Exercises

ex-cc-ch08-01

Easy

Compute the NDT upper bound for K=20K = 20, NEN=4N_\text{EN} = 4, LEN=2L_\text{EN} = 2, M/N=0.25M/N = 0.25, CF=2C_F = 2.

ex-cc-ch08-02

Easy

State why NDT β‰₯1\geq 1 always, and what operating point achieves NDT = 1.

ex-cc-ch08-03

Easy

As CFβ†’βˆžC_F \to \infty and Mβ†’0M \to 0, the NDT reduces to a specific Chapter 5 formula. Identify it.

ex-cc-ch08-04

Easy

What is the "aggregate caching gain" in a C-RAN model, and how does it differ from the MAN scheme's t=KM/Nt = KM/N?

ex-cc-ch08-05

Easy

For iso-NDT contours, compute the marginal substitution rate βˆ’βˆ‚C/βˆ‚ΞΌ-\partial C/\partial \mu at ΞΌ=0.2\mu = 0.2, C=2C = 2, K=10K = 10, NEN=2N_\text{EN} = 2 (Ξ”βˆ—=3\Delta^* = 3).

ex-cc-ch08-06

Medium

Achievability sketch. Outline the achievability scheme for the NDT upper bound max⁑(1,downlink+fronthaul)\max(1, \text{downlink} + \text{fronthaul}).

ex-cc-ch08-07

Medium

Economic optimization. An operator has cache cost cMc_M per file per EN and fronthaul cost cCc_C per file-per-use per EN. Derive the optimal (ΞΌβˆ—,Cβˆ—\mu^*, C^*) for target NDT Ξ”βˆ—\Delta^*.

ex-cc-ch08-08

Medium

Substitution rate at extreme corners. Compute βˆ’βˆ‚C/βˆ‚ΞΌ-\partial C/\partial \mu at (ΞΌ,C)=(0.01,10)(\mu, C) = (0.01, 10) vs (0.9,0.1)(0.9, 0.1) for K=10K = 10, NEN=2N_\text{EN} = 2. Which end is cache-heavy?

ex-cc-ch08-09

Medium

NDT and DoF. Show that when ΞΌ=0\mu = 0, the NDT formula reduces to a DoF-type expression with effective antenna count NENLENN_\text{EN} L_\text{EN} (and cloud DoF NENCN_\text{EN} C additional).

ex-cc-ch08-10

Medium

Lampiris-Caire gain in C-RAN. Quantify the additional DoF gain from coded caching in a C-RAN with NEN=4N_\text{EN} = 4, LEN=4L_\text{EN} = 4, K=40K = 40, ΞΌ=0.1\mu = 0.1. Compare with ΞΌ=0\mu = 0.

ex-cc-ch08-11

Hard

Converse proof sketch. Prove the NDT lower bound Ξ”β‰₯max⁑(1,K(1βˆ’ΞΌ)/(NENLEN)+K(1βˆ’ΞΌ)/(NENC))\Delta \geq \max(1, K(1-\mu)/(N_\text{EN} L_\text{EN}) + K(1-\mu)/(N_\text{EN} C)) via a cut-set argument.

ex-cc-ch08-12

Hard

Achievability gap. Identify parameter regimes where the achievable upper bound exceeds the cut-set lower bound (i.e., where caching gain tt is strict).

ex-cc-ch08-13

Challenge

Mixed-traffic NDT. Extend the NDT formula to mixed cacheable and uncacheable traffic. State the analogous JLEC-style separation result.

ex-cc-ch08-14

Challenge

Privacy-constrained NDT. When user demands must be kept private from the ENs (leakage-free delivery), does the NDT framework still apply? Sketch the modifications.

ex-cc-ch08-15

Challenge

Heterogeneous ENs. In a real deployment, different ENs may have different cache sizes and fronthaul capacities. State the NDT generalization to non-symmetric deployments.