Exercises

ex-ch02-01

Easy

A coded distributed-computing scheme uses N=25N = 25 workers with storage load μ=0.4\mu = 0.4. Compute the communication load Δ(μ)\Delta^*(\mu) and the gain factor over the uncoded baseline.

ex-ch02-02

Easy

State the four-step recipe for a cut-set converse, and identify which step introduces the storage constraint.

ex-ch02-03

Easy

Show that at μ=1\mu = 1 (full replication) the optimal communication load is Δ(1)=0\Delta^*(1) = 0, and interpret the result.

ex-ch02-04

Easy

Suppose a scheme claims to achieve Δ=0.1\Delta = 0.1 at storage μ=0.2\mu = 0.2 on N=20N = 20 workers. Can this be correct?

ex-ch02-05

Medium

Derive the formula Δ(μ)=(1μ)/(Nμ)\Delta^*(\mu) = (1-\mu)/(N\mu) by counting broadcasts in the coded-shuffling construction of §2.3. Assume μN\mu N is an integer.

ex-ch02-06

Medium

Compute the memory-shared communication load at μ=0.3\mu = 0.3 for N=10N = 10 workers. (The discrete optimal curve is defined only at μ{0.1,0.2,,1.0}\mu \in \{0.1, 0.2, \ldots, 1.0\}.)

ex-ch02-07

Medium

Prove that the tradeoff curve Δ(μ)=(1μ)/(Nμ)\Delta^*(\mu) = (1-\mu)/(N\mu) is strictly convex in μ\mu on (0,1](0, 1].

ex-ch02-08

Medium

Explain precisely how the storage mapping φk\varphi_k in the network model of §2.1 is chosen before the inputs are revealed, and why this matters for the information-theoretic analysis.

ex-ch02-09

Medium

Consider a non-symmetric setting where workers have different storage budgets μ1,,μN\mu_1, \ldots, \mu_N. Guess a generalization of the tradeoff formula and discuss whether the cut-set argument still applies.

ex-ch02-10

Medium

Use the cut-set recipe to give a cut-set lower bound on the communication in a federated-learning round where the server aggregates nn users' gradients gkRd\mathbf{g}_k \in \mathbb{R}^d.

ex-ch02-11

Hard

Extend the (μ,Δ,K)(\mu, \Delta, K) framework by adding a privacy parameter TT: the protocol must leak no information about any single worker's share to any set of T\leq T colluding workers. Conjecture how the tradeoff curve changes and compare with the statement of the secure-aggregation theorem in Chapter 10.

ex-ch02-12

Hard

Give an example where the cut-set bound is not tight and argue briefly why. Consider a scenario from the coded-caching literature or from distributed storage.

ex-ch02-13

Hard

Suppose the (μ,Δ)(\mu, \Delta) tradeoff is achieved by a scheme with an (N,K)(N, K)-Reed–Solomon-like encoding. What is the decoder's computational complexity? Discuss the engineering implication.

ex-ch02-14

Hard

Prove or disprove: on a wireless multiple-access channel with additive white Gaussian noise, the achievable (μ,Δ)(\mu, \Delta) region strictly exceeds the bit-pipe region of Section 2.3 in the high-SNR regime.

ex-ch02-15

Challenge

Develop a joint (μ,Δ,T,B)(\mu, \Delta, T, B) framework that incorporates (i) computation load μ\mu, (ii) communication load Δ\Delta, (iii) privacy parameter TT (colluding users), (iv) Byzantine tolerance BB (malicious workers). Conjecture the lower-order behaviour of each axis's contribution.