Prerequisites & Notation

Before You Begin

This chapter builds the Maddah-Ali–Niesen scheme from scratch. The required machinery is minimal — basic probability, XOR arithmetic over F2\mathbb{F}_2, and a little combinatorics — but you should be comfortable with each item before starting.

  • The shared-link coded caching model (Ch 1)(Review ch01)

    Self-check: Can you state the placement/delivery split and the worst-case rate R(M)R^*(M)?

  • Binomial coefficients and tt-subsets of [K][K]

    Self-check: For K=5K = 5, t=2t = 2, can you enumerate (52)=10\binom{5}{2} = 10 subsets?

  • XOR over F2F\mathbb{F}_2^F (bitwise addition of file-sized vectors)

    Self-check: Given abca \oplus b \oplus c and a,ba, b, can you recover cc?

  • Basic entropy bounds H(X,Y)H(X)+H(Y)\mathrm{H}(X, Y) \leq \mathrm{H}(X) + \mathrm{H}(Y)(Review ch01)

    Self-check: Can you identify when equality holds (independence)?

  • Worst-case demand vectors in [N]K[N]^K(Review ch01)

    Self-check: Can you explain why worst-case means all distinct demands when KNK \leq N?

Notation for This Chapter

Symbols introduced in Chapter 2. The MAN scheme uses a heavy but systematic notational load: subfiles Wn,SW_{n,\mathcal{S}} and coded messages XSX_{\mathcal{S}'} indexed by subsets of [K][K].

SymbolMeaningIntroduced
t=KM/Nt = K M/NCoded caching gain parameter (assumed integer for the base scheme)s01
Wn,SW_{n,\mathcal{S}}Subfile of file WnW_n indexed by subset S[K]\mathcal{S} \subseteq [K], S=t|\mathcal{S}| = ts02
FFSubpacketization: number of subfiles per file; F=(Kt)F = \binom{K}{t} in the base schemes02
S\mathcal{S}tt-subset of [K][K]: S=t|\mathcal{S}| = ts02
S\mathcal{S}'(t+1)(t+1)-subset of [K][K]: S=t+1|\mathcal{S}'| = t+1; indexes a coded messages03
XSX_{\mathcal{S}'}Coded XOR message for subset S\mathcal{S}': kSWdk,S{k}\bigoplus_{k \in \mathcal{S}'} W_{d_k, \mathcal{S}' \setminus \{k\}}s03
Zk\mathcal{Z}_kCache content of user kk: the set of all Wn,SW_{n,\mathcal{S}} for which kSk \in \mathcal{S}s02