f(\cdot)}{\partial\lambda_{u_{k}}^{2}}\geq 0 if and only if λukz0\lambda_{u_{k}}\geq z_{0}, i.e., f()λuk\frac{\partial f(\cdot)}{\partial\lambda_{u_{k}}} first decreases in λuk\lambda_{u_{k}} and then increases in λuk\lambda_{u_{k}} with the critical point of z0z_{0}. Further, we have limλuk0f()λuk=+\lim_{\lambda_{u_{k}}\rightarrow 0}\frac{\partial f(\cdot)}{\partial\lambda_{u_{k}}}=+\infty and limλuk+f()λuk=γtarget(1+γtarget)Kk\lim_{\lambda_{u_{k}}\rightarrow+\infty}\frac{\partial f(\cdot)}{\partial\lambda_{u_{k}}}=-\gamma_{\mathrm{target}}(1+\gamma_{\mathrm{target}})^{K-k}. Thus, there is only one zero point λukop\lambda_{u_{k}}^{\rm{op}} of the first derivative f()λuk\frac{\partial f(\cdot)}{\partial\lambda_{u_{k}}} and f()f(\cdot) increases in its parameters first and then decreases with the critical point λukop\lambda_{u_{k}}^{\rm{op}}. As a result, f()f(\cdot) has only one global maximum value for any k[2,K1]k\in[2,K-1]. The cases of k=1,Kk=1,K are straightforward so the detailed analysis are omitted. The solution to Problem 4, λukop\lambda_{u_{k}}^{\rm{op}} (k[K]k\in[K]) meets (40). The theorem is proved.

References

  • [1] P. Chini, G. Giambene, and S. Kota, “A survey on mobile satellite systems,” Int. J. Satell. Commun., vol. 28, no. 1, pp. 29–57, 2010.
  • [2] Z. Lin, M. Lin, J.-B. Wang, Y. Huang, and W.-P. Zhu, “Robust secure beamforming for 5G cellular networks coexisting with satellite networks,” IEEE J. Sel. Ares. Commun., vol. 36, no. 4, pp. 932–945, 2018.
  • [3] K. An, M. Lin, T. Liang, J.-B. Wang, J. Wang, Y. Huang, and A. L. Swindlehurst, “Performance analysis of multi-antenna hybrid satellite-terrestrial relay networks in the presence of interference,” IEEE Trans. Commun., vol. 63, no. 11, pp. 4390–4404, 2015.
  • [4] Y. Ruan, Y. Li, C.-X. Wang, and R. Zhang, “Energy efficient adaptive transmissions in integrated satellite-terrestrial networks with SER constraints,” IEEE Trans. Wireless Commun., vol. 17, no. 1, pp. 210–222, 2017.
  • [5] K. Guo, K. An, B. Zhang, Y. Huang, and G. Zheng, “Outage analysis of cognitive hybrid satellite-terrestrial networks with hardware impairments and multi-primary users,” IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 816–819, 2018.
  • [6] V. Bankey and P. K. Upadhyay, “Secrecy outage analysis of hybrid satellite-terrestrial relay networks with opportunistic relaying schemes,” in IEEE 85th Vehicular Technology Conference (VTC Spring).   IEEE, 2017, pp. 1–5.
  • [7] N. I. Miridakis, D. D. Vergados, and A. Michalas, “Dual-hop communication over a satellite relay and shadowed Rician channels,” IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4031–4040, 2014.
  • [8] P. K. Upadhyay and P. K. Sharma, “Max-max user-relay selection scheme in multiuser and multirelay hybrid satellite-terrestrial relay systems,” IEEE Commun. Lett., vol. 20, no. 2, pp. 268–271, 2015.
  • [9] C. Zhang, H. Lin, Y. Huang, and L. Yang, “Performance of integrated satellite-terrestrial relay network with relay selection and outdated CSI,” IEEE Access, vol. 8, pp. 169 652–169 662, 2020.
  • [10] P. Hajipour, A. Shahzadi, and S. Ghazi-Maghrebi, “Improved performance for a heterogeneous satellite-cooperative network with best relay node selection,” China Commun., vol. 16, no. 5, pp. 93–105, 2019.
  • [11] L. Zhou, A. Wolf, and M. Motani, “On lossy multi-connectivity: Finite blocklength performance and second-order asymptotics,” IEEE J. Sel. Ares. Commun., vol. 37, no. 4, pp. 735–748, 2019.
  • [12] W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 4232–4265, 2014.
  • [13] A. Abdi, W. C. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile satellite channels: First-and second-order statistics,” IEEE Trans. Wireless Commun., vol. 2, no. 3, pp. 519–528, 2003.
  • [14] D. Tse and V. Pramod, Fundamentals of wireless communication.   Cambridge university, 2005.
  • [15] A. El Gamal and Y.-H. Kim, Network information theory.   Cambridge university press, 2011.
  • [16] R. Hunger, W. Utschick, D. A. Schmidt, and M. Joham, “Alternating optimization for MMSE broadcast precoding,” in Proc. IEEE International Conference on Acoustics Speech and Signal Processing Proceedings (ICASSP), vol. 4.   IEEE, 2006, pp. IV–IV.
  • [17] S. S. Christensen, R. Agarwal, E. De Carvalho, and J. M. Cioffi, “Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4792–4799, 2008.
  • [18] Z. Yuan, K. Guo, H. Kong, X. Liu, Y. Li, and B. Xu, “Ergodic capacity of multiuser hybrid satellite-terrestrial cooperative networks with SNR-threshold based feedback,” in Proc. 2020 Cross Strait Radio Science & Wireless Technology Conference (CSRSWTC).   IEEE, 2020, pp. 1–3.
  • [19] K. An, M. Lin, and T. Liang, “On the performance of multiuser hybrid satellite-terrestrial relay networks with opportunistic scheduling,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1722–1725, 2015.
  • [20] V. Bankey and P. K. Upadhyay, “Ergodic capacity of multiuser hybrid satellite-terrestrial fixed-gain af relay networks with cci and outdated csi,” IEEE Trans. Veh. Technol., vol. 67, no. 5, pp. 4666–4671, 2018.
  • [21] Z. Lin, M. Lin, J.-B. Wang, T. De Cola, and J. Wang, “Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 657–670, 2019.
  • [22] X. Zhu, C. Jiang, L. Kuang, N. Ge, and J. Lu, “Non-orthogonal multiple access based integrated terrestrial-satellite networks,” IEEE J. Sel. Ares. Commun., vol. 35, no. 10, pp. 2253–2267, 2017.
  • [23] Y. Yang, X. Gao, and X.-G. Xia, “A closed-form capacity upper bound of multibeam GEO MSC uplink channel,” IEEE Wireless Commun. Lett., vol. 5, no. 6, pp. 576–579, 2016.
  • [24] Q. Huang, M. Lin, W.-P. Zhu, J. Cheng, and M.-S. Alouini, “Uplink massive access in mixed RF/FSO satellite-aerial-terrestrial networks,” IEEE Trans. Commun., vol. 69, no. 4, pp. 2413–2426, 2021.
  • [25] M. Arti, “A novel beamforming and combining scheme for two-way AF satellite systems,” IEEE Trans. Veh. Technol., vol. 66, no. 2, pp. 1248–1256, 2016.
  • [26] C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J., vol. 27, no. 1, pp. 379–423, 1948.
  • [27] B. Wang, J. Zhang, and A. Host-Madsen, “On the capacity of mimo relay channels,” IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 29–43, 2005.
  • [28] A. Goldsmith, S. Jafar, N. Jindal, and S. Vishwanath, “Capacity limits of mimo channels,” IEEE J. Sel. Ares. Commun, vol. 21, no. 5, pp. 684–702, 2003.
  • [29] M. Lin, Z. Lin, W.-P. Zhu, and J.-B. Wang, “Joint beamforming for secure communication in cognitive satellite terrestrial networks,” IEEE J. Sel. Ares. Commun., vol. 36, no. 5, pp. 1017–1029, 2018.
  • [30] J. Zhang, X. Zhang, M. A. Imran, B. Evans, Y. Zhang, and W. Wang, “Energy efficient hybrid satellite terrestrial 5G networks with software defined features,” J. Commun. Networks, vol. 19, no. 2, pp. 147–161, 2017.
  • [31] R. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Trans. Antennas Propag., vol. 34, no. 3, pp. 276–280, 1986.
  • [32] L. A. Wolsey, Integer programming.   John Wiley & Sons, 2020.
  • [33] A. T. James, “Distributions of matrix variates and latent roots derived from normal samples,” The Annals of Mathematical Statistics, vol. 35, no. 2, pp. 475–501, 1964.
  • [34] M. Abramowitz, I. A. Stegun, and R. H. Romer, “Handbook of mathematical functions with formulas, graphs, and mathematical tables,” 1988.
  • [35] W. Yang, G. Durisi, and E. Riegler, “On the capacity of large-mimo block-fading channels,” IEEE J. Sel. Ares. Commun, vol. 31, no. 2, pp. 117–132, 2013.
  • [36] A. Collins and Y. Polyanskiy, “Coherent multiple-antenna block-fading channels at finite blocklength,” IEEE Trans. Inf. Theory, vol. 65, no. 1, pp. 380–405, 2019.
  • [37] G. Alfano and A. De Maio, “Sum of squared shadowed-Rice random variables and its application to communication systems performance prediction,” IEEE Trans. Wireless Commun., vol. 6, no. 10, pp. 3540–3545, 2007.