Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks †
Abstract
:1. Introduction
1.1. Main Contributions
- (1)
- For the request-robust D2D coded caching problem, we adapt the scheme from [9] for uncoded cache placement and one-shot delivery and call the adapted scheme the adapted Yapar–Wan–Schaefer–Caire (YWSC) scheme.
- (2)
- In order to find better performance, we present a new achievable scheme based on the uncoded cache placement and exploiting common demands [11] and one-shot delivery [9]. The caching strategy is the same as that proposed by Maddah-Ali and Niesen in [3] (Algorithm 1), while the delivery strategy divides the sub-files into three categories, and different delivery signals are designed for each category. We call the new scheme the three-category-based scheme. This scheme was presented in the conference version of this paper [25].
- (3)
- We propose an information-theoretic lower bound under uncoded cache placement based on seeking the converse of a problem called coded caching with inactive users. The problem of coded caching with inactive users was proposed in [26], where users are inactive with a certain probability in the traditional coded caching problem of [3]. Hence, the converse for the problem of coded caching with inactive users can serve as a converse for the request-robust D2D coded caching problem. Note that [26] only considers the optimization of the cache replication parameter and does not provide a converse for the caching and delivery scheme.
- (4)
- We prove that the performance of the adapted YWSC scheme is order optimal within a factor of two under the assumption of uncoded cache placement and within a factor of four in general.
- (5)
- Through numerical evaluation, we show that the three-category-based scheme outperforms the adapted YWSC scheme, as well as other known D2D coded caching schemes [3] applied to the request-robust scenario.
1.2. Notations
2. System Model and Related Background
2.1. System Model
- 1.
- K caching functions
- 2.
- encoding functionsWe assume the signal consists of bits. The signals transmitted by all K users consist of bits, i.e., .
- 3.
- decoding functions
2.2. Preliminaries
2.2.1. Uncoded Symmetric Placement Scheme
Algorithm 1 MAN Uncoded Symmetric Placement Scheme |
|
2.2.2. Problem of Coded Caching with Inactive Users
3. Main Result
4. A Novel Achievable Scheme, i.e., Proof of Theorem 2
4.1. General Scheme
- (a)
- Determining the leading requesters: Each user who does not request arbitrarily selects a subset of requesters, denoted by , that request distinct files. Using the idea of leaders from [11], we name these requesters as the leading requesters of User k.
- (b)
- Splitting the sub-files into three categories: Recall that each sub-file is denoted as and is cached by only users in . If , then this sub-file belongs to the first category, which is the set of sub-files that are only cached by users who do not request any files. If contains some elements from and some elements from , then this sub-file belongs to the second category, which is the set of sub-files that are cached by both requesters and non-requesters. Finally, if , then this sub-file belongs to the third category, which is the set of sub-files that are only cached by users who make file requests.
- (c)
- Transmitting signals for the sub-files in the three categories: we will discuss the delivery scheme for the sub-files in each of the three categories.
- (i)
- For the sub-files in the first category needed by Requester , since these sub-files are not cached in any of the requesters, the users in who cache these sub-files transmit them in an uncoded form. Suppose is requested by User , , any of the t users in can transmit the sub-file in an uncoded form. However, we adopt the file-splitting strategy in [9] and allow each user in to transmit part of the sub-file, i.e., is divided into t pieces, each consisting of numbers of bits. The pieces are denoted as , , and User a transmitsWe notice that may be needed by other requesters, i.e., there may be other requesters that request file also. Hence, we let each user a transmit in sequence for all . Hence, the rate of transmitting total bits for the sub-files in the first category is
- (ii)
- Consider a sub-file in the second category needed by Requester , denoted as , where . Denote the set of elements in that are in as , whose size is denoted as i, and we have , because we know at least User k who is requesting a file is not in . Further denote the set of elements of that are in as , whose size is , and we have . Hence, can be written as . Furthermore, i must satisfy .
- (iii)
- Lastly, we consider the sub-files in the third category. Since all the sub-files needed for delivery are only cached in the requesters, the transmission will happen only among requesters. This is equivalent to the D2D coded caching model considered in [9], and we adopt its achievable scheme with uncoded cache placement and one-shot delivery, which we call the Yapar–Wan–Schaefer–Caire (YWSC) scheme.
Algorithm 2 Three-category-based Scheme |
|
4.2. The Maximum Worst-Case Delivery Rate
4.3. Example
5. Numerical Evaluations
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Adapted Yapar–Wan–Schaefer–Caire Scheme, i.e., Proof of Theorem 1
Appendix A.1. General Scheme
- (a)
- Determining the leading demanders: Recall that each sub-file is denoted as and is cached by only users in . Each sub-file is divided into t equal-length disjoint sub-pieces of bits, which are denoted by . Further, each user i selects an arbitrary subset of users from , denoted by , which request distinct files and are referred to as leading demanders of user i.
- (b)
- Pre-transmitting signals: Then, for all subset of t users, each user i prepares for transmitting:
- (c)
- Removing unwanted codewords: We notice that the codewords that are only useful for the users, who do not request, are unwanted codewords and do not need to be transmitted. Next, we will remove the unwanted codewords.
Algorithm A1 Adapted YWSC Scheme |
|
Appendix A.2. The Maximum Worst-Case Delivery Rate
Appendix A.3. Example
Appendix B. Proof of Theorem 3
Appendix B.1. The Maximum Average Delivery Rate
Appendix B.2. The Maximum Worst-Case Delivery Rate
Appendix C. Optimal Scheme for Problem of Coded Caching with Inactive Users Achieved in Theorem A1
Algorithm A2 Caching and Delivery Scheme with Inactive Users |
|
Appendix D. Order Optimality of the Adapted YWSC Scheme in Appendix Section A.1 i.e., Proof of Theorem 4
References
- Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
- Golrezaei, N.; Molisch, A.F.; Dimakis, A.G.; Caire, G. Femtocaching and device-to-device collaboration: A new architecture for wireless video distribution. IEEE Commun. Mag. 2013, 51, 142–149. [Google Scholar] [CrossRef]
- Maddah-Ali, M.A.; Niesen, U. Fundamental Limits of Caching. IEEE Trans. Inf. Theory 2014, 60, 2856–2867. [Google Scholar] [CrossRef]
- Wei, Q.; Wang, L.; Xu, L.; Tian, Z.; Han, Z. Hierarchical Coded Caching for Multiscale Content Sharing in Heterogeneous Vehicular Networks. IEEE Trans. Veh. Technol. 2022, 71, 5770–5786. [Google Scholar] [CrossRef]
- Maddah-Ali, M.A.; Niesen, U. Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff. IEEE/ACM Trans. Netw. 2015, 23, 1029–1040. [Google Scholar] [CrossRef]
- Cheng, H.; Li, C.; Xiong, H.; Frossard, P. Optimal decentralized coded caching for heterogeneous files. In Proceedings of the 2017 25th European Signal Processing Conference (EUSIPCO), Kos, Greece, 28 August–2 September 2017; pp. 2531–2535. [Google Scholar] [CrossRef]
- Zheng, L.; Chen, Q.; Yan, Q.; Tang, X. Decentralized Coded Caching Scheme With Heterogeneous File Sizes. IEEE Trans. Veh. Technol. 2020, 69, 818–827. [Google Scholar] [CrossRef]
- Ji, M.; Caire, G.; Molisch, A.F. Fundamental Limits of Caching in Wireless D2D Networks. IEEE Trans. Inf. Theory 2016, 62, 849–869. [Google Scholar] [CrossRef]
- Yapar, C.; Wan, K.; Schaefer, R.F.; Caire, G. On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery. IEEE Trans. Commun. 2019, 67, 8179–8192. [Google Scholar] [CrossRef]
- Wang, W.; Liu, N.; Kang, W. Three-User D2D Coded Caching With Two Random Requesters and One Sender. IEEE Trans. Commun. 2023, 71, 6967–6978. [Google Scholar] [CrossRef]
- Yu, Q.; Maddah-Ali, M.A.; Avestimehr, A.S. The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching. IEEE Trans. Inf. Theory 2018, 64, 1281–1296. [Google Scholar] [CrossRef]
- Wan, K.; Sun, H.; Ji, M.; Tuninetti, D.; Caire, G. On the Fundamental Limits of Device-to-Device Private Caching under Uncoded Cache Placement and User Collusion. IEEE Trans. Inf. Theory 2022, 68, 5701–5729. [Google Scholar] [CrossRef]
- Wan, K.; Sun, H.; Ji, M.; Tuninetti, D.; Caire, G. Device-to-Device Private Caching with Trusted Server. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Wan, K.; Sun, H.; Ji, M.; Tuninetti, D.; Caire, G. Novel Converse for Device-to-Device Demand-Private Caching with a Trusted Server. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 1705–1710. [Google Scholar] [CrossRef]
- Ibrahim, A.M.; Zewail, A.A.; Yener, A. Device-to-Device Coded-Caching With Distinct Cache Sizes. IEEE Trans. Commun. 2020, 68, 2748–2762. [Google Scholar] [CrossRef]
- Woolsey, N.; Chen, R.R.; Ji, M. Towards Finite File Packetizations in Wireless Device-to-Device Caching Networks. IEEE Trans. Commun. 2020, 68, 5283–5298. [Google Scholar] [CrossRef]
- Zhang, X.; Ji, M. Finite-length Analysis of D2D Coded Caching via Exploiting Asymmetry in Delivery. In Proceedings of the 2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC), Oulu, Finland, 4–6 July 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Zewail, A.A.; Yener, A. Device-to-Device Secure Coded Caching. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1513–1524. [Google Scholar] [CrossRef]
- Awan, Z.H.; Sezgin, A. Fundamental limits of caching in D2D networks with secure delivery. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 464–469. [Google Scholar] [CrossRef]
- Ji, M.; Chen, R.R.; Caire, G.; Molisch, A.F. Fundamental limits of distributed caching in multihop D2D wireless networks. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 2950–2954. [Google Scholar] [CrossRef]
- Lee, M.C.; Ji, M.; Molisch, A.F. Optimal Throughput-Outage Analysis of Cache-Aided Wireless Multi-Hop D2D Networks. IEEE Trans. Commun. 2021, 69, 2489–2504. [Google Scholar] [CrossRef]
- Tebbi, A.; Sung, C.W. Coded caching in partially cooperative D2D communication networks. In Proceedings of the 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Munich, Germany, 6–8 November 2017; pp. 148–153. [Google Scholar] [CrossRef]
- Phatak, A.; Varanasi, M.K. An improved coded caching scheme for partially cooperative D2D networks. In Proceedings of the 2022 IEEE International Symposium on Information Theory (ISIT), Espoo, Finland, 26 June–1 July 2022; pp. 1121–1126. [Google Scholar] [CrossRef]
- Li, J.; Chang, Y. New Constructions of D2D Placement Delivery Arrays. IEEE Commun. Lett. 2023, 27, 85–89. [Google Scholar] [CrossRef]
- Wang, W.; Liu, N.; Kang, W. Coded Caching in Request-robust D2D Communication Networks. In Proceedings of the 2023 International Symposium on Networks, Computers and Communications (ISNCC), Doha, Qatar, 23–26 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Liao, J.; Tirkkonen, O. Coded Caching in Presence of User Inactivity. In Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 1437–1442. [Google Scholar] [CrossRef]
- Wan, K.; Tuninetti, D.; Piantanida, P. On the optimality of uncoded cache placement. In Proceedings of the 2016 IEEE Information Theory Workshop (ITW), Cambridge, UK, 11–14 September 2016; pp. 161–165. [Google Scholar] [CrossRef]
- Sengupta, A.; Tandon, R.; Clancy, T.C. Fundamental Limits of Caching With Secure Delivery. IEEE Trans. Inf. Forensics Secur. 2015, 10, 355–370. [Google Scholar] [CrossRef]
- Yu, Q.; Maddah-Ali, M.A.; Avestimehr, A.S. Characterizing the Rate-Memory Tradeoff in Cache Networks Within a Factor of 2. IEEE Trans. Inf. Theory 2019, 65, 647–663. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, W.; Tao, Z.; Liu, N.; Kang, W. Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks. Entropy 2024, 26, 250. https://doi.org/10.3390/e26030250
Wang W, Tao Z, Liu N, Kang W. Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks. Entropy. 2024; 26(3):250. https://doi.org/10.3390/e26030250
Chicago/Turabian StyleWang, Wuqu, Zhe Tao, Nan Liu, and Wei Kang. 2024. "Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks" Entropy 26, no. 3: 250. https://doi.org/10.3390/e26030250
APA StyleWang, W., Tao, Z., Liu, N., & Kang, W. (2024). Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks. Entropy, 26(3), 250. https://doi.org/10.3390/e26030250