Chapter Summary
Chapter Summary
Key Points
- 1.
The MAN scheme is a two-phase coded caching strategy. Placement (off-peak) splits each file into equal-sized subfiles , with ranging over -subsets of ; user caches exactly those subfiles whose index set contains . Delivery (peak) sends one XOR message per -subset of : .
- 2.
Each coded message simultaneously serves users. For every , all summands except are already in user 's cache, so XOR cancellation recovers the missing subfile. This is the coded multicasting gain, .
- 3.
Memory-load theorem: For integer , the MAN worst-case delivery rate is The gain over uncoded caching is exactly β multiplicative in the aggregate cache size.
- 4.
The rate formula has two factors: a local caching gain and a coded multicasting gain . The local gain is captured by any caching scheme; the coded gain is unique to schemes with combinatorial placement and XOR delivery. As at fixed , the coded gain is unbounded while the local gain saturates.
- 5.
Memory sharing extends the scheme to non-integer . The lower convex envelope of the integer- operating points is achievable by time-sharing two adjacent points with weight . The achievable region is piecewise-linear.
- 6.
Subpacketization is the practical bottleneck. For , , we need subfiles per file β infeasible. Chapter 14 develops polynomial-subpacketization schemes (PDAs, graph coloring) that approach the MAN gain without the exponential overhead.
- 7.
The MAN scheme is demand-agnostic. Placement is fixed once (independent of future demands); delivery adapts to the demand vector via the summands of each . The worst-case rate bound holds uniformly over all .
Looking Ahead
We have proved the achievability side of coded caching: . Chapter 3 asks the converse question: is this rate actually optimal? The answer is a layered one. Under uncoded placement, Yu-Maddah-Ali-Avestimehr (2018) proved optimality exactly. Under arbitrary (possibly coded) placement, the problem remains open β the best known lower bounds are tighter than Maddah-AliβNiesen's original factor-of-12 bound but still leave a gap. Chapter 3 develops the cut-set converse and surveys the state of the art, including a CommIT result on correlated-files delivery that sharpens the rate bound when file correlation is exploited.