Exercises
ex-ch27-01
EasyFor the MAN scheme with files, users, and , compute: (a) the coded caching parameter , (b) the number of sub-files per file, (c) the delivery load, and (d) the coded multicasting gain.
.
Sub-files per file: .
Parameters
(a) . (b) Sub-files per file: . Each file is split into 3 equal parts. (c) Delivery load: file. (d) Coded multicasting gain: . Each transmission serves 2 users.
ex-ch27-02
EasyVerify the MAN scheme for , (). Explicitly list: (a) the sub-file assignment to each cache, (b) the coded delivery messages for the worst-case demand .
Each file is split into sub-files indexed by single users.
The delivery consists of XOR messages.
Placement
Files: , similarly for and .
- User 1 caches: (sub-files containing user 1 in the index).
- User 2 caches: .
- User 3 caches: . Cache size: . Correct.
Delivery for demand $(1,2,3)$
For : send . User 1 has , recovers . User 2 has , recovers .
For : send . User 1 recovers , User 3 recovers .
For : send . User 2 recovers , User 3 recovers .
Total: 3 messages of size each. Load: file.
ex-ch27-03
EasyCompare the delivery load of coded and uncoded caching for , , and .
Uncoded load: .
Coded load: .
Computation
| Gain | ||||
|---|---|---|---|---|
| 0 | 0 | 10.0 | 10.0 | 1.0 |
| 2 | 1 | 9.0 | 4.5 | 2.0 |
| 4 | 2 | 8.0 | 2.67 | 3.0 |
| 6 | 3 | 7.0 | 1.75 | 4.0 |
| 8 | 4 | 6.0 | 1.20 | 5.0 |
| 10 | 5 | 5.0 | 0.83 | 6.0 |
| 20 | 10 | 0.0 | 0.0 | -- |
The coded multicasting gain is exactly . At (half the library), the coded scheme serves the entire demand with less than 1 file of transmission.
ex-ch27-04
EasyShow that the MAN placement is valid: verify that user 's cache size equals when each file is split into sub-files and user caches all sub-files indexed by sets containing .
User caches sub-files.
Each sub-file has size .
Counting cached sub-files
For each file (N total), user caches sub-files where and . The number of such is (choose the remaining members from users).
Total cache size
Total cached bits: . Correct.
ex-ch27-05
EasyFor the MAN scheme, what is the subpacketization (number of sub-files per file) for and ? Comment on the practical feasibility for 1 GB video files.
Subpacketization: .
Computation
: sub-files. For 1 GB: each sub-file is MB. Feasible.
: sub-files. Each sub-file is KB. Feasible but the overhead of managing 15,504 sub-files per file is non-trivial.
: . Each sub-file would be 0.1 bytes β less than one byte! Completely impractical.
ex-ch27-06
MediumProve that the MAN delivery load is a convex function of for integer , and that the lower convex envelope (via memory sharing) gives the piecewise-linear curve connecting the integer- points.
Show is convex in by verifying .
Memory sharing between achieves any point on the line segment between and .
Convexity check
. We need : .
Cross-multiplying and simplifying (with ): . This simplifies to , which holds with equality only when the function is affine (it is not). The strict inequality confirms convexity.
Memory sharing
For non-integer , split each file into fraction processed with parameter and fraction with , where . This gives . The resulting load traces the line segment between adjacent integer- points on the convex curve.
ex-ch27-07
MediumFor the MISO coded caching system with antennas, users, files, and ():
(a) Compute the NDT. (b) How many time slots are needed for delivery? (c) How many zero-forcing beamforming vectors are needed per slot?
Total DoF: . NDT .
Total multicast messages: .
NDT computation
. . NDT .
Time slots
Total multicast messages: . Each slot serves messages (one per beamforming direction). Time slots: . Each message has size . Total delivery: . NDT: ... Let me recalculate.
Actually, NDT . With the file-size correction: . NDT ... But using the formula directly: NDT . The discrepancy arises from the DoF definition. Using the correct formula: NDT .
Beamforming vectors
Per slot: beamforming vectors, each carrying one multicast message to a group of users. Each vector is in and lies in the null space of the channels of users outside its target group.
ex-ch27-08
MediumShow that the index coding problem induced by the MAN placement with demand (all distinct, ) has a side-information graph that is a union of complete bipartite graphs.
User wants for all , and has for all and .
The side-information structure is symmetric: user has the sub-file that user wants, for the same index set , iff and .
Side-information graph
In the index coding formulation, each demanded sub-file (user wants this, with ) is a "message." User has side information for all and .
Bipartite structure
For a fixed with , the sub-files form a "clique" in the index coding sense: each is wanted by one user in and available as side information to all other users in . This is precisely the structure that allows the XOR to simultaneously serve all users in .
Optimality of clique cover
The MAN delivery is a clique cover of the index coding side-information graph. The cliques partition all demanded sub-files, and each clique is served by one XOR. This clique cover is optimal for the MAN placement (matching the converse for uncoded placement).
ex-ch27-09
MediumDerive the memory-load tradeoff for the decentralized coded caching scheme (Maddah-Ali and Niesen, 2015), where each user independently caches each bit of each file with probability .
Show that the expected delivery load is approximately: and compare with the centralized MAN scheme.
With random independent caching, the number of users caching a given bit is Binomial.
A bit is useful for user iff user did not cache it. The server must deliver all such bits.
Random placement
Each user independently includes each bit of each file in its cache with probability . The expected number of bits user caches from file is , and . Correct in expectation.
Delivery analysis
For a bit of file not cached by user (probability ), the set of users who do cache this bit has size . A coded multicast serves all users who need the bit and whose caches differ. The average group size is .
Expected load
after careful accounting, which simplifies to approximately for large . The decentralized scheme loses a constant factor compared to centralized MAN (approximately for large ), but has the advantage of requiring no coordination during placement.
ex-ch27-10
MediumFor a Fog-RAN system with edge nodes, users, files, edge cache , and user cache , compute the NDT assuming sufficient fronthaul.
.
The edge cache reduces the effective library: files at the edge need not be delivered.
Parameters
. Effective file fraction not at edge: . Effective file fraction not at user: .
NDT computation
NDT .
Without edge caching: NDT . Without user caching: NDT . Without any caching: NDT .
The two caching layers provide complementary gains.
ex-ch27-11
MediumShow that for and (each user caches file), the MAN scheme requires each file to be split into only sub-files, and the delivery consists of pairwise XORs. Verify that the total delivery load is .
With : sub-files per file.
Delivery: messages, each of size .
Subpacketization
sub-files per file. File is split into , each of size .
Delivery
For each pair ( pairs), send . User has (cached) and recovers . User has (cached) and recovers .
Load verification
. Check: . Matches.
ex-ch27-12
MediumIn a D2D coded caching network with users, files, and files per cache, compute: (a) The per-user throughput scaling. (b) Compare with uncoded D2D caching. (c) If users are clustered into groups of , what is the effective multicasting gain per cluster?
Per-user throughput: .
Uncoded D2D: (no coding gain).
Coded D2D throughput
. Per-user throughput: files per slot. Independent of .
Uncoded D2D comparison
Without coding, each D2D transmission serves one user. With spatial reuse, throughput is total, so per user. But with uncoded caching, the hit ratio is , so per cluster, which is worse.
Clustered coded caching
With users per cluster: . Coded multicasting gain: . Per-user throughput within cluster: (same scaling, but with a smaller constant than the global scheme). Subpacketization: (very manageable).
ex-ch27-13
HardProve the index coding lower bound for the MAN placement: for demand (all distinct, ) and uncoded placement with :
Show this equals for the MAN symmetric placement.
This is the acyclic subgraph bound from index coding.
Use the chain rule of entropy and the fact that is independent of .
Chain rule bound
The delivery message of size must enable every user to decode. For any ordering of users: (all files decodable).
By the chain rule: .
But (user decodes from and , plus the "genie" information ). So we need the reverse direction.
Lower bound
.
Evaluation for MAN placement
With MAN symmetric placement, the fraction of not cached by user and not determined by decreases with . After averaging over all orderings: .
ex-ch27-14
HardFor the MISO coded caching system, prove that the zero-forcing beamforming is feasible: show that for each batch of multicast groups (each of size ), the beamforming vectors can be designed such that each multicast message is received interference-free by its target users.
User decodes message after canceling cached terms.
The interference from other multicast messages must be zero-forced.
With antennas and beamforming vectors, the system is fully loaded.
Interference structure
Message (for group ) is wanted by all users in . User experiences interference from messages . However, user can use its cache to cancel some interference terms within each multicast message.
Effective interference
After cache-based cancellation, user needs to decode one sub-file from message while suppressing interfering messages. With transmit antennas and interference constraints, there is exactly 1 degree of freedom for the desired signal β sufficient for ZF.
ZF feasibility
The beamforming vector must satisfy: for all and (after cache cancellation reduces the effective number of interferers). With antennas and ZF constraints per user, the system has a 1-dimensional solution space (generically), proving feasibility.
ex-ch27-15
HardDerive the throughput scaling of D2D coded caching more carefully. For users uniformly distributed in a unit square with D2D range :
(a) Show that ensures connectivity (each user has neighbors).
(b) Show that non-interfering transmissions can be scheduled simultaneously.
(c) Combine with the coded multicasting gain to derive .
Use the random geometric graph model.
For (b): spatial TDMA with colors (each color activates non-interfering links).
Connectivity
With users in a unit square, the average inter-user distance is . Setting for a sufficiently large constant ensures that the expected number of neighbors is . By standard random geometric graph results, this guarantees connectivity w.h.p.
Spatial reuse
Divide the unit square into cells of side . There are cells. Within each cell, users communicate. Cells separated by can transmit simultaneously without interference (interference decays with distance). Using a constant number of colors (spatial TDMA with reuse factor ): simultaneous transmissions.
Throughput derivation
Within each cell of users, coded caching with gives delivery load per cell. Each cell takes time slots. With cells operating in parallel: total time . Per-user throughput: file / slots .
ex-ch27-16
HardExtend the MAN scheme to heterogeneous cache sizes: user has cache size (not all equal). Show that the delivery load with uncoded placement is:
where is user 's cache fraction.
Generalize the MAN placement: each bit of each file is cached by user independently with probability .
The delivery follows the decentralized caching framework.
Heterogeneous placement
User caches each bit of each file independently with probability . The expected cache size is . Correct.
Delivery
A bit not cached by user (prob ) but cached by all users in (prob ) can be served via a multicast to the group . The delivery load is: .
Simplification
For the symmetric case for all : which matches the decentralized MAN result.
ex-ch27-17
HardShow that the factor-of-2 gap between the general converse and the MAN achievability can be closed to a factor of for the special case with arbitrary coded placement. That is, prove for and any placement strategy.
With , the problem reduces to two-user index coding with side information.
Use the cut-set bound: .
Cut-set bounds for $K = 2$
For the worst-case demand (distinct files): (user 1's missing info). (user 2's missing info). .
Tighter bound
The joint bound: . The second term is . But (user 2's cache has at most bits about ). Therefore . After careful accounting: , matching the MAN achievability.
ex-ch27-18
ChallengeResearch-level. The MAN scheme has subpacketization which is exponential in . Design a coded caching scheme based on combinatorial designs (Steiner systems or resolvable designs) that achieves subpacketization polynomial in while losing at most a constant factor in the coded multicasting gain.
Use a placement delivery array (PDA) as the framework.
The columns correspond to users, rows to sub-files, and the entries determine cache content.
Constant-factor loss in gain is acceptable for exponential reduction in subpacketization.
PDA framework
A -PDA is an array with entries from such that: (1) each column has exactly stars (cached sub-files), (2) each integer appears at most once per row, and (3) if entry and entry for , then entries and are both stars (enabling XOR decoding).
Construction from Steiner systems
Use a Steiner system (a collection of -element blocks covering every pair of users exactly once). The blocks define the multicast groups. This gives subpacketization (polynomial in ) and coded multicasting gain (constant, independent of ).
Tradeoff
The gain is instead of (which can be much larger). The subpacketization is instead of . This is the fundamental subpacketization-gain tradeoff: polynomial subpacketization at the cost of bounded (constant) multicasting gain.
ex-ch27-19
ChallengeOpen problem flavor. Consider coded caching with a heterogeneous file library where file has popularity following a Zipf distribution: for parameter .
(a) Propose a popularity-aware coded caching scheme that groups files by popularity and applies the MAN scheme within each group.
(b) Derive the expected delivery load (averaged over random demands drawn from the Zipf distribution).
(c) Show that for (heavy tail), the expected load decreases as , which can be much better than the worst-case MAN load.
Partition files into 'popular' () and 'unpopular' ().
Use coded caching for popular files and uncoded caching for unpopular files.
The optimal partition depends on and .
Two-group scheme
Allocate cache fraction to the top files (coded caching) and to the remaining files (uncoded caching). Within each group, use the MAN scheme with the appropriate parameters.
Expected load
The probability of requesting a popular file is . Expected load = (prob. all demands popular)
- (otherwise) . Optimize over and .
Zipf scaling
For : most of the probability mass is on the first few files. With popular files and : the demand is almost surely for a popular file, and the MAN gain applies fully. The expected load decreases as the probability of unpopular demands vanishes.
ex-ch27-20
ChallengeImplementation project. Simulate a coded caching system with files, users, and cache sizes .
(a) Implement the MAN placement and delivery for integer-valued .
(b) For each , generate 1000 random demand vectors and compute the average delivery load.
(c) Compare the average load with the worst-case load .
(d) Overlay the uncoded caching baseline and the converse bounds.
The average-case load can be significantly lower than worst-case when (demand collisions reduce load).
Use Python with NumPy for the simulation.
Implementation
- For each : compute , subpacketization .
- Generate the placement matrix: entry iff .
- For each demand vector : compute the set of required XOR messages and sum their sizes.
Expected results
With : many demand vectors have repeated requests (demand collisions). When two users request the same file, fewer coded messages are needed. The average load is strictly less than the worst-case load.
At (): worst-case . Average: approximately - (depending on ratio).