Next Article in Journal
Nonclassical Effects Based on Husimi Distributions in Two Open Cavities Linked by an Optical Waveguide
Next Article in Special Issue
Cache-Aided General Linear Function Retrieval
Previous Article in Journal
A Denoising Method for Fiber Optic Gyroscope Based on Variational Mode Decomposition and Beetle Swarm Antenna Search Algorithm
Previous Article in Special Issue
Generalized Index Coding Problem and Discrete Polymatroids
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Linear Error Correcting Delivery Schemes for Two Optimal Coded Caching Schemes †

by
Nujoom Sageer Karat
1,
Anoop Thomas
2 and
Balaji Sundar Rajan
1,*
1
Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India
2
School of Electrical Sciences, Indian Institute of Technology Bhubaneswar, Odisha 752050, India
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018.
Entropy 2020, 22(7), 766; https://doi.org/10.3390/e22070766
Submission received: 25 April 2020 / Revised: 10 July 2020 / Accepted: 10 July 2020 / Published: 13 July 2020

Abstract

:
For coded caching problems with small buffer sizes and the number of users no less than the amount of files in the server, an optimal delivery scheme was proposed by Chen, Fan, and Letaief in 2016. This scheme is referred to as the CFL scheme. In this paper, an extension to the coded caching problem where the link between the server and the users is error prone, is considered. The closed form expressions for average rate and peak rate of error correcting delivery scheme are found for the CFL prefetching scheme using techniques from index coding. Using results from error correcting index coding, an optimal linear error correcting delivery scheme for caching problems employing the CFL prefetching is proposed. Another scheme that has lower sub-packetization requirement as compared to CFL scheme for the same cache memory size was considered by J. Gomez-Vilardebo in 2018. An optimal linear error correcting delivery scheme is also proposed for this scheme.

1. Introduction

The problem of coded caching introduced in [1] plays a crucial role in reducing peak hour traffic in networks. In a coded caching scheme, a part of the content is made available in local cache of users, so that traffic can be reduced at peak hours. Coded caching scheme involves two phases: a placement phase and a delivery phase. In the placement phase or the prefetching phase, which is performed during off-peak times, the entire database is made available to each user. Users fill their cache with the available data. Delivery phase is carried out once the demands are revealed by the users. During prefetching, some parts of files have to be judiciously cached at each user in such a way that the rate of transmission is reduced during the delivery phase. The prefetching can be done with or without coding. If during prefetching, no coding of parts of files is done, the prefetching scheme is referred to as uncoded prefetching [1,2]. If coding is done during prefetching stage, then the prefetching scheme is referred to as coded prefetching [3,4,5,6,7].
The seminal work in [1] shows that apart from the local caching gains obtained by placing contents at user caches before the demands are revealed, a global caching gain can be obtained by coded transmissions. This scheme is extended to decentralized scheme in [8]. The caching problem is extended to the case of non-uniform demands [9], online coded caching [10], hierarchical caching [11], and device-to-device caching [12]. Cache management scheme which incorporates decoding information in making cache replacement decisions was studied in [13]. A decentralized secure coded caching approach was proposed in [14], in which nodes only transmit coded files to avoid eavesdropper wiretapping and protect the user contents.
An error correcting delivery scheme is required if the shared bottleneck link between the server and the users is error-prone. The minimum average rate and minimum peak rate of error correcting delivery schemes is characterized in [15]. The placement phase is assumed to be error-free. This assumption can be justified as during the placement phase there is no bandwidth constraint and any number of re-transmissions can be done to make the placement error-free. A similar model in which the delivery phase takes place over a packet erasure broadcast channel was considered in [16,17,18,19].
In this paper, we consider the caching schemes considered in [3,4]. The prefetching scheme employed in these papers is coded, i.e., parts of files are coded and placed in the user caches. Optimal linear error correcting delivery schemes are proposed for these prefetching schemes. The optimal error correcting delivery scheme refers to an error correcting delivery scheme, which uses the minimum number of transmissions for a given placement. The main contributions of this paper are as follows.
  • The prefetching scheme proposed in [3] is considered for the case where the number of users is the same as the number of files. The minimum number of transmissions required for correcting finite number of transmission errors is obtained for this case (Section 3.1).
  • When the number of users is greater than the number of files, a different prefetching scheme is employed in [3]. For this prefetching strategy, the minimum number of transmissions required for correcting finite number of transmission errors is obtained (Section 3.2).
  • A linear error correcting delivery scheme for coded caching problem with coded prefetching for small buffer sizes is proposed. The expressions for average rate and peak rate of this error correcting delivery scheme are found (Section 4).
  • The caching scheme in [4] is considered for the same cache memory region. The advantage here is that the sub-packetization requirement is low. Sub-packetization level refers to number of subfiles that each file is split into. An optimal linear error correcting delivery scheme is found for the prefetching scheme employed in [4] (Section 5).
Parts of the content of this manuscript are present in [20]. The additional content in this manuscript is the construction of optimal linear error correcting delivery scheme for the prefetching scheme employed in [4] with reduced sub-packetization (Section 5). The proofs of Theorem 1 and Theorem 2 are also not present in [20].
A work that is closely related to this work is present in [15] and its extended version [21]. In [21], error correction is considered for a particular class of uncoded prefetching, namely symmetric batch prefetching. The major distinctions of this paper with the work in [21] are as follows. This is the first paper in the literature that considers error correction for coded caching schemes with coded prefetching. On the other hand, the work in [21] involves uncoded prefetching. For a fixed demand, the delivery scheme of a coded caching problem with uncoded prefetching is an index coding problem [22]. When the prefetching is coded, it corresponds to a generalized index coding problem [23]. To derive bounds in [21], the concepts of index coding are used and, to derive the bounds in this paper, we use techniques from generalized index coding. This paper is the first to use the concepts of generalized index coding to derive bounds for coded caching problems.
In this paper, F q denotes the finite field with q elements, where q is prime power, and F q denotes the set of all non-zero elements of F q . For any positive integer K, [ K ] denotes the set { 1 , 2 , , K } . For a K × N matrix L , l i denotes its ith row. For vector spaces U , V , U < V denotes that U is a subspace of V . A linear [ n , k , d ] q code C over F q is a k-dimensional subspace of F q n with minimum Hamming distance d. The vectors that belong to the subspace C are called codewords. A matrix G of size k × n whose rows are linearly independent codewords of C is called a generator matrix of C . Thus, a linear [ n , k , d ] q code C can be represented using its generator matrix G as, C = { y G : y F q k } . N q [ k , d ] denotes the length of the shortest linear code over F q , which has dimension k and minimum distance d.

2. Preliminaries and Background

Results from error correction for index coding with coded side information are used to obtain error correcting delivery schemes for the caching problem. In this section we recall results from error correction for index coding with coded side information introduced in [24]. We also review the coded caching scheme with coded prefetching proposed in [3,4], for which optimal error correcting delivery schemes are presented in the following sections (Section 3, Section 4, and Section 5).

2.1. Generalized Index Coding Problem and Error Correction

The index coding (IC) problem with side-information was introduced by Birk and Kol [22]. A source broadcasts messages through a noiseless shared channel to multiple receivers, each demanding certain messages and knowing some other messages a priori as side-information. The source needs to meet the demands of each receiver in a minimum number of transmissions. The minimum number of transmissions required to meet the demands of all the receivers is termed as the optimal length of the index coding problem. In [23] and [25], a generalization of the index coding problem was discussed, where the demands of the receivers and the side-information are linear combinations of the messages. In [25], the authors refer to this class of problems as Generalized Index Coding (GIC) problems.
An instance, I of a GIC problem is described formally, as follows. There is a message vector x T = ( x 1 , x 2 , , x n ) T F q n × 1 and there are m receivers. The ith receiver demands a linear combination of the messages r i x T , for some r i F q 1 × n , where r i is the request vector and r i x T is the request packet of the ith receiver. The side-information is represented by a matrix V ( i ) F q s i × n , where s i is the number of packets possessed as side-information by the ith receiver. The packets that are known as side-information possessed by the ith receiver are V ( i ) x T . Let X ( i ) denote the row space of V ( i ) . Receiver i can also compute the linear combination of messages v x T v X ( i ) . Let R be an m × n matrix over F q having r i as its ith row. The matrix R represents the demands of all the m receivers. In the definition of GIC problem in [25] the source is assumed to possess only certain linear combinations of messages. In our work, it is assumed that all of the messages are independent and the source possesses all of them.
The min-rank of an instance I of the GIC problem over F q is defined as
κ ( I ) = min { rank ( A + R ) : A F q m × n , a i X ( i ) , i [ m ] } .
This is motivated by the fact that any encoding matrix for a GIC problem is of the form A + R . It is shown in [24] that the min-rank is the optimal length of linear generalized index code. Intuitively, min-rank can be viewed as the minimum communication load among all of the delivery schemes with linear decoding functions, where each a i corresponds to the coefficients for the locally cached contents.
For each i [ m ] , the set Z ( i ) is defined as
Z ( i ) { z F q n × 1 : V ( i ) z = 0 , r i z 0 } .
Thus, Z ( i ) is a collection of vectors that belong to the null space of V ( i ) and satisfy r i z 0 . The set of vector spaces J ( I ) is defined as J ( I ) { U < F q n : U { 0 } i [ m ] Z ( i ) } . The set J ( I ) is the collection of subspaces such that the set of non-zero vectors of any subspace in the collection is a subset of i [ m ] Z ( i ) . The maximum value of dimension among the dimensions of all the elements of J ( I ) is called the generalized independence number, denoted by α ( I ) . Thus, the dimension of any subspace of F q n in i [ m ] Z ( i ) { 0 } serves as a lower bound for α ( I ) . The generalized independence number can be viewed as a cut set type of argument when the message lives in a subspace where all of the cached contents are zero. It was shown in [24] that the min-rank serves as an upper bound for the generalized independence number, i.e.,
α ( I ) κ ( I ) .
Generalized index coding problems were classified in [26]. In generalized index coding with coded side-information problems, the demand of every receiver is uncoded but the side-information is coded. In generalized index coding problems with coded demands, the side-information of every receiver is uncoded but the demand is coded. In our work the focus is on generalized index coding with coded side-information problems.
Error correcting index codes were introduced in [27] and later extended for generalized index coding problems in [24]. An Error Correcting Generalized Index Code (ECGIC) is a map that encodes the message vector x T , such that each user, given its side-information and received transmissions, can decode its requested packet r i x T F q , even in the presence of at most δ transmission errors. The smallest possible length of such a δ -error correcting index code is denoted by N q [ I , δ ] . An optimal linear ( I , δ ) -ECGIC over F q is a linear ( I , δ ) -ECGIC over F q of the smallest possible length. The optimal length of a linear error correcting index code is lower bounded by α -bound and upper bounded by κ -bound as
N q [ α ( I ) , 2 δ + 1 ] α - bound N q [ I , δ ] N q [ κ ( I ) , 2 δ + 1 ] κ - bound .
where N q [ k , d ] is the length of an optimal linear classical error-correcting code of dimension k and minimum distance d over F q [24,27].
If for some index coding problem, α ( I ) = κ ( I ) , then bounds in (3) meet with equality. Thus, for such problems,
N q [ α ( I ) , 2 δ + 1 ] = N q [ I , δ ] = N q [ κ ( I ) , 2 δ + 1 ] .
In general, the κ -bound is obtained by concatenating an optimal linear classical error correcting code and an optimal linear index code. When α ( I ) = κ ( I ) , as the optimal length of the ECGIC is same as κ -bound, for such problems, concatenation scheme would give optimal linear error correcting index codes [26,28,29,30].

2.2. Error Correcting Coded Caching Scheme

The problem of error correcting coded caching scheme was proposed in [15]. The server is connected to K users through a shared link, which is error prone. The server has access to N files X 1 , X 2 , , X N each of size F bits. Every user has an isolated cache with memory M F bits, where M [ 0 , N ] . There are many ways in which users can fill their cache contents. A prefetching scheme is denoted by M and it specifies the way in which user caches are filled. Each user demands one of the N files. Let the demand vector be d = ( d 1 , , d K ) , where d i is the index of the file demanded by user i. The number of distinct files requested in d is denoted by N e ( d ) . The set of all possible demands is denoted by D = { 1 , 2 , , N } K . During the delivery phase, the server informed of the demand d , transmits a function of X 1 , X 2 , , X N over a shared link. A δ -error correcting coded caching scheme should be in such a way that using the cache contents and the transmitted data, each user i needs to decode the requested file X d i , even if δ transmissions are in error.
For a δ -error correcting coded caching problem, a communication rate R ( δ ) is achievable for demand d if and only if there exists a transmission of R ( δ ) F bits such that every user i is able to decode its desired file X d i even after at most δ transmissions are in error. Rate R ( d , M , δ ) is the minimum achievable rate for a given d , M and δ . The average rate R ( M , δ ) is defined as the expected minimum average rate for a given M and δ under uniformly random demand. Thus, R ( M , δ ) = E d [ R ( d , M , δ ) ] . Another quantity of interest is the peak rate, denoted by R worst ( M , δ ) , which is defined as R worst ( M , δ ) = max d R ( d , M , δ ) .

2.3. Coded Caching Scheme with Coded Prefetching

An optimal coded caching scheme for small cache sizes involving coded prefetching was given in [3] by Chen, Fan, and Letaief. We refer this scheme as the Chen Fan Letaief (CFL) scheme. The prefetching scheme here is denoted by M CFL . For this scheme, the cache memory size of each user is M = 1 / K . The prefetching strategy differs depending on the values of N and K. Thus, M CFL involves two types of prefetching strategies, which are as given below:
  • Consider the case when N = K and M = 1 / K . Each file is split into N subfiles, i.e., X i = ( X i , 1 , X i , 2 , , X i , N ) . During prefetching, the cache of user j is filled as Y j = X 1 , j X 2 , j X N , j , an XORed version of subfiles. It is shown in [3] that R ( δ = 0 ) = N e ( d ) for N e ( d ) N 1 and R ( δ = 0 ) = N 1 for N e ( d ) = N are achievable. Furthermore, if M [ 0 , 1 / N ] , R ( M , δ = 0 ) = N ( 1 M ) is achievable by memory sharing.
  • Consider K > N and M = 1 / K . Each file is split into N K subfiles, i.e., X i = ( X i , 1 , X i , 2 , , X i , N K ) . The cache of user i is given by Y i = X 1 , N ( i 1 ) + j X N , N ( i 1 ) + j , for j = 1 , 2 , , N . For the number of distinct demands N e ( d ) N 1 files, it is shown in [3] that R ( δ = 0 ) = N e ( d ) is achievable. For N e ( d ) = N , the rate R ( δ = 0 ) = N N / K is achievable. Furthermore, if M [ 0 , 1 / K ] , R ( M , δ = 0 ) = N ( 1 M ) is achievable by memory sharing.

2.4. Coded Caching Scheme with Coded Prefetching with Low Sub-Packetization

A scheme for N K and cache capacities 1 / K M N / K was proposed in [4] by Jesus Vilardebo. We refer to this scheme as the Jesus Vilardebo (JV) scheme. The prefetching scheme of the JV scheme is denoted by M JV . We consider this scheme only for M = 1 / K . The advantage of JV scheme over CFL scheme is that the sub-packetization requirement is low. The scheme in [4] uses a low sub-packetization level as compared to the scheme in [3]. A low sub-packetization level is always preferred, because any practical scheme will require each of the subfiles to have some header information that allows for decoding at the end users. When there are a large number of subfiles, the header overhead may be non-negligible. The prefetching scheme, M JV , is described, as follows: each file X i is partitioned into K parts X i , 1 , X i , 2 , , X i , K for i [ N ] . Afterwards, the cache content for user i is populated as Y i : X 1 , i X 2 , i X N , i for i [ K ] . The rate achieved is same as the CFL scheme.

2.5. Index Coding and Coded Caching

For a fixed prefetching M and for a fixed demand d , the delivery phase of a coded caching problem is an index coding problem [1]. We denote such an index coding problem as I ( M , d ) . In fact, for fixed prefetching, a coded caching scheme consists of N K parallel index coding problems one for each of the N K possible user demands. Thus, finding the minimum achievable rate for a given demand d is equivalent to finding the min-rank of the equivalent index coding problem induced by the demand d . Because the generalized independence number and min-rank of I ( M , d ) depend on the caching scheme M and demand d , we denote them as α ( M , d ) and κ ( M , d ) , respectively.
Consider the CFL prefetching scheme M CFL . The index coding problem that is induced by the demand d for the CFL prefetching is I ( M CFL , d ) . Each subfile X i , j corresponds to a message in the index coding problem. Because prefetching is coded, I ( M CFL , d ) represents a generalized index coding with coded side-information problem. Similarly, I ( M JV , d ) represents a generalized index coding problem that corresponds to the JV prefetching scheme.
There have been many works in the literature that make use of the link between index coding and coded caching. Some of them use index coding concepts to derive lower bounds on the rate [31,32]. In [33], multiple groupcast index coding is used to design coded caching delivery for multiple requests. A novel index coding scheme was introduced in [34], which, when applied to caching problem, is then shown to match an outer bound under the assumption of uncoded cache prefetching. A multihop index coding technique is proposed in [35] to code the cached contents in helpers to achieve order-optimal capacity gains. Decentralized caching schemes were proposed for two-layer networks in [36] which exploit index coding in the delivery phase and leverages multicast opportunities. None of these assume the channel to be error prone during the delivery phase. In our work, we use the error correction aspects of index coding to design optimal error correcting coded caching schemes.
We call a caching scheme optimal if both the placement and delivery schemes are designed in such a way to achieve an optimal rate memory pair. An optimal error correcting delivery scheme refers to an error correcting delivery scheme, which uses the minimum number of transmissions for a given placement. Unless the delivery scheme is carefully designed, one may end up with non-optimal error correcting delivery scheme for a given placement. This is clear from Example 4.8 of [27]. In that example, an index coding problem with five messages and five receivers are considered. The side information sets are given as X 1 = { 2 , 5 } , X 2 = { 1 , 3 } , X 3 = { 2 , 4 } , X 4 = { 3 , 5 } , and X 5 = { 1 , 4 } . For this problem, it can be calculated that α ( I ) = 2 . Additionally, for this problem, min-rank, κ ( I ) = 3 over binary field. From code tables in [37], we have N 2 [ 2 , 5 ] = 8 and N 2 [ 3 , 5 ] = 10 . Hence, 8 N 2 [ I , δ ] 10 . Using a computer search, the authors of [27] have found that the optimal length N 2 [ I , 2 ] = 9 . Here the optimal length of the error correcting index code lies strictly between the α -bound and the κ -bound. Thus, for this problem, the construction of optimal linear error correcting index code by concatenation is not optimal. Similarly, in general for coded caching problems with an arbitrary placement and demand, the optimal error correcting delivery scheme cannot be constructed by concatenation unless we prove that the α and κ bounds meet for the corresponding index coding problem. In the schemes which we consider in this paper, we explicitly prove that the α and κ bounds meet for all of the demand cases for the given placement. Hence, the optimality of concatenation is guaranteed.

3. Generalized Independence Number for I ( M CFL , d )

In this section we find a closed form expression for the generalized independence number α ( M CFL , d ) of the index coding problem I ( M CFL , d ) . There are two different prefetching schemes employed in [3], depending on the relationship between the number of messages and the number of receivers. For all the index coding problems corresponding to both these prefetching schemes, the generalized independence number is shown to be equal to the min-rank.

3.1. Number of Files Equal to the Number of Users ( N = K )

In the CFL prefetching scheme, each file is split into N subfiles. Hence, the number of messages in I ( M CFL , d ) is N 2 . Each user is split into N receivers each demanding one message. Hence, there are a total of N 2 receivers. From the expressions of the achievable rates in [3], we get the min-rank κ ( M CFL , d ) as
κ ( M CFL , d ) N e ( d ) N if N e ( d ) N 1 N ( N 1 ) if N e ( d ) = N .
We find the generalized independence number α ( M CFL , d ) for I ( M CFL , d ) . For different demands, a generalized independence number is calculated and it is shown to be equal to the min-rank of the corresponding generalized index coding problem. The technique of obtaining α ( M CFL , d ) is illustrated in the following example.
Example 1.
Consider a coded caching problem with N = K = 3 , M = 1 / 3 (see Figure 1). Because M = 1 / K , the CFL scheme is used for solving the coded caching problem. Each file is split into N = 3 subfiles as X 1 = ( X 1 , 1 , X 1 , 2 , X 1 , 3 ) , X 2 = ( X 2 , 1 , X 2 , 2 , X 2 , 3 ) and X 3 = ( X 3 , 1 , X 3 , 2 , X 3 , 3 ) . Let X = ( X 1 , 1 , X 1 , 2 , X 1 , 3 , X 2 , 1 , X 2 , 2 , X 2 , 3 , X 3 , 1 , X 3 , 2 , X 3 , 3 ) denote the vector obtained by concatenating X 1 , X 2 and X 3 . The cache contents of user i is Y i = ( X 1 , i X 2 , i X 3 , i ) for i = 1 , 2 , 3 . Cache contents are depicted in Figure 1.
First consider that all of the demands are distinct, i.e., N e ( d ) = 3 . Without loss of generality, we can assume that the demand is d = ( 1 , 2 , 3 ) . Consider the equations
e 1 : X 1 , 1 X 2 , 1 X 3 , 1 = 0 , e 2 : X 1 , 2 X 2 , 2 X 3 , 2 = 0 , a n d e 3 : X 1 , 3 X 2 , 3 X 3 , 3 = 0 .
Let S be the subspace of F q 9 , which consists of the vectors satisfying the equations e 1 , e 2 and e 3 . From the rank-nullity theorem, dim ( S ) 6 . The induced generalized index coding problem I ( M CFL , d ) has 9 messages and 9 receivers. For this case, (1) can be rewritten as Z ( i , j ) { z F q 9 : e i , X d i , j 0 } . Let A ( d ) = i , j [ 3 ] Z ( i , j ) { 0 } . The generalized independence number is the maximum among the dimensions of all the subspaces of F q 9 in A ( d ) . We claim that all the vectors of S belong to the set A ( d ) . Thus, α ( M CFL , d ) dim ( S ) 6 . From the definition of A ( d ) , it is clear that the all zero vectors 0 belonging to S also belong to A ( d ) . Any other vector in S will have at least one non-zero coordinate X i , j . The vector belonging to S , having X i , j 0 belongs to the set Z ( i , j ) . Thus, all of the vectors in S lie in A ( d ) and α ( M CFL , d ) 6 . From (4), we get κ ( M CFL , d ) 6 . Hence, by (2), we have α ( M CFL , d ) = κ ( M CFL , d ) = 6 .
Finally, assume N e ( d ) = 1 and let d = ( 1 , 1 , 1 ) . In addition to e 1 , e 2 and e 3 , consider the following set of equations e 4 : X 2 , 1 = 0 , e 5 : X 2 , 2 = 0 , and e 6 : X 2 , 3 = 0 . Let S be the subspace of F q 9 , which consists of the vectors that satisfy the set of equations e 1 , e 2 , , e 6 . We follow the similar argument as above to show that all the vectors in S lie in A ( d ) . By definition, 0 lies in A ( d ) . All of the vectors in S with X 1 , j 0 for j = 1 , 2 , 3 are present in A ( d ) . By e 4 , e 5 and e 6 , all the vectors in S have X 2 , j = 0 . The condition X 3 , j 0 and the set of equations e 1 , e 2 , , e 6 force X 1 , j 0 . Hence, all of the vectors in S with X 3 , j 0 are present in Z ( 1 , j ) . Thus, all of the vectors in S are present in A ( d ) . Moreover, dim ( S ) 9 6 = 3 . Therefore α ( M CFL , d ) 3 . From (4), κ ( M CFL , d ) 3 . Thus, by (2), α ( M CFL , d ) = κ ( M CFL , d ) = 3 . For other possible demands also, it can be verified from Table 1 that α ( M CFL , d ) = κ ( M CFL , d ) .
In Example 1, the generalized independence number of the index coding problem I ( M CFL , d ) is equal to its min-rank. For different demands, the generalized index coding problem changes and, for all those problems, min-rank and generalized independence number are shown to be equal. This can be shown for all values of N, as given in the theorem below.
Theorem 1.
For N = K and M = 1 / K ,
α ( M CFL , d ) = κ ( M CFL , d ) = N e ( d ) N i f N e ( d ) N 1 N ( N 1 ) i f N e ( d ) = N ,
d D , where N e ( d ) is the number of distinct demands.
Proof. 
In the CFL prefetching scheme M CFL , each file X i , i [ N ] is split into N subfiles X i , 1 , X i , 2 , , X i , N . User i , i [ N ] caches Y i = ( X 1 , i X 2 , i X N , i ) . Let X = ( X 1 , 1 , , X 1 , N , X 2 , 1 , , X 2 , N , , X N , 1 , , X N , N ) be the vector obtained by concatenation of vectors X i , i [ N ] .
For a given demand d , the delivery phase of the coded caching problem becomes a generalized index coding problem I ( M CFL , d ) with N 2 messages and N 2 receivers.
First, consider that all of the demands are distinct, i.e., N e ( d ) = N . Let the demand of the ith user be X d i . Thus d = ( d 1 , d 2 , , d N ) . Consider the set of N equations denoted by e 1 , e 2 , , e N , where
e i : ( X 1 , i X 2 , i X N , i ) = 0 .
Let S be the subspace of F q N 2 , which consists of the vectors that satisfy the set of equations e 1 , e 2 , , e N . From the rank-nullity theorem, we have dim ( S ) N 2 N .
For I ( M CFL , d ) , from (1) we have, Z ( i , j ) { z F q N 2 : e i , X d i , j 0 } . Let A ( d ) = i , j [ N ] Z ( i , j ) { 0 } . The generalized independence number is the maximum of the dimensions of all subspaces of F q N 2 in A ( d ) . We show that S is such a subspace. For this, we need to show that all the vectors of S lie in A ( d ) . By the definition of A ( d ) , the all zero vector 0 lies in A ( d ) . Any other vector in S will have at least one non-zero coordinate. The vectors that belong to S having X d i , j 0 belongs to the set Z ( i , j ) . Thus, all of the vectors in S lie in A ( d ) . The generalized independence number α ( M CFL , d ) N 2 N . From (4), we get κ ( M CFL , d ) N 2 N . Hence, by (2), we have α ( M CFL , d ) = κ ( M CFL , d ) = N 2 N .
Consider the case where N e ( d ) N 1 . Without a loss of generality, we can assume that the first N e ( d ) users have distinct demands and that the ith user demands the file X d i for i [ N e ( d ) ] . Also, without loss of generality, we can assume that the set of indices of the files that are not demanded are N e ( d ) + 1 , N e ( d ) + 2 , , N . There are U = N N e ( d ) files that are not demanded. In addition to e 1 , e 2 , , e N , consider the following set of equations X N e ( d ) + i , j = 0 , for i [ U 1 ] , j [ N ] . The number of these equations is thus N + N ( U 1 ) = N U = N ( N N e ( d ) ) . Let S be the subspace of F q N 2 , which consists of vectors that satisfy these equations. Hence, dim ( S ) N 2 N ( N N e ( d ) ) = N e ( d ) N . By definition, 0 lies in A ( d ) . Any vector with the coordinate X d i , j 0 for i [ N e ( d ) ] lies in Z ( i , j ) . The set of equations force all X i , j = 0 for i { N e ( d ) , , N 1 } . Moreover if X N , j 0 the set of equations force some X d i , j 0 for some i [ N e ( d ) ] . Hence any vector with X N , j 0 lies in some Z ( i , j ) for i [ N e ( d ) ] . Thus, all of the vectors in S lie in A ( d ) . Therefore, α ( M CFL , d ) dim ( S ) N e ( d ) N . Applying (4) and (2), α ( M CFL , d ) = κ ( M CFL , d ) = N e ( d ) N .  □

3.2. Number of Users More Than the Number of Files ( N < K )

In the CFL prefetching scheme for N < K , each file is split into N K subfiles. Hence, the number of messages in I ( M CFL , d ) is N 2 K . Each user is split into N K receivers in I ( M CFL , d ) , each demanding a single message. Thus, there are a total of N K 2 receivers. From the expressions for achievable rates in [3], we obtain the min-rank κ ( M CFL , d ) as
κ ( M CFL , d ) N K N e ( d ) if N e ( d ) N 1 N 2 ( K 1 ) if N e ( d ) = N .
We find the generalized independence number α ( M CFL , d ) for I ( M CFL , d ) . The technique of obtaining α ( M CFL , d ) is illustrated in the following example.
Example 2.
Consider a coded caching problem with N = 3 , K = 4 and M = 1 / 4 (see Figure 2). According to the CFL scheme each file is split into N K = 12 subfiles as X 1 = ( X 1 , 1 , X 1 , 2 , , X 1 , 12 ) , X 2 = ( X 2 , 1 , X 2 , 2 , , X 2 , 12 ) , and X 3 = ( X 3 , 1 , X 3 , 2 , , X 3 , 12 ) . Let X = ( X 1 , 1 , , X 1 , 12 , , X 3 , 1 , , X 3 , 12 ) denote the vector obtained by concatenating X 1 , X 2 and X 3 . The cache of the ith user contains three coded packets Y i = ( X 1 , 3 ( i 1 ) + j X 2 , 3 ( i 1 ) + j X 3 , 3 ( i 1 ) + j ) for j = 1 , 2 , 3 . The cache contents are given in Figure 2.
For a given demand d , this problem becomes a generalized index coding problem I ( M CFL , d ) ,having 36 messages and 48 receivers.
First consider that N e ( d ) = N = 3 and d = ( 1 , 2 , 3 , 1 ) . Consider the nine equations given by e i , j : ( X 1 , 3 ( i 1 ) + j X 2 , 3 ( i 1 + j ) X 3 , 3 ( i 1 ) + j ) = 0 for i = 1 , 2 , 3 and j = 1 , 2 , 3 . Let S be the subspace of F q 36 satisfying these nine equations. From the rank-nullity theorem, we get dim ( S ) 36 9 = 27 . For this case, (1) can be rewritten as Z ( i , j ) { z F q 36 : e i , 1 , e i , 2 , e i , 3 , X d i , j 0 } for i [ 4 ] . Let A ( d ) = i [ 4 ] , j [ 12 ] Z ( i , j ) { 0 } . The generalized independence number is the maximum among the dimensions of all the subspaces of F q 36 in A ( d ) . We claim that S is such a subspace. This would mean that α ( M CFL , d ) dim ( S ) 27 . For this, we need to show that all of the vectors in S lie in A ( d ) . By the definition of A ( d ) , the all zero vector 0 lies in A ( d ) . Any other vector in S will have at least one non-zero coordinate. All of the vectors in S , having X d i , j 0 belongs to Z ( i , j ) . Thus, all of the vectors in S lie in A ( d ) and α ( M CFL , d ) 27 . From (5), we get κ ( M CFL , d ) 3 2 ( 4 1 ) = 27 . Hence, by (2), we have α ( M CFL ) = κ ( M CFL ) = 27 .
Consider now that N e ( d ) = 2 and d = ( 1 , 2 , 1 , 2 ) . In addition to the nine equations e i , j for i = 1 , 2 , 3 and j = 1 , 2 , 3 , consider three more equations e 4 , j : ( X 1 , 9 + j X 2 , 9 + j ) X 3 , 9 + j ) = 0 for j = 1 , 2 , 3 . Thus, we consider a set of twelve equations given by E = { e i , j : i [ 4 ] , j [ 3 ] } . Let S be the subspace of F q 36 consisting of vectors that satisfy the equations in E . Hence, from the rank-nullity theorem, we have dim ( S ) 36 12 = 24 . By definition, 0 lies in A ( d ) . Any non-zero vector in S with X d i , j 0 for i = 1 , 2 lies in the corresponding Z ( i , j ) . By E , any X 3 , j 0 forces some X i , j 0 for i = 1 , 2 and, hence, such vectors also lie in A ( d ) . Thus all of the vectors in S lie in A ( d ) . Therefore α ( M CFL , d ) dim ( S ) 24 . From (5), we get κ ( M CFL , d ) 12 ( 2 ) = 24 . Hence, by (2), we have α ( M CFL ) = κ ( M CFL ) = 24 .
Finally, consider N e ( d ) = 1 and d = ( 1 , 1 , 1 , 1 ) . The files X 2 and X 3 are not demanded by any user. In addition to the equations in E , here we consider a set of equations X 2 , j = 0 for j [ 12 ] . Thus there are 24 equations in total. Let S be the subspace of F q 36 which satisfy these equations. By the rank-nullity theorem, the dimension of S is given by dim ( S ) 36 24 = 12 . The next step is to show that all the vectors in S lie in A ( d ) . The all zero vector 0 lies in A ( d ) by definition. Any non-zero vector in S with X 1 , j 0 for j [ 12 ] lies in the corresponding Z ( i , j ) . The 24 equations considered involve equations of the form X 2 , j = 0 for j [ 12 ] . Hence, by E, any X 3 , j 0 forces X 1 , j 0 for j [ 12 ] and hence such vectors also lie in A ( d ) . Thus, all of the vectors in S lie in A ( d ) . Therefore, α ( M CFL , d ) dim ( S ) 12 . From (5), we get κ ( M CFL , d ) 12 ( 1 ) = 12 . Hence, by (2), we have α ( M CFL ) = κ ( M CFL ) = 12 .
The theorem below gives the general expression for α ( M CFL , d ) , when N < K .
Theorem 2.
For N < K and M = 1 / K ,
α ( M CFL , d ) = κ ( M CFL , d ) = N K N e ( d ) i f N e ( d ) N 1 N 2 ( K 1 ) i f N e ( d ) = N ,
d D , where N e ( d ) is the number of distinct demands.
Proof. 
For N < K and M = 1 / K , the CFL prefetching scheme M CFL is as follows. Each file is split into N K subfiles X i = ( X i , 1 , X i , 2 , , X i , N K ) . User i , i [ K ] caches N coded packets given by Y i = X 1 , N ( i 1 ) + j X N , N ( i 1 ) + j , for j [ N ] . Let X = ( X 1 , 1 , , X 1 , N K , , X N , 1 , , X N , N K ) be the vector obtained by the concatenation of vectors X i , i [ N ] . For a given demand d , this problem becomes a generalized index coding problem I ( M CFL , d ) with N 2 K messages and N K 2 receivers.
First consider that all of the demands are distinct, i.e., N e ( d ) = N . Without loss of generality we can assume that the first N users demand distinct files, such that the ith user demands X d i for i = 1 , 2 , , N . Thus, d = ( d 1 , d 2 , , d K ) , such that d i d j for i , j [ N ] . Let E = { e i , j : i [ K ] , j [ N ] } represent a set of N K equations, where e i , j : ( X 1 , N ( i 1 ) + j X 2 , N ( i 1 ) + j X N , N ( i 1 ) + j ) = 0 . We consider a subset of the equations in E of the form e i , j for i , j [ N ] . There are N 2 such equations. Let S be the subspace of F q N 2 K consisting of vectors that satisfy these equations. From the rank-nullity theorem, we have dim ( S ) N 2 K N 2 = N 2 ( K 1 ) .
For I ( M CFL , d ) , (1) can be rewritten as Z ( i , j ) { z F q N 2 K : e i , k for k [ N ] , X d i , j 0 } for i [ K ] and j [ N K ] . Let A ( d ) = i [ K ] , j [ N K ] Z ( i , j ) { 0 } . The generalized independence number is the maximum among the dimensions of all the subspaces of F q N 2 K in A ( d ) . We show that S is such a subspace. For this, we need to show that all of the vectors of S lie in A ( d ) . By the definition of A ( d ) , the all zero vector 0 lies in A ( d ) . The vectors that belong to S having X d i , j 0 belong to the set Z ( i , j ) . Thus, all of the vectors in S lie in A ( d ) and α ( M CFL , d ) N 2 ( K 1 ) . From (5), we get κ ( M CFL ) N 2 ( K 1 ) . Hence, by (2), we have α ( M CFL ) = κ ( M CFL ) = N 2 ( K 1 ) .
Consider the case where N e ( d ) N 1 . Let the first N e ( d ) demands be distinct and the ith user demands X d i for i [ N e ( d ) ] . Without loss of generality we can assume that the indices of the files that are not demanded are N e ( d ) + 1 , , N . There are U = N N e ( d ) files that are not demanded. In addition to the N K equations that are presented in E , consider the following equations X N e ( d ) + i , j = 0 , for i [ U 1 ] and j [ N K ] . The number of these equations is thus N K + N K ( U 1 ) = N K U = N K ( N N e ( d ) ) . Let S be the subspace of F q N 2 K which consists of the vectors satisfying these equations. By the rank-nullity theorem, dim ( S ) N 2 K N K ( N N e ( d ) ) = N K ( N e ( d ) ) . By definition, 0 lies in A ( d ) . Any vector in S with the coordinate X d i , j 0 for i [ N e ( d ) ] lies in Z ( i , j ) . The set of equations force all X i , j = 0 for i { N e ( d ) , , N 1 } and j [ N K ] . Moreover, by the set of equations presented in E , X N , j 0 would mean some other X d i , j 0 for i [ N e ( d ) ] . Hence, any vector with X N , j 0 lies in some Z ( i , j ) for i [ N e ( d ) ] . Thus, all of the vectors in S lie in A ( d ) . Therefore α ( M CFL , d ) dim ( S ) N K N e ( d ) . From (4), we have κ ( M CFL , d ) N K N e ( d ) . Hence from (2), α ( M CFL , d ) = κ ( M CFL , d ) = N K N e ( d ) .  □

4. Optimal Linear Error Correcting Delivery Scheme for the CFL Prefetching Scheme

In this section we give expressions for the average rate and the worst case rate for a δ -error correcting delivery scheme for the CFL prefetching scheme. Also we propose a δ -error correcting delivery scheme for this case. From Theorem 1 and Theorem 2, we can conclude that for all the generalized index coding problems I ( M CFL , d ) induced from the CFL prefetching scheme,
α ( M CFL , d ) = κ ( M CFL , d ) .
Hence, the α and κ bounds in (3) meet. Using this, the optimal linear error correcting delivery scheme can be constructed for the CFL prefetching scheme and hence the average rate can be calculated, as given in the following theorem.
Theorem 3.
For a coded caching problem with the CFL prefetching scheme for M = 1 / K ,
R ( M CFL , δ ) = E d N q [ κ ( M CFL , d ) , 2 δ + 1 ] n CFL ,
where n CFL is the number of subfiles into which each file is divided in the CFL scheme.
Proof. 
From (6) and (3), we can conclude that, for any generalized index coding problem induced from the coded caching problem with CFL prefetching, the α and κ bounds meet. Thus, the optimal linear error correcting delivery scheme would be the concatenation of the CFL delivery scheme with an optimal linear error correcting code. Thus, the optimal length for δ error corrections in those generalized index coding problems is N q [ κ ( M CFL , d ) , 2 δ + 1 ] and, hence, the statement of the theorem follows. □
Corollary 1.
For a coded caching problem with the CFL prefetching scheme for M = 1 / K ,
R worst ( M CFL , δ ) = N q [ κ { worst } ( M CFL , d ) , 2 δ + 1 ] n CFL ,
where the value of κ { worst } ( M CFL , d ) is obtained from (4) and (5) when N e ( d ) = N .
Proof. 
Worst case rate is required when the number of distinct demands is maximum. This happens when N e ( d ) = N .  □
Because the α and κ bounds become equal for I ( M CFL , d ) , the optimal linear error correcting coded caching delivery scheme here would be the concatenation of the CFL delivery scheme with optimal classical error correcting scheme which corrects δ errors. Decoding can be done by syndrome decoding for error correcting generalized index codes proposed in [24,27].
In the remaining part of this section, few examples of the optimal linear error correcting delivery scheme for coded caching problems with the CFL prefetching are given.
Example 3.
Consider the coded caching problem considered in Example 1 depicted in Figure 1. First consider that N e ( d ) = 3 and d = ( 1 , 2 , 3 ) . We have shown that, for this case, κ ( M CFL , d ) = 6 . The transmissions in the CFL scheme are T 1 : X 2 , 1 , T 2 : X 3 , 1 , T 3 : X 1 , 2 , T 4 : X 3 , 2 , T 5 : X 1 , 3 , and T 6 : X 2 , 3 . If δ = 1 transmission error needs to be corrected, then, from [37], we have N 2 [ 6 , 3 ] = 10 . A generator matrix that corresponds to [ 10 , 6 , 3 ] 2 code is
G = 1 0 0 0 0 0 1 1 0 0 0 1 0 0 0 0 1 0 1 0 0 0 1 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 1 0 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 1 0 0 1 1 .
The optimal linear single error correcting delivery scheme is the concatenation of the CFL delivery scheme with the above code. Thus, single error correcting delivery scheme involves 10 transmissions. In addition to T 1 , , T 6 the following transmissions are required.
T 7 : X 2 , 1 X 3 , 1 X 1 , 2 , T 8 : X 2 , 1 X 3 , 2 X 1 , 3 , T 9 : X 3 , 1 X 3 , 2 X 2 , 3 a n d T 10 : X 1 , 2 X 1 , 3 X 2 , 3 .
Now, consider N e ( d ) = 2 and d = ( 1 , 2 , 1 ) . For this case also, κ ( M CFL , d ) = 6 . The transmissions in the CFL scheme are T 1 : X 1 , 1 , T 2 : X 1 , 2 , T 3 : X 1 , 3 , T 4 : X 2 , 1 , T 5 : X 2 , 2 and T 6 : X 2 , 3 . For single error correction, the concatenation is done with the same [ 10 , 6 , 3 ] 2 code. Considering the same generator matrix as before, the additional transmissions in the error correcting delivery scheme are
T 7 : X 1 , 1 X 1 , 2 X 1 , 3 , T 8 : X 1 , 1 X 2 , 1 X 2 , 2 , T 9 : X 1 , 2 X 2 , 1 X 2 , 3 a n d T 10 : X 1 , 3 X 2 , 2 X 2 , 3 .
Finally, consider N e ( d ) = 1 and d = ( 1 , 1 , 1 ) . For this case, κ ( M CFL , d ) = 3 . The CFL transmission scheme involves the following three transmissions T 1 : X 1 , 1 , T 2 : X 1 , 2 , and T 3 : X 1 , 3 . For single error correction, we have from [37] that N 2 [ 3 , 3 ] = 6 . A generator matrix for the [ 6 , 3 , 3 ] 2 code is
G = 1 0 0 1 1 0 0 1 0 1 0 1 0 0 1 0 1 1 .
Thus, the optimal linear single error correcting delivery scheme is the concatenation of the CFL delivery scheme with the above code. The additional transmissions required apart from T 1 , T 2 and T 3 are
T 4 : X 1 , 1 X 1 , 2 , T 5 : X 1 , 1 X 1 , 3 a n d T 6 : X 1 , 2 X 1 , 3 .
Decoding is done by syndrome decoding for generalized index codes [24,27].
Example 4.
Consider the coded caching problem considered in Example 2 depicted in Figure 2. Consider that N e ( d ) = 3 and d = ( 1 , 2 , 3 , 1 ) . We have shown that for this case κ ( M CFL , d ) = 27 . The transmissions in the CFL scheme are T 1 : X 2 , 1 , T 2 : X 3 , 1 , T 3 : X 2 , 2 , T 4 : X 3 , 2 , T 5 : X 2 , 3 , T 6 : X 3 , 3 , T 7 : X 1 , 4 , T 8 : X 3 , 4 , T 9 : X 1 , 5 , T 10 : X 3 , 5 , T 11 : X 1 , 6 , T 12 : X 3 , 6 , T 13 : X 1 , 7 , T 14 : X 2 , 7 , T 15 : X 1 , 8 , T 16 : X 2 , 8 , T 17 : X 1 , 9 , T 18 : X 2 , 9 , T 19 : X 2 , 10 , T 20 : X 3 , 10 , T 21 : X 2 , 11 , T 22 : X 3 , 11 , T 23 : X 2 , 12 , T 24 : X 3 , 12 , T 25 : X 1 , 1 X 1 , 10 , T 26 : X 1 , 2 X 1 , 11 , and T 27 : X 1 , 3 X 1 , 12 . If δ = 1 transmission error needs to be corrected, then from [37], we have N 2 [ 27 , 3 ] = 42 . The optimal linear single error correcting delivery scheme involves concatenation of CFL delivery scheme with a generator matrix that corresponds to the [ 42 , 27 , 3 ] 2 code.

5. Optimal Linear Error Correcting Scheme for M = 1 / K with Reduced Sub-Packetization

In this section, we consider the scheme presented in [4], which we call the JV scheme for M = 1 / K and discuss the error correction. For the case N = K , the JV scheme is exactly same as the CFL scheme. For K > N , the JV scheme has an advantage in terms of sub-packetization. The JV scheme splits each file into K subfiles where as CFL scheme required N K subfiles. Here, we find a closed form expression for the generalized independence number α ( M JV , d ) of the index coding problem I ( M JV , d ) . For all of the index coding problems that correspond to all possible demands, we show that the generalized independence number is equal to the min-rank. Hence in this case also, α and κ bounds meet and the optimal error correcting delivery scheme is obtained by concatenation scheme.
The expression for min-rank for this scheme can be obtained from the achievable rate expressions in [3,4], as
κ ( M JV , d ) K N e ( d ) if N e ( d ) N 1 N ( K 1 ) if N e ( d ) = N .
The calculation of generalized independence number and how it becomes equal to the min-rank are illustrated in the following example.
Example 5.
Consider a coded caching problem with N = 3 , K = 6 and M = 1 / 6 . According to the JV scheme, each file is split into K = 6 subfiles as: X i = ( X i , 1 , X i , 2 , X i , 3 , X i , 4 , X i , 5 , X i , 6 ) for i { 1 , 2 , 3 } . Let X be the vector obtained by concatenation of X 1 , X 2 and X 3 , given by X = ( X 1 , 1 , , X 1 , 6 , X 2 , 1 , , X 2 , 6 , X 3 , 1 , , X 3 , 6 ) . The cache contents of user i is Y i = X 1 , i X 2 , i X 3 , i for i { 1 , 2 , , 6 } . For a given demand d , this problem becomes a generalized index coding problem I ( M JV , d ) , having 18 messages and 36 receivers.
First consider that N e ( d ) = N = 3 and let d = ( 1 , 2 , 3 , 1 , 2 , 3 ) . Consider the equations e i : X 1 , i X 2 , i X 3 , i = 0 for i { 1 , 2 , , 6 } . Out of these, consider the first three equations e 1 , e 2 and e 3 . Let S be the subspace of F q 18 consisting of vectors which satisfy these three equations. Subsequently, from the rank-nullity theorem, we have dim( S ) 18 3 = 15 . For this case, (1) can be rewritten as Z ( i , j ) { z F q 18 : e i , X d i , j 0 } for i , j [ 6 ] . Let A ( d ) = i [ 6 ] , j [ 6 ] Z ( i , j ) { 0 } . The generalized independence number is the maximum among the dimensions of all the subspaces of F q 18 in A ( d ) . We claim that S is such a subspace. This would mean that α ( M JV , d ) dim ( S ) 15 . For this, we need to show that all of the vectors in S lie in A ( d ) . By the definition of A ( d ) , the all zero vector 0 lies in A ( d ) . Any other vector in S will have at least one non-zero coordinate. All of the vectors in S , having X d i , j 0 belongs to Z ( i , j ) . Because all files are demanded, all of the vectors in S lie in A ( d ) and α ( M JV , d ) 15 . From (7), we get κ ( M JV , d ) 3 ( 6 1 ) = 15 . Hence, by (2), we have α ( M JV , d ) = κ ( M JV , d ) = 15 .
Consider now that N e ( d ) = 2 and d = ( 1 , 2 , 1 , 2 , 1 , 2 ) . In this case, consider the six equations e 1 , e 2 , , e 6 . Let S be the subspace of F q 18 consisting of vectors which satisfy these equations. Hence from the rank-nullity theorem, we have dim ( S ) 18 6 = 12 . By definition, 0 lies in A ( d ) . Any non-zero vector in S with X d i , j 0 for i = 1 , 2 and j = 1 , 2 , , 6 lies in the corresponding Z ( i , j ) . Now, we have to consider the vectors that satisfy these equations and X 3 , j 0 for j = 1 , 2 , , 6 . From the equations e i , any X 3 , j 0 forces some X i , j 0 for i = 1 , 2 and, hence, such vectors also lie in A ( d ) . Thus, all of the vectors in S lie in A ( d ) . Therefore, α ( M JV , d ) dim ( S ) 12 . From (7), we get κ ( M JV , d ) 6 ( 2 ) = 12 . Hence, by (2), we have α ( M JV , d ) = κ ( M JV , d ) = 12 .
Finally, consider N e ( d ) = 1 and d = ( 1 , 1 , 1 , 1 , 1 , 1 ) . The files X 2 and X 3 are not demanded by any user. Here, we consider the equation e 1 , e 2 , , e 6 . In addition to this, consider the equations X 2 , 1 = 0 , X 2 , 2 = 0 , X 2 , 3 = 0 , X 2 , 4 = 0 , X 2 , 5 = 0 and X 2 , 6 = 0 . Thus, there are twelve equations in total. Let S be the subspace of F q 18 which satisfy these equations. By the rank-nullity theorem, the dimension of S is given by dim ( S ) 18 12 = 6 . The next step is to show that all of the vectors in S lie in A ( d ) . The all zero vector 0 lies in A ( d ) by definition. Any non-zero vector in S with X 1 , j 0 for j [ 6 ] lies in the corresponding Z ( 1 , j ) . From the set of twelve equations, X 3 , j 0 force some X 1 , j 0 for j [ 6 ] and, hence, such vectors also lie in A ( d ) . Thus, all of the vectors in S lie in A ( d ) . Therefore, α ( M JV , d ) dim ( S ) 6 . From (7), we get κ ( M JV , d ) 6 ( 1 ) = 6 . Hence, by (2), we have α ( M JV , d ) = κ ( M JV , d ) = 6 .
This can be generalized as in the theorem below.
Theorem 4.
For N < K and M = 1 / K ,
α ( M JV , d ) = κ ( M JV , d ) = K N e ( d ) i f N e ( d ) N 1 N ( K 1 ) i f N e ( d ) = N ,
d D , where N e ( d ) is the number of distinct demands.
Proof. 
For N < K and M = 1 / K , the JV prefetching scheme M JV is as follows. Each file is split into K subfiles X i = ( X i , 1 , X i , 2 , , X i , K ) . The cache content of user i is given as Y i = X 1 , i X 2 , i X N , i . Let X = ( X 1 , 1 , , X 1 , K , X 2 , 1 , , X 2 , K , X 3 , 1 , X N , 1 , , X N , K ) be the vector obtained by the concatenation of vectors X i , i [ N ] . For a given demand d , this problem becomes a generalized index coding problem I ( M JV , d ) with N K messages and K 2 receivers.
First, consider that all of the demands are distinct, i.e., N e ( d ) = N . Without a loss of generality, we can assume that the first N users demand distinct files, such that X d i = X i for i = 1 , 2 , , N . Thus d = ( d 1 , d 2 , , d K ) , such that d i = i for i , j [ N ] . Consider the set of equations e i : X 1 , i X 2 , i X N , i = 0 for i [ K ] . Out of these equations, consider a subset of N equations e i for i [ N ] . Let S be the subspace of F q N K consisting of vectors satisfying these equations. From the rank-nullity theorem, we have dim ( S ) N K N = N ( K 1 ) .
For I ( M JV , d ) , (1) can be rewritten as Z ( i , j ) { z F q N K : e i for i [ N ] , X d i , j 0 } for i , j [ K ] . Let A ( d ) = i [ K ] , j [ K ] Z ( i , j ) { 0 } . The generalized independence number is the maximum among the dimensions of all the subspaces of F q N K in A ( d ) . We show that S is such a subspace. For this, we need to show that all the vectors of S lie in A ( d ) . By the definition of A ( d ) , the all zero vector 0 lies in A ( d ) . The vectors that belong to S having X d i , j 0 belong to the set Z ( i , j ) . Thus, all of the vectors in S lie in A ( d ) and α ( M JV , d ) N ( K 1 ) . From (7), we get κ ( M JV ) N ( K 1 ) . Hence, by (2), we have α ( M JV , d ) = κ ( M JV , d ) = N ( K 1 ) .
Consider the case where N e ( d ) N 1 . Let the first N e ( d ) demands be distinct and without loss of generality assume that the ith user demands X i for i [ N e ( d ) ] . Thus, the indices of the files that are not demanded are N e ( d ) + 1 , , N . There are U = N N e ( d ) files that are not demanded. In addition to the K equations e i , consider the following equations X i , j = 0 , for i { N e ( d ) + 1 , , N 1 } and j [ K ] . Thus, the number of these equations is K + K ( U 1 ) = K U = K ( N N e ( d ) ) . Let S be the subspace of F q N K which consists of the vectors satisfying these equations. By the rank-nullity theorem, dim ( S ) N K K ( N N e ( d ) ) = K N e ( d ) . By definition, 0 lies in A ( d ) . Any vector in S with the coordinate X i , j 0 for i [ N e ( d ) ] lies in Z ( i , j ) . The set of equations force all X i , j = 0 for i { N e ( d ) , , N 1 } and j [ K ] . Moreover by the same set of equations, X N , j 0 would mean some other X i , j 0 for i [ N e ( d ) ] . Hence any vector with X N , j 0 lies in some Z ( i , j ) for i [ N e ( d ) ] . Thus all the vectors in S lie in A ( d ) . Therefore, α ( M JV , d ) dim ( S ) K N e ( d ) . From (7), we have κ ( M JV , d ) K N e ( d ) . Hence, from (2), α ( M JV , d ) = κ ( M JV , d ) = N K N e ( d ) .  □
Because, for this scheme, also, α and κ bounds meet, the optimal coded caching delivery scheme here would be the concatenation of the JV delivery scheme with optimal classical error correcting scheme that corrects δ errors. Decoding can be done by syndrome decoding for error correcting generalized index codes proposed in [24,27]. This is illustrated while using an example below.
Example 6.
Consider the coded caching problem considered in Example 5. Consider that N e ( d ) = 3 and d = ( 1 , 2 , 3 , 1 , 2 , 3 ) . We have shown that for this case κ ( M JV , d ) = 15 . The transmissions in the JV scheme are T 1 : X 1 , 2 , T 2 : X 1 , 3 , T 3 : X 1 , 5 , T 4 : X 1 , 6 , T 5 : X 1 , 4 X 1 , 1 , T 6 : X 2 , 1 , T 7 : X 2 , 3 , T 8 : X 2 , 4 , T 9 : X 2 , 6 , T 10 : X 2 , 5 X 2 , 2 , T 11 : X 3 , 1 , T 12 : X 3 , 2 , T 13 : X 3 , 4 , T 14 : X 3 , 5 , T 15 : X 3 , 6 X 3 , 3 . If δ = 1 transmission error needs to be corrected, then from [37], we have N 2 [ 15 , 3 ] = 20 . The optimal linear single error correcting delivery scheme involves a concatenation of JV delivery scheme with a generator matrix that corresponds to the [ 20 , 15 , 3 ] 2 code.

6. Conclusions

In this work, we obtained the minimum number of transmissions required for a linear δ -error correcting delivery scheme for coded caching problems with the CFL prefetching scheme. We proposed an optimal linear error correcting delivery scheme for the above case. We also found closed form expressions for the average rate and the peak rate for these problems. We considered the JV scheme, which uses low sub-packetization as compared to CFL scheme and proved that for this scheme also concatenation of JV delivery scheme with optimal error correcting code is optimal.

Author Contributions

Conceptualization, N.S.K., A.T. and B.S.R.; writing—original draft preparation, N.S.K. and A.T.; writing—review and editing, N.S.K., A.T. and B.S.R.; supervision, B.S.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Science and Engineering Research Board (SERB) of Department of Science and Technology (DST), Government of India, through J. C. Bose National Fellowship to B. Sundar Rajan.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Maddah-Ali, M.A.; Niesen, U. Fundamental limits of caching. IEEE Trans. Inf. Theory 2014, 60, 2856–2867. [Google Scholar] [CrossRef] [Green Version]
  2. Yu, Q.; Maddah-Ali, M.A.; Avestimehr, A.S. The exact rate-memory tradeoff for caching with uncoded prefetching. IEEE Trans. Inf. Theory 2018, 64, 1281–1296. [Google Scholar] [CrossRef]
  3. Chen, Z.; Fan, P.; Letaief, K.B. Fundamental limits of caching: Improved bounds for users with small buffers. IET Commun. 2016, 10, 2315–2318. [Google Scholar] [CrossRef]
  4. Gomez-Vilardebo, J. Fundamental limits of caching: Improved rate-memory tradeoff with coded prefetching. IEEE Trans. Commun. 2018, 66, 4488–4497. [Google Scholar]
  5. Amiri, M.M.; Gündüz, D. Fundamental limits of coded caching: Improved delivery rate-cache capacity tradeoff. IEEE Trans. Commun. 2017, 65, 806–815. [Google Scholar] [CrossRef] [Green Version]
  6. Tian, C.; Chen, J. Caching and delivery via interference elimination. IEEE Trans. Inf. Theory 2018, 64, 1548–1560. [Google Scholar] [CrossRef]
  7. Zhang, K.; Tian, C. Fundamental limits of coded caching: From uncoded prefetching to coded prefetching. IEEE J. Sel. Areas Commun. 2018, 36, 1153–1164. [Google Scholar] [CrossRef]
  8. Maddah-Ali, M.A.; Niesen, U. Decentralized coded caching attains order-optimal memory-rate tradeoff. IEEE/ACM Trans. Netw. 2015, 23, 1029–1040. [Google Scholar] [CrossRef] [Green Version]
  9. Niesen, U.; Maddah-Ali, M.A. Coded caching with nonuniform demands. IEEE Trans. Inf. Theory 2017, 63, 1146–1158. [Google Scholar] [CrossRef]
  10. Pedarsani, R.; Maddah-Ali, M.A.; Niesen, U. Online coded caching. IEEE/ACM Trans. Netw. 2016, 24, 836–845. [Google Scholar] [CrossRef]
  11. Karamchandani, N.; Niesen, U.; Maddah-Ali, M.A.; Diggavi, S.N. Hierarchical coded caching. IEEE Trans. Inf. Theory 2016, 62, 3212–3229. [Google Scholar] [CrossRef]
  12. Ji, M.; Caire, G.; Molisch, A.F. Fundamental limits of caching in wireless D2D networks. IEEE Trans. Inf. Theory 2016, 62, 849–869. [Google Scholar] [CrossRef] [Green Version]
  13. Chen, J.; Lee, V.C.S.; Liu, K.; Li, J. Efficient cache management for network-coding-assisted data broadcast. IEEE Trans. Veh. Technol. 2017, 66, 3361–3375. [Google Scholar] [CrossRef]
  14. Kiskani, M.K.; Sadjadpour, H.R. A secure approach for caching contents in wireless ad hoc networks. IEEE Trans. Veh. Technol. 2017, 66, 10249–10258. [Google Scholar] [CrossRef]
  15. Karat, N.S.; Thomas, A.; Rajan, B.S. Optimal error correcting delivery scheme for coded caching with symmetric batch prefetching. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018. [Google Scholar]
  16. Bidokhti, S.S.; Wigger, M.; Timo, R. Noisy broadcast networks with receiver caching. IEEE Trans. Inf. Theory 2018, 64, 6996–7016. [Google Scholar] [CrossRef] [Green Version]
  17. Timo, R.; Wigger, M. Joint cache-channel coding over erasure broadcast channels. In Proceedings of the IEEE International Symposium on Wireless Communications Systems (ISWCS), Bruxelles, Belgium, 25–28 August 2015. [Google Scholar]
  18. Bidokhti, S.S.; Wigger, M.; Timo, R. Erasure broadcast networks with receiver caching. In Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016. [Google Scholar]
  19. Bidokhti, S.S.; Wigger, M.; Timo, R. An upper bound on the capacity-memory tradeoff of degraded broadcast channels. In Proceedings of the International Symposium on Turbo Codes and Iterative Information Processing, Brest, France, 5–9 September 2016. [Google Scholar]
  20. Karat, N.S.; Thomas, A.; Rajan, B.S. Optimal error correcting delivery scheme for an optimal coded caching scheme with small buffers. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018. [Google Scholar]
  21. Karat, N.S.; Thomas, A.; Rajan, B.S. Error correction in coded caching with symmetric batch prefetching. IEEE Trans. Commun. 2019, 67, 5264–5274. [Google Scholar] [CrossRef]
  22. Birk, Y.; Kol, T. Coding-on-demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients. IEEE Trans. Inf. Theory 2006, 52, 2825–2830. [Google Scholar] [CrossRef]
  23. Dai, M.; Shum, K.W.; Sung, C.W. Data dissemination with side information and feedback. IEEE Trans. Wirel. Commun. 2014, 13, 4708–4720. [Google Scholar] [CrossRef]
  24. Byrne, E.; Calderini, M. Error correction for index coding with coded side information. IEEE Trans. Inf. Theory 2017, 63, 3712–3728. [Google Scholar] [CrossRef] [Green Version]
  25. Shum, K.W.; Dai, M.; Sung, C.W. Broadcasting with coded side information. In Proceedings of the 2012 IEEE 23rd International Symposium Personal Indoor and Mobile Radio Communications (PIMRC), Sydney, NSW, Australia, 9–12 September 2012. [Google Scholar]
  26. Karat, N.S.; Samuel, S.; Rajan, B.S. Optimal error correcting index codes for some generalized index coding problems. IEEE Trans. Commun. 2019, 67, 929–942. [Google Scholar] [CrossRef]
  27. Dau, S.H.; Skachek, V.; Chee, Y.M. Error correction for index coding with side information. IEEE Trans. Inf. Theory 2013, 59, 1517–1531. [Google Scholar] [CrossRef] [Green Version]
  28. Samuel, S.; Rajan, B.S. Optimal linear error-correcting index codes for single-prior index-coding with side information. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017. [Google Scholar]
  29. Karat, N.S.; Rajan, B.S. Optimal linear error correcting index codes for some index coding problems. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017. [Google Scholar]
  30. Samuel, S.; Karat, N.S.; Rajan, B.S. Optimal linear error correcting index codes for some generalized index-coding problems. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017. [Google Scholar]
  31. Reddy, K.S.; Karamchandani, N. On the exact rate-memory trade-off for multi-acess coded caching with uncoded placement. In Proceedings of the International Conference on Signal processing and Communications (SPCOM), Bangalore, India, 16–19 July 2018. [Google Scholar]
  32. Parrinello, E.; Unsal, A.; Elia, P. Fundamental limits of coded caching with multiple antennas, shared caches and uncoded prefetching. IEEE Trans. Inf. Theory 2020, 66, 2252–2268. [Google Scholar] [CrossRef]
  33. Ji, M.; Tulino, A.M.; Llorca, J.; Caire, G. Caching and coded multicasting: Multiple groupcast index coding. In Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Atlanta, GA, USA, 3–5 December 2014. [Google Scholar]
  34. Wan, K.; Tuninetti, D.; Piantanida, P. A novel index coding scheme and its application to coded caching. In Proceedings of the 2017 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 12–17 February 2017. [Google Scholar]
  35. Kiskani, M.K.; Sadjadpour, H.R. Multihop caching-aided coded multicasting for the next generation of cellular networks. IEEE Trans. Veh. Technol. 2017, 66, 2576–2585. [Google Scholar] [CrossRef]
  36. Zhang, L.; Wang, Z.; Xiao, M.; Wu, G.; Liang, Y.; Li, S. Decentralized caching schemes and performance limits in two-layer networks. IEEE Trans. Veh. Technol. 2018, 67, 12177–12192. [Google Scholar] [CrossRef] [Green Version]
  37. Grassl, M. Bounds on the Minimum Distance of Linear Codes and Quantum Codes. Available online: http://www.codetables.de (accessed on 11 July 2020).
Figure 1. Coded Caching problem with N = K = 3 , M = 1 / 3 and the hen Fan Letaief (CFL) placement.
Figure 1. Coded Caching problem with N = K = 3 , M = 1 / 3 and the hen Fan Letaief (CFL) placement.
Entropy 22 00766 g001
Figure 2. Coded Caching problem with N = 3 , K = 4 , M = 1 / 4 and CFL placement.
Figure 2. Coded Caching problem with N = 3 , K = 4 , M = 1 / 4 and CFL placement.
Entropy 22 00766 g002
Table 1. Generalized independence number and min-rank of I ( M CFL , d ) for different d in Example 1.
Table 1. Generalized independence number and min-rank of I ( M CFL , d ) for different d in Example 1.
d α ( M CFL , d ) κ ( M CFL , d ) d α ( M CFL , d ) κ ( M CFL , d ) d α ( M CFL , d ) κ ( M CFL , d )
( 1 , 2 , 3 ) 66 ( 1 , 3 , 3 ) 66 ( 2 , 2 , 3 ) 66
( 1 , 3 , 2 ) 66 ( 3 , 1 , 3 ) 66 ( 2 , 3 , 2 ) 66
( 2 , 1 , 3 ) 66 ( 3 , 3 , 1 ) 66 ( 3 , 2 , 2 ) 66
( 2 , 3 , 1 ) 66 ( 1 , 1 , 2 ) 66 ( 2 , 3 , 3 ) 66
( 3 , 1 , 2 ) 66 ( 1 , 2 , 1 ) 66 ( 3 , 2 , 3 ) 66
( 3 , 2 , 1 ) 66 ( 2 , 1 , 1 ) 66 ( 3 , 3 , 2 ) 66
( 1 , 2 , 2 ) 66 ( 1 , 1 , 3 ) 66 ( 1 , 1 , 1 ) 33
( 2 , 1 , 2 ) 66 ( 1 , 3 , 1 ) 66 ( 2 , 2 , 2 ) 33
( 2 , 2 , 1 ) 66 ( 3 , 1 , 1 ) 66 ( 3 , 3 , 3 ) 33

Share and Cite

MDPI and ACS Style

Sageer Karat, N.; Thomas, A.; Sundar Rajan, B. Optimal Linear Error Correcting Delivery Schemes for Two Optimal Coded Caching Schemes. Entropy 2020, 22, 766. https://doi.org/10.3390/e22070766

AMA Style

Sageer Karat N, Thomas A, Sundar Rajan B. Optimal Linear Error Correcting Delivery Schemes for Two Optimal Coded Caching Schemes. Entropy. 2020; 22(7):766. https://doi.org/10.3390/e22070766

Chicago/Turabian Style

Sageer Karat, Nujoom, Anoop Thomas, and Balaji Sundar Rajan. 2020. "Optimal Linear Error Correcting Delivery Schemes for Two Optimal Coded Caching Schemes" Entropy 22, no. 7: 766. https://doi.org/10.3390/e22070766

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop