Improved Lower Bounds for Coded Caching Aditya Ramamoorthy Iowa - - PowerPoint PPT Presentation

improved lower bounds for coded caching
SMART_READER_LITE
LIVE PREVIEW

Improved Lower Bounds for Coded Caching Aditya Ramamoorthy Iowa - - PowerPoint PPT Presentation

Improved Lower Bounds for Coded Caching Aditya Ramamoorthy Iowa State University Joint work with Hooshang Ghasemi DIMACS Workshop on Network Coding: the Next 15 Years December 17, 2015 Aditya Ramamoorthy Improved Lower Bounds for Coded


slide-1
SLIDE 1

Improved Lower Bounds for Coded Caching

Aditya Ramamoorthy

Iowa State University Joint work with Hooshang Ghasemi DIMACS Workshop on Network Coding: the Next 15 Years

December 17, 2015

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 1 / 35

slide-2
SLIDE 2

Conventional Content Delivery with Caching

Server

Shared link . . .

User 1 User 2 User K-1 User K Cache 1 Cache 2 Cache K-1 Cache K

Mechanism for reducing transmission rates from server to clients.

◮ Conventional approach: clients cache portions of popular content.

Coding in the cache and coded transmission from server are typically not considered.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 2 / 35

slide-3
SLIDE 3

Coded Caching Formulation [Maddah-Ali & Niesen ’13]

Server contains N files each of size F bits. K users each with a cache of size MF bits. The i-th user requests file di ∈ {1, . . . , N}.

W1 . . . WN

Shared link . . .

User 1 User 2 User K-1 User K Cache 1 Cache 2 Cache K-1 Cache K

M

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 3 / 35

slide-4
SLIDE 4

Coded Caching Formulation [Maddah-Ali & Niesen ’13]

1

Placement phase: The

content of the caches are populated, does not depend

  • n users actual requests.

2

Delivery phase: the server transmits a signal of rate RF bits over the shared link so that each user’s request is satisfied.

W1 . . . WN

Shared link . . .

User 1 User 2 User K-1 User K Cache 1 Cache 2 Cache K-1 Cache K Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 4 / 35

slide-5
SLIDE 5

Coded Caching Formulation [Maddah-Ali & Niesen ’13]

N files {Wn}N

n=1,

i-th user requests the file Wdi, Cache content: Zi, Delivery phase signal: Xd1,d2,...,dK , Decoding file for i-th user: ˆ Wd1,...,dK ;i, Probability of error:

maxd1,...,dK maxi P( ˆ Wd1,...,dK ;i = Wdi ). W1 . . . WN

Xd1,...,dK . . .

User 1 User 2 User K-1 User K Z1 Z2 ZK−1 ZK

M

Achievable Pair (M, R):

The pair is said to be achievable if for any ǫ > 0 there exist a file size F large enough and a (M, R) caching scheme with probability of at most ǫ.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 5 / 35

slide-6
SLIDE 6

Coded Caching Formulation [Maddah-Ali & Niesen ’13]

N files {Wn}N

n=1,

i-th user requests the file Wdi, Cache content: Zi, Delivery phase signal: Xd1,d2,...,dK , Decoding file for i-th user: ˆ Wd1,...,dK ;i, Probability of error:

maxd1,...,dK maxi P( ˆ Wd1,...,dK ;i = Wdi ). W1 . . . WN

Xd1,...,dK . . .

User 1 User 2 User K-1 User K Z1 Z2 ZK−1 ZK

M

Memory-rate tradeoff

R⋆(M) = inf{R : (M, R) is achievable}.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 5 / 35

slide-7
SLIDE 7

Achievable rates N = 1000, K = 100

10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90 100

Cache Size(M) Rate(R)

Coded Caching Rate Conventional Caching Rate

RC(M) = K

  • 1 − M

N

  • · min
  • 1

1 + KM/N , N K

  • ,

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 6 / 35

slide-8
SLIDE 8

Achievable rates N = 1000, K = 100

10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90 100

Cache Size(M) Rate(R)

Coded Caching Rate Conventional Caching Rate

RC(M) = K

  • 1 − M

N

  • · min
  • 1

1 + KM/N , N K

  • ,

However, tight lower bounds on RC(M) are not known at this point.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 6 / 35

slide-9
SLIDE 9

Related Work

Cutset bound [Maddah-Ali & Niesen ’13]. Show that RC(M)/Rstar(M) ≤ 12 (multiplicative gap). Parallel works

◮ Improved bounds using Han’s inequality [Sengupta, Tandon, Clancy

’15]. Show a multiplicative gap of 8.

◮ Another approach (can be considered a special case of our work)

by [Ajaykrishnan et al. 15].

◮ Computational approach of [Tian ’15] (Arxiv preprint) for the specific

case of N = K = 3.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 7 / 35

slide-10
SLIDE 10

An Example: N = K = 3 and M = 1.

2R⋆F + 2MF ≥ H(Z1) + H(X1,2,3) + H(Z2) + H(X3,1,2) ≥ H(Z1, X1,2,3) + H(Z2, X3,1,2) ≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1) I(W1; Z1, X1,2,3) = H(W1) − H(W1|Z1, X1,2,3) ≥ F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 8 / 35

slide-11
SLIDE 11

An Example: N = K = 3 and M = 1.

2R⋆F + 2MF ≥ H(Z1) + H(X1,2,3) + H(Z2) + H(X3,1,2) ≥ H(Z1, X1,2,3) + H(Z2, X3,1,2) ≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1) I(W1; Z1, X1,2,3) = H(W1) − H(W1|Z1, X1,2,3) ≥ F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 8 / 35

slide-12
SLIDE 12

An Example: N = K = 3 and M = 1.

2R⋆F + 2MF ≥ H(Z1) + H(X1,2,3) + H(Z2) + H(X3,1,2) ≥ H(Z1, X1,2,3) + H(Z2, X3,1,2) ≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1) I(W1; Z1, X1,2,3) = H(W1) − H(W1|Z1, X1,2,3) ≥ F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 8 / 35

slide-13
SLIDE 13

An Example: N = K = 3 and M = 1.

2R⋆F + 2MF ≥ H(Z1) + H(X1,2,3) + H(Z2) + H(X3,1,2) ≥ H(Z1, X1,2,3) + H(Z2, X3,1,2) ≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1) I(W1; Z1, X1,2,3) = H(W1) − H(W1|Z1, X1,2,3) ≥ F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 8 / 35

slide-14
SLIDE 14

An Example: N = K = 3 and M = 1.

2R⋆F + 2MF ≥ H(Z1) + H(X1,2,3) + H(Z2) + H(X3,1,2) ≥ H(Z1, X1,2,3) + H(Z2, X3,1,2) ≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1) Writing mutual information another way ... I(W1; Z1, X1,2,3) = H(W1) − H(W1|Z1, X1,2,3) ≥ F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 8 / 35

slide-15
SLIDE 15

An Example: N = K = 3 and M = 1.

2R⋆F + 2MF ≥ H(Z1) + H(X1,2,3) + H(Z2) + H(X3,1,2) ≥ H(Z1, X1,2,3) + H(Z2, X3,1,2) ≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1) Writing mutual information another way ... I(W1; Z1, X1,2,3) = H(W1) − H(W1|Z1, X1,2,3) ≥ F(1 − ǫ) Since W1 can be recovered from Z1 and X1,2,3 with ǫ-error.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 8 / 35

slide-16
SLIDE 16

An Example: N = K = 3 and M = 1.

≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1), = 2F(1 − ǫ) + H(Z1, X1,2,3|W1) + H(Z2, X3,1,2|W1) ≥ 2F(1 − ǫ) + H(Z1, Z2, X1,2,3, X3,1,2|W1) = 2F(1 − ǫ) + I(W2, W3; Z1, Z2, X1,2,3, X3,1,2|W1) + H(Z1, Z2, X1,2,3, X3,1,2|W1, W2, W3) ≥ 2F(1 − ǫ) + 2F(1 − ǫ) = 4F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 9 / 35

slide-17
SLIDE 17

An Example: N = K = 3 and M = 1.

≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1), = 2F(1 − ǫ) + H(Z1, X1,2,3|W1) + H(Z2, X3,1,2|W1) ≥ 2F(1 − ǫ) + H(Z1, Z2, X1,2,3, X3,1,2|W1) = 2F(1 − ǫ) + I(W2, W3; Z1, Z2, X1,2,3, X3,1,2|W1) + H(Z1, Z2, X1,2,3, X3,1,2|W1, W2, W3) ≥ 2F(1 − ǫ) + 2F(1 − ǫ) = 4F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 9 / 35

slide-18
SLIDE 18

An Example: N = K = 3 and M = 1.

≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1), = 2F(1 − ǫ) + H(Z1, X1,2,3|W1) + H(Z2, X3,1,2|W1) ≥ 2F(1 − ǫ) + H(Z1, Z2, X1,2,3, X3,1,2|W1) = 2F(1 − ǫ) + I(W2, W3; Z1, Z2, X1,2,3, X3,1,2|W1) + H(Z1, Z2, X1,2,3, X3,1,2|W1, W2, W3) ≥ 2F(1 − ǫ) + 2F(1 − ǫ) = 4F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 9 / 35

slide-19
SLIDE 19

An Example: N = K = 3 and M = 1.

≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1), = 2F(1 − ǫ) + H(Z1, X1,2,3|W1) + H(Z2, X3,1,2|W1) ≥ 2F(1 − ǫ) + H(Z1, Z2, X1,2,3, X3,1,2|W1) = 2F(1 − ǫ) + I(W2, W3; Z1, Z2, X1,2,3, X3,1,2|W1) + H(Z1, Z2, X1,2,3, X3,1,2|W1, W2, W3) ≥ 2F(1 − ǫ) + 2F(1 − ǫ) = 4F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 9 / 35

slide-20
SLIDE 20

An Example: N = K = 3 and M = 1.

≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1), = 2F(1 − ǫ) + H(Z1, X1,2,3|W1) + H(Z2, X3,1,2|W1) ≥ 2F(1 − ǫ) + H(Z1, Z2, X1,2,3, X3,1,2|W1) = 2F(1 − ǫ) + I(W2, W3; Z1, Z2, X1,2,3, X3,1,2|W1) + H(Z1, Z2, X1,2,3, X3,1,2|W1, W2, W3) ≥ 2F(1 − ǫ) + 2F(1 − ǫ) = 4F(1 − ǫ)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 9 / 35

slide-21
SLIDE 21

An Example: N = K = 3 and M = 1.

≥ I(W1; Z1, X1,2,3) + H(Z1, X1,2,3|W1) + I(W1; Z2, X3,1,2) + H(Z2, X3,1,2|W1), = 2F(1 − ǫ) + H(Z1, X1,2,3|W1) + H(Z2, X3,1,2|W1) ≥ 2F(1 − ǫ) + H(Z1, Z2, X1,2,3, X3,1,2|W1) = 2F(1 − ǫ) + I(W2, W3; Z1, Z2, X1,2,3, X3,1,2|W1) + H(Z1, Z2, X1,2,3, X3,1,2|W1, W2, W3) ≥ 2F(1 − ǫ) + 2F(1 − ǫ) = 4F(1 − ǫ) Final Result 2R⋆ + 2M ≥ 4 = ⇒ R⋆ ≥ 1. (Known to be achievable). Non-cutset based bound. Generalizes a strategy that appeared in

[Maddah-Ali & Niesen ’13]

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 9 / 35

slide-22
SLIDE 22

Equivalent description on directed tree

v1

{Z1}

v2

{X1,2,3}

v3

{Z2}

v4

{X3,1,2} Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 10 / 35

slide-23
SLIDE 23

Equivalent description on directed tree

v1

{Z1}

v2

{X1,2,3}

v3

{Z2}

v4

{X3,1,2}

u1

{Z1, X1,2,3}

u2

{Z2, X3,1,2} Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 10 / 35

slide-24
SLIDE 24

Equivalent description on directed tree

v1

{Z1}

v2

{X1,2,3}

v3

{Z2}

v4

{X3,1,2}

u1

{Z1, X1,2,3}

u2

{Z2, X3,1,2}

u∗

{Z1, Z2, X1,2,3, X3,1,2, W1} W1 W1

The pairs Z1, X1,2,3 and Z2, X3,1,2 each recover a new source W1.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 10 / 35

slide-25
SLIDE 25

Equivalent description on directed tree

v1

{Z1}

v2

{X1,2,3}

v3

{Z2}

v4

{X3,1,2}

u1

{Z1, X1,2,3}

u2

{Z2, X3,1,2}

u∗

{Z1, Z2, X1,2,3, X3,1,2, W1} W1 W1

v∗

{Z1, Z2, X1,2,3, X3,1,2, W1, W2, W3} {W2, W3}

The set of cache and delivery phase signals {Z1, Z2, X1,2,3, X3,1,2} recovers the sources W1, W2, W3. W1 has already been recovered earlier. The new sources are thus W2, W3.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 10 / 35

slide-26
SLIDE 26

Problem Instance:P(T , α, β, L, N, K)

Problem Input.

◮ Number of files N and users K. ◮ Tree T with α leaves labeled with delivery phase signals and β

leaves labeled with cache signals.

Algorithm returns lower bound αR + βM ≥ L.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 11 / 35

slide-27
SLIDE 27

Natural question

For a given N, K and α and β.

◮ Determine the optimal tree T ⋆ and its labeling so that the lower

bound L is maximized.

◮ Refer to this as the optimal problem instance.

Solution to this would yield the best possible lower bound using *this* technique.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 12 / 35

slide-28
SLIDE 28

Sketch of ideas

Observation

For problem instance P(T , α, β, L, N, K), the lower bound L ≤ α min(β, K). For N large enough, we can always find an instance where L = α min(β, K).

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 13 / 35

slide-29
SLIDE 29

Sketch of ideas

Observation

For problem instance P(T , α, β, L, N, K), the lower bound L ≤ α min(β, K). For N large enough, we can always find an instance where L = α min(β, K).

Example

Let α = 2, β = 3 and N = αβ = 6 and K = 3. Choose cache signals: Z1, Z2, and Z3. Choose delivery phase signals, such that each cache recovers a different file: X1,2,3 and X4,5,6.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 13 / 35

slide-30
SLIDE 30

Sketch of ideas

Example

Let α = 2, β = 3 and N = αβ = 6 and K = 3. Choose cache signals: Z1, Z2, and Z3. Choose delivery phase signals, such that each cache recovers a different file: X1,2,3 and X4,5,6. 2RF + 3MF ≥ H(X1,2,3) + H(X4,5,6) + H(Z1) + H(Z2) + H(Z3) ≥ H(Z1, Z2, Z3, X1,2,3, X4,5,6) = H(W1, W2, . . . , W6) = 6F.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 14 / 35

slide-31
SLIDE 31

Sketch of ideas

Example

Let α = 2, β = 3 and N = αβ = 6 and K = 3. Choose cache signals: Z1, Z2, and Z3. Choose delivery phase signals, such that each cache recovers a different file: X1,2,3 and X4,5,6. 2RF + 3MF ≥ H(X1,2,3) + H(X4,5,6) + H(Z1) + H(Z2) + H(Z3) ≥ H(Z1, Z2, Z3, X1,2,3, X4,5,6) = H(W1, W2, . . . , W6) = 6F.

Observation

We don’t really need six files to get a lower bound of 6F.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 14 / 35

slide-32
SLIDE 32

Formal definition of saturation number

Definition

Saturation number. Consider an instance P∗(T ∗, α, β, L∗, N∗, K), where L∗ = α min(β, K), such that for all problem instances of the form P(T , α, β, L∗, N, K), we have N∗ ≤ N. We call N∗ the saturation number of instances with parameters (α, β, K) and denote it by Nsat(α, β, K). Saturated instances use the files most efficiently in obtaining the lower bound. If N = αβ, it is easy to demonstrate an instance where L = αβ (precisely, the idea of the cutset bound!).

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 15 / 35

slide-33
SLIDE 33

Intuition about saturation number

Suppose that α = β = 2, N = 2, K = 3.

v1

{Z1}

v2

{X1,?,?}

v3

{Z2}

v4

{X?,1,?}

u1

{Z1, X1,?,?}

u2

{Z2, X?,1,?}

u∗

{Z1, Z2, X1,?,?, X?,1,?, W1} W1 W1

v∗

W2

Regardless of the value of ?’s in the delivery phase signals, the lower bound can be at most 3. Cannot reach αβ = 4 under any possible labeling.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 16 / 35

slide-34
SLIDE 34

Intuition about saturation number

Suppose that α = β = 2, N = 3, K = 3. v1

{Z1}

v2

{X1,2,3}

v3

{Z2}

v4

{X3,1,2}

u1

{Z1, X1,2,3}

u2

{Z2, X3,1,2}

u∗

{Z1, Z2, X1,2,3, X3,1,2, W1} W1 W1

v∗

{Z1, Z2, X1,2,3, X3,1,2, W1, W2, W3} {W2, W3}

With N = 3, we can obtain an instance where L = αβ = 4.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 17 / 35

slide-35
SLIDE 35

Key Lemma

Lemma

Let P = P(T , α, β, L, K, N) be an instance where L < α min(β, K). Then, we can construct a new instance P′ = P(T ′, α, β, L′, K, N + 1), where L′ = L + 1. Simple argument that changes the label of one delivery phase signal to exploit the new file.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 18 / 35

slide-36
SLIDE 36

Example: X2,1,2 is inefficient

Suppose that α = β = 2, N = 2, K = 3.

v1

{Z1}

v2

{X1,2,2}

v3

{Z2}

v4

{X2,1,2}

u1

{Z1, X1,2,2}

u2

{Z2, X2,1,2}

u∗

{Z1, Z2, X1,2,2, X2,1,2, W1} W1 W1

v∗

W2

Identified the inefficiency of X2,1,2.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 19 / 35

slide-37
SLIDE 37

Example: Fixing the inefficiency of X2,1,2

Suppose that α = β = 2, N = 3, K = 3.

v1

{Z1}

v2

{X1,2,3}

v3

{Z2}

v4

{X3,1,2}

u1

{Z1, X1,2,3}

u2

{Z2, X3,1,2}

u∗

{Z1, Z2, X1,2,3, X3,1,2, W1} W1 W1

v∗

{W2, W3}

Changed X2,1,2 to X3,1,2. Can be done systematically in general.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 20 / 35

slide-38
SLIDE 38

Main theorem

Theorem

Suppose that there exists an optimal and atomic problem instance Po(T = (V, A), α, β, Lo, N, K). Then, there exists optimal and atomic problem instance P∗(T ∗ = (V ∗, A∗), α, β, L∗, N, K) where L∗ = Lo with the following properties. Let us denote the last edge in P∗ with (u∗, v∗). Let P∗

l = P(T ∗ u∗(l), αl, βl, L∗ l , Nl, K) and P∗ r = P(T ∗ u∗(r), αr, βr, L∗ r , Nr, K).

Then, we have L∗

l

= αl min(βl, K), L∗

r

= αr min(βr, K), and L∗ = min (α min(β, K), L∗

l + L∗ r + N − N0) ,

where N0 = max(Nsat(αl, βl, K), Nsat(αr, βr, K)). Furthermore, at least

  • ne of βl or βr is strictly smaller than K.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 21 / 35

slide-39
SLIDE 39

Implication: Optimal problem instances

Saturatedl Saturated r

N – max (Nsat(l), Nsat(r))

Upper bounds on Nsat allow us to obtain valid lower bounds as well.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 22 / 35

slide-40
SLIDE 40

Discussion

Cutset bound ⌊N/s⌋

α

R⋆ + s

  • β

M ≥ s⌊N/s⌋ s = 1, . . . , min(N, K) Special case of our bound. Simply choose Z1, . . . , Zs as cache nodes, and ⌊N/s⌋ delivery phase signals with disjoint file requests.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 23 / 35

slide-41
SLIDE 41

Discussion: Cutset bound on αR + βM

N ≥ αβ.

Example

N = 64, K = 12,M = 16/3 9R⋆ + 7M ≥ 63 = ⇒ R⋆ ≥ 2.852. (best lower bound using cutsets)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 24 / 35

slide-42
SLIDE 42

Discussion: Bound 2αR + 2βM instead

Suppose αβ < N but 4αβ > N. Then, 2αR + 2βM ≥ 2αβ + N − Nsat(α, β, K) = ⇒ αR + βM ≥ αβ + N − Nsat(α, β, K) 2 .

Example

18R⋆ + 14M ≥ 126 + 64 − Nsat(9, 7, 12) ≥ 126 + 21 = ⇒ R⋆ ≥ 4.018. (improvement)

  • Sat. P(,,K)

N – Nsat(,,K)

  • Sat. P(,,K)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 25 / 35

slide-43
SLIDE 43

Optimizing over choices for α and β

Example

N = 64, K = 12,M = 16/3. 12R⋆ + 8M ≥ min(12 × 8, 6 × 4 + 6 × 4 + 64 − Nsat(6, 4, 12)) ≥ min(96, 112 − ˆ Nsat(6, 4, 12)) = min(96, 112 − 17) = 95 = ⇒ R⋆ ≥ 157 36 = 4.361 Rc = 5.5 (achievable rate)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 26 / 35

slide-44
SLIDE 44

Plot for N = 6, K = 3

1 2 3 4 5 6 1 2 3

M R

N = 6, K = 3, Blue: Proposed bound, Dotted Black: Cut-set bound, Dashed Red: Achievable rate Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 27 / 35

slide-45
SLIDE 45

Upper bound on saturation number Nsat(α, β, K)

For given α, β and K, consider “roughly” balanced splits.

𝛾 2

𝛽 2 ,

𝛽 2 , 𝛾 2

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 28 / 35

slide-46
SLIDE 46

Upper bound on saturation number Nsat(α, β, K)

Continue recursively, at all levels, maintaining roughly balanced splits, until leaves are reached.

𝛽1 2 , 𝛾1 2 𝛾1 2 𝛽1 2 , 𝛽2 2 , 𝛾2 2 𝛾2 2 𝛽2 2 , 𝛽1, 𝛾1 𝛽2, 𝛾2 𝛽, 𝛾

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 29 / 35

slide-47
SLIDE 47

Upper bound on saturation number Nsat(α, β, K)

Use N = αβ files to obtain an instance with lower bound L = αβ.

𝛽1 2 , 𝛾1 2 𝛾1 2 𝛽1 2 , 𝛽2 2 , 𝛾2 2 𝛾2 2 𝛽2 2 , 𝛽1, 𝛾1 𝛽2, 𝛾2 𝛽, 𝛾

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 30 / 35

slide-48
SLIDE 48

Upper bound on saturation number Nsat(α, β, K)

Structural properties of saturated instances. Let Γl be the file indices used in the left branch of some node (likewise Γr). Then, either Γl ⊆ Γr or Γr ⊆ Γl. Procedure to (iteratively) modify the instance so that this condition is met at all nodes; number of files is guaranteed to decrease at each step.

Γ𝑚 Γ𝑠

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 31 / 35

slide-49
SLIDE 49

Upper bound on saturation number Nsat(α, β, K)

Using this fact and a little more insight and analysis of saturated instances, we have for β ≤ K

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 32 / 35

slide-50
SLIDE 50

Upper bound on saturation number Nsat(α, β, K)

Using this fact and a little more insight and analysis of saturated instances, we have for β ≤ K Nsat(α, β, K) ≤ 2αβ + α + β 3 < αβ (for large enough values of α and β)

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 32 / 35

slide-51
SLIDE 51

Multiplicative gap results

Nontrivial upper bound on Nsat(α, β, K) when β ≤ K. Nsat(α, β, K) ≤ 2αβ + α + β 3 < αβ (for large enough values of α and β) With some work, this yields a multiplicative gap of at most 4 between our lower bound and the achievability scheme. RC(M) R∗(M) ≤ 4.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 33 / 35

slide-52
SLIDE 52

Comparison with existing results

Both the cutset bound and the result of [Ajaykrishnan et al. ’15] can be considered as specific problem instances in our work. We are strictly better than them.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 34 / 35

slide-53
SLIDE 53

Comparison with existing results

Both the cutset bound and the result of [Ajaykrishnan et al. ’15] can be considered as specific problem instances in our work. We are strictly better than them. Approach of [Sengupta,Tandon, Clancy ’15]. Head to head comparison is hard. However, the following conclusions can be drawn

◮ Our bound is superior for reasonably large α and β

1 α + 1 β ≤ 1 2

◮ For small values of M ≤ 1, their bound is better, especially when

N ≤ K.

◮ We have a better multiplicative gap. Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 34 / 35

slide-54
SLIDE 54

Comparison with existing results

Both the cutset bound and the result of [Ajaykrishnan et al. ’15] can be considered as specific problem instances in our work. We are strictly better than them. Approach of [Sengupta,Tandon, Clancy ’15]. Head to head comparison is hard. However, the following conclusions can be drawn

◮ Our bound is superior for reasonably large α and β

1 α + 1 β ≤ 1 2

◮ For small values of M ≤ 1, their bound is better, especially when

N ≤ K.

◮ We have a better multiplicative gap.

Approach of [Tian ’15] for the case of N = K = 3 has one inequality that is strictly better than us. However, it is unclear whether this approach is practical for arbitrary N and K.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 34 / 35

slide-55
SLIDE 55

Comic Relief: The Next 15 years.

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 35 / 35

slide-56
SLIDE 56

Comic Relief: The Next 15 years.

Albert Einstein: “I never think of the future, it comes soon enough.”

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 35 / 35

slide-57
SLIDE 57

Comic Relief: The Next 15 years.

Albert Einstein: “I never think of the future, it comes soon enough.” Niels Bohr: “Prediction is very difficult, especially about the future.”

Aditya Ramamoorthy Improved Lower Bounds for Coded Caching 35 / 35