Construction of Coded Caching Scheme Based on Vector Space over Finite Field

Xuemei Liu1, Mengli Zhang1
1College of Science, Civil Aviation University of China, Tianjin 300300, China

Abstract

Coded caching technology can better alleviate network traffic congestion. Since many of the centralized coded caching schemes now in use have high subpacketization, which makes scheme implementation more challenging, coded caching schemes with low subpacketization offer a wider range of practical applications. It has been demonstrated that the coded caching scheme can be achieved by creating a combinatorial structure named placement delivery array (PDA). In this work, we employ vector space over a finite field to obtain a class of PDA, calculate its parameters, and consequently achieve a coded caching scheme with low subpacketization. Subsequently, we acquire a new MN scheme and compare it with the new scheme developed in this study. The subpacketization \(F\) of the new scheme has significant advantages. Lastly, the number of users \(K\), cache fraction \(\frac{M}{N}\), and subpacketization \(F\) have advantages to some extent at the expense of partial transmission rate \(R\) when compared to the coded caching scheme in other articles.

Keywords: Coded caching scheme, Placement delivery array, Subpacketization, Vector space over finite field

1. Introduction

As mobile networks continue to develop, the rapid growth in users and their rising need for video content has a compounding effect on data traffic during peak hours [1], which causes network congestion. Simultaneously, caching serves as an effective tool to alleviate traffic congestion. Caching technology consists of two phases: placement and delivery [2]. During the placement phase, users cache a part of contents from the server. In the delivery phase, upon receiving all user’s requests, the server transmits signals enabling users to retrieve requested files using these signals along with cached contents.

Previous research concentrated on either content placement or delivery design. In [2], Maddah-Ali and Niesen first proposed the need for the joint design of placement and delivery phases in a caching system. Compared to conventional uncoded caching schemes, significant gains can be obtained by coding in the delivery phase. There are several recent works on coded caching schemes [3-10].

Yan et al. [11] proposed a new structure to characterize the caching system, i.e., Placement Delivery Array(PDA). Based on a PDA of size \(F\times K\), the caching scheme can support \(K\) users by dividing each file into \(F\) equal packets. This work uses PDA structures to identify coded caching schemes. Yan et al. [12] proved PDA is equivalent to the set of color classes of an \(S\)\(strong\)\(edge\)\(coloring\) of a bipartite graph and through ideas of coloring construct two types of PDA. A caching scheme based on grouping users, through sacrificing part of the transmission rate, attained lower subpacketization than the MN scheme [13]. In [14], Shang-guan, Zhang, and Ge discerned an important connection between PDAs and 3-uniform, 3-partite hypergraphs with the \((6,3)\)-free property as well as constructed PDAs for which \(F\) increases subexponentially with \(K\). In [3], constructing two new coded caching schemes, using the bipartite graph framework and utilizing some basic ideas from the projective geometries over finite fields. It is worth noting that all current deterministic centralized coding caching schemes can be represented as PDAs.

1.1. Contributions

In this paper, we construct a PDA via vector space over finite field, then we obtain a new coded caching scheme with low subpacketization. Through asymptotic analysis, we find that the subpacketization in our new scheme increases sub-exponentially with the growth in the number of users. Via numerical comparisons, it is evident that our new scheme has advantages on the number of users \(K\) and subpacketization \(F\).

1.2. Notations

\(\bullet\) Calligraphic capital letters are used to represent sets, such as \(\cal A\).

\(\bullet\) For a positive integer \(a\), the set \(\{0, 1,\dots, a-1\}\) is denoted as \([0,a)\).

\(\bullet\) Binomial coefficients are denoted by \(\binom{n}{k}\) where \(\binom{n}{k}=\frac{n!}{k!(n-k)!}\), and \(\binom{n}{k}=0\) for \(n<k\).

2. System Model

2.1. System Model

Let us consider a caching system as illustrated in figure 1. The caching system consisting of one server containing \(N\) files \(\cal W\) = \(\{W_i:i\in[0,N)\}\) and \(K\) users \(\cal K\)=\([0,K)\). The server is connected to the users through a shared error-free link. The files in \(\cal W\) are of equal size, we assume each file is of unit size. Additionally, each user has a cache of size \(M\) units.

An \(F\)\((K, M, N)\) coded caching scheme operates in two phases [2]:

1) Placement Phase: A file is subdivided into \(F\) equal packets (we will often refer to \(F\) as the subpacketization), i.e., \(W_i\) = \(\{W_{i,j}:j\in [0,F)\}\), and denote \(\cal F\)=\([0,F)\). Each packet is of size \(1/F\). Each user is accessible to the files set \(\cal W\). Each packet is placed in different user caches determinately. Denote \(Z_k\) to represent the cache contents of user \(k\).

2) Delivery Phase: Each user independently requests a file from \(\cal W\) at random, the request is denoted by \(d=(d_0,d_1,\dots,d_{K-1})\), i.e., user \(k\) requests file \(W_{d_k}\), where \(k\in \cal K\), \(d_k\in [0, N)\). Once the server receives the request \(d\), it broadcasts a signal to users. Each user can attain its requested file from the signal received in the delivery phase with the help of the contents within its cache.

2.2. Placement Delivery Arrays

In this subsection, we quickly review PDAs and see the correspondence between PDA and coded caching scheme.

Definition 1. [11] For positive integers \(K, F, Z\) and \(S\), an \(F\times K\) array \(P=(p_{j,k}),j\in [0, F),k\in [0, K)\), composed of a specific symbol \(“*"\) and \(S\) nonnegative integers, namely \(0,1,\dots, S-1\), is called a \((K, F, Z, S)\) placement delivery array (PDA) if it satisfies the following conditions:

C1. The symbol \(“*"\) appers \(Z\) times in each column;

C2. Each integer occurs at least once in the array;

C3. For any two distinct entries \(p_{{j_1},{k_1}}\) and \(p_{{j_2},{k_2}}\), \(p_{{j_1},{k_1}}=p_{{j_2},{k_2}}=s\) is an integer only if

a. \({j_1}\neq {j_2},{k_1}\neq {k_2}\), i.e., they lie in distinct rows and distinct columns;

b. \(p_{{j_1},{k_2}}=p_{{j_2},{k_1}}=*\), i.e., the corresponding \(2\times 2\) sub-array formed by rows \(j_1,j_2\) and columns

\(k_1,k_2\) must be of the following form \[\begin{pmatrix} s & * \\ * & s \end{pmatrix}\ or\ \begin{pmatrix} * & s \\ s & * \end{pmatrix}.\]

Placement Phase: After the server separates each file, each user has access to the set of files \(\cal W\), and the packets cached by user \(k\in \cal K\) are recorded as \[Z_k = \{W_{i,j}|p_{j,k}=*,i\in [0, N)\},\] clearly, each user’s cache of size \(M=Z\cdot\frac{1}{F}\cdot N\).

Delivery Phase: When the server receives the request \(d\), at the moment \(s\in S\), the server sends the following signal \[\bigoplus _{p_{j,k}=s,j\in {\cal F},k\in {\cal K}}W_{d_k,j},\] in a \((K,F,Z,S)\)-PDA P=\((p_{j,k}),j\in [0,F),k\in [0,K)\), each column represents a user, if \(p_{j,k}=*\), i.e., user \(k\) has cached the \(j\)\(th\) packet of all the files. For user \(k\), if \(p_{j,k}=s\), then user \(k\) does not cache the \(j\)\(th\) packet of \(W_{d_k}\), but in the moment \(s\), the signal sent by server are all in the user’s cache except \(W_{d_k,j}\), so the user \(k\) can get the requested packet.

Example 1. Given a (3,3,1,3) PDA corresponding to a (3,1,3) coded caching scheme. \[P=\left( \begin{array}{ccc} 0 & 2 & *\\ 1 & * & 2\\ * & 1 & 0 \end{array} \right). \nonumber\]

In the placement phase: We have \(W_0 = \{W_{0,0},W_{0,1},W_{0,2}\}\), \(W_1 = \{W_{1,0},W_{1,1},W_{1,2}\}\), \(W_2 = \{W_{2,0},W_{2,1},W_{2,2}\}\), and \(Z_0=\{W_{0,2},W_{1,2},W_{2,2}\}\), \(Z_1=\{W_{0,1},W_{1,1},W_{2,1}\}\), \(Z_2=\{W_{0,0},W_{1,0},W_{2,0}\}\).

In the delivery phase: Assume that the request vector is \(d=(0,1,2)\), and the server sends the following coded signals: \(W_{0,0}\bigoplus W_{2,2}, W_{0,1}\bigoplus W_{1,2}, W_{1,0}\bigoplus W_{2,1}\). User 0 needs file \(W_0\) and solves \(W_{0,0}\) and \(W_{0,1}\) through \(W_{0,0}\bigoplus W_{2,2}\) and \(W_{0,1}\bigoplus W_{1,2}\). User 1 needs file \(W_1\) and solves \(W_{1,2}\) and \(W_{1,0}\) through \(W_{0,1}\bigoplus W_{1,2}\) and \(W_{1,0}\bigoplus W_{2,1}\). User 2 requires file \(W_2\) and solves \(W_{2,2}\) and \(W_{2,1}\) through \(W_{0,0}\bigoplus W_{2,2}\) and \(W_{1,0}\bigoplus W_{2,1}\).

Lemma 1. [11] In an \(F\)\((K,M,N)\) coded caching scheme, by a \((K, F,Z,S)\)-PDA, using Algorithm 1, with the cache fraction \(\frac{M}{N}\)=\(\frac{Z}{F}\) and transmission rate \(R\)=\(\frac{S}{F}\).

Algorithm 1 Table
Algorithm 1 Coded Caching scheme based on PDA on [2]
1: procedure PLACEMENT(P,\(W\))
2: Split each file \(W_i \in \)\(W\) into \(F\) packets: \(W_i=\{W_{i,j} : j \in [0,F)\}\)
3: for \(k \in [0,K)\) do
4: \(Z_k \gets \{W_{i,j} \mid p_{j,k}=*,i \in [0,N)\}\)
5: end for
6: end procedure
7: procedure DELIVERY(P,\(W\),d)
8: for \(;s=0,1,\dots,S-1\); do
9: Server sends \(\bigoplus _{p_{j,k}=s,j \in {\cal F},k \in {\cal K}}W_{d_k,j}\);
10: end for
11: end procedure

3. Construction Based on Vector Spaces over Finite Fields

3.1. Review of the Vector Spaces [15]

Let \(\mathbb F_q\) be the finite field with \(q\) elements, where \(q\) is a prime power, and \(n\) is a positive integer, we use \[\mathbb F_q^n=\{(x_1,x_2,\dots,x_n)|x_i\in \mathbb F_q,i=1,2,\dots,n\}\] to denote the \(n\)-dim row vector space over \(\mathbb{F}_{q}\) formed by the set of all \(n\)-dim row vectors. Clearly, \(\mathbb F_q^n\) has altogether \(q^n\) vectors.

Assume \(P\) be an \(m\)-dimensional vector subspace of \(\mathbb{F}_{q}^{n}\), we use the same letter \(P\) to denote a matrix representation of the vector subspace \(P\), i.e., \(P\) is an \(m\times n\) matrix of rank \(m\) whose rows form a basis of \(P\).

Let \(0< m\leq n\), and \(q\) is a power of a prime, \(N(m,n)\) be the number of \(m\)-dim vector subspaces in \(\mathbb F_q^n\). It is known that \(N(m,n)\) is equal to the Gaussian coefficient \({\left[ \begin{array}{l}n\\m\end{array} \right]_q}\), \[{\left[ \begin{array}{l} n\\ m \end{array} \right]_q} = \frac{{\prod\limits_{i = n – m + 1}^n {\left( {{q^{i}} – 1} \right)}} } {{\prod\limits_{i = 1}^m {\left( {{q^i} – 1} \right)} }},\] by convention \({\left[ \begin{array}{l}n\\0\end{array} \right]_q}=1\) for all integer \(n\).

The following known results are used to serve our construction.

Lemma 2. Let \(0\leq k\leq m\leq n\) and \(N(k,m,n)\) be the number of \(k\)-dim vector subspaces contained in a given \(m\)-dim vector subspaces of \(\mathbb F_q^n\), then \[N(k,m,n)=N(k,m)={\left[ \begin{array}{l}m\\k\end{array} \right]_q}.\]

Lemma 3. Let \(0\leq k\leq m\leq n\). Then the number \(N'(k,m,n)\) of \(m\)-dim vector subspaces containing a given \(k\)-dim vector subspace of \(\mathbb F_q^n\) is equal to \({\left[ \begin{array}{l}n-k\\m-k\end{array} \right]_q}\).

Lemma 4. Consider a \(m\)-dim subspaces of \(\mathbb F_q^n\). Let \(1 \leq m < n\), then \[{\left[ \begin{array}{l}n\\m\end{array} \right]_q}={\left[ \begin{array}{l}\quad n\\n-m\end{array} \right]_q}.\]

3.2. Construction of the Coded Caching Scheme

Construct a type of PDA based on the knowledge of vector space, where the set of the \(v\)-dim subspace of the \(\mathbb{F}_{q}^n\) is \(\mathbb V\) and the set of the \((v+h)\)-dim subspace of the \(\mathbb{F}_{q}^n\) is \(\mathbb U\). Let \(\mathbb V= \cal K\) and \(\mathbb U=\cal F\), then an \(F \times K\) array P=\((p_{U,V}),U\in \mathbb U,V\in \mathbb V\) is obtained according to the following rules:

\[p_{U,V}=\begin{cases} H & H\bigoplus V=U,\\ * \quad &else.\end{cases}\]

Remark 1. Each row does not have the same non-\(*\) element in array P. On the one hand, the non-\(*\) elements in each row are \(h\)-dim subspace \(H\) and have the quantity \({{\left[ \begin{array}{l}v+h\\\quad h\end{array} \right]_q}}.\) On the other hand, given an \((v+h)\)-dim subspace \(U\), if the \(v\)-dim subspace \(V\) is contained in \(U\), then there is element \(H\), and the number of \(V\) is \({{\left[ \begin{array}{l}v+h\\\quad v\end{array} \right]_q}},\) i.e., \({{\left[ \begin{array}{l}v+h\\\quad h\end{array} \right]_q}}={{\left[ \begin{array}{l}v+h\\\quad v\end{array} \right]_q}}\). Clearly, Each column does not have the same non-\(*\) element in array P.

Example 2. Consider the 3-dim vector space over \(\mathbb F_2\) and the 1-dim subspace of \(\mathbb F_2^3\) which are listed as follows, \[V_1=span\{(1,0,0)\}, V_2=span\{(0,1,0)\}, V_3=span\{(0,0,1)\}, V_4=span\{(1,1,0)\},\] \(\quad\quad\;\;\;\;\;\; V_5=span\{(1,0,1)\}, V_6=span\{(0,1,1)\}, V_7=span\{(1,1,1)\}.\\\)

Let \(\mathbb V=\{V_1,V_2,V_3,V_4,V_5,V_6,V_7\}\). Consider the 2-dim subspace of \(\mathbb F_2^3\) which are listed as follows, \[U_1=span\{(1,0,0),(0,1,0),(1,1,0),(0,0,0)\}, U_2=span\{(1,0,0),(0,0,1),(1,0,1),(0,0,0)\},\] \[U_3=span\{(1,0,0),(0,1,1),(1,1,1),(0,0,0)\}, U_4=span\{(0,1,0),(0,0,1),(0,1,1),(0,0,0)\},\] \[U_5=span\{(0,1,0),(1,0,1),(1,1,1),(0,0,0)\}, U_6=span\{(0,0,1),(1,1,0),(1,1,1),(0,0,0)\},\] \(\quad\;\; U_7=span\{(1,1,0),(1,0,1),(0,1,1),(0,0,0)\}.\\\)

Let \(\mathbb U=\{U_1,U_2,U_3,U_4,U_5,U_6,U_7\}\). Use the elements in \(\mathbb U\) as row index and the elements in \(\mathbb V\) as column index, then the elements in the array are represented as 1-dim subspace. By construction, we can attain the following \(7\times 7\) array, actually, \(H_i=V_i, i\in\{1,2,3,4,5,6,7\}\). It is easily apparent that this refers to \((7,7,4,7)\)-PDA.

\(V_1\) \(V_2\) \(V_3\) \(V_4\) \(V_5\) \(V_6\) \(V_7\)
\(U_1\) \(H_2\) \(H_4\) \(*\) \(H_1\) \(*\) \(*\) \(*\)
\(U_2\) \(H_3\) \(*\) \(H_5\) \(*\) \(H_1\) \(*\) \(*\)
\(U_3\) \(H_6\) \(*\) \(*\) \(*\) \(*\) \(H_7\) \(H_1\)
\(U_4\) \(*\) \(H_3\) \(H_6\) \(*\) \(*\) \(H_2\) \(*\)
\(U_5\) \(*\) \(H_5\) \(*\) \(*\) \(H_7\) \(*\) \(H_2\)
\(U_6\) \(*\) \(*\) \(H_4\) \(H_7\) \(*\) \(*\) \(H_3\)
\(U_7\) \(*\) \(*\) \(*\) \(H_5\) \(H_6\) \(H_4\) \(*\)

Next, we will prove that the array constructed above satisfies the definition of PDA and give its parameters.

Lemma 5. The following relationships hold for the construction we have presented, \[{K=|\mathbb V|={\left[ \begin{array}{l} n\\ v \end{array} \right]_q},}\] \[{F=|\mathbb U|={\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q},}\] \[{Z={\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}- {\left[ \begin{array}{l} n-v\\ \quad h \end{array} \right]_q}},\] where \(Z\) is the number of elements \(“*"\) in each column of the array P.

Proof. By using the known ideas presented in this section we can write, \[{K=|\mathbb V|=N(v,n)={\left[ \begin{array}{l} n\\ v \end{array} \right]_q},}\] \[{F=|\mathbb U|=N(v+h,n)={\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}.}\]

Now, we will find the parameter \(Z\). Consider an arbitrary \(V\in \mathbb V\). By lemma 3, we know that the number of \((v+h)\)-dim subspaces of \(\mathbb F_q^n\) containing the fixed \(v\)-dim subspace \(V\) is \({{\left[ \begin{array}{l} n-v\\ \quad h \end{array} \right]_q}}.\) Therefore, we get \[{Z={\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}- {\left[ \begin{array}{l} n-v\\ \quad h \end{array} \right]_q}.}\] ◻

Lemma 6. There are \({\left[ \begin{array}{l} n\\ h \end{array} \right]_q}\) different non-\(*\) elements in array P.

Proof. If the \(h\)-dim subspace \(H\) of \(U\) appears in array P, \({\left[ \begin{array}{l} n-h\\ \quad v \end{array} \right]_q}\) times will occur. In fact, the number of occurrences of a subspace \(H\) is denoted \(L\): the number of \((v+h)\)-dim subspaces \(U\) containing \(h\)-dim subspaces, then \(L={\left[ \begin{array}{l} \quad n-h\\ (v+h)-h \end{array} \right]_q}={\left[ \begin{array}{l} n-h\\ \quad v \end{array} \right]_q}\) can be seen from the knowledge of vector space, then \[S=\frac {{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}{\left[ \begin{array}{l} n-h\\ \quad v \end{array} \right]_q}={\left[ \begin{array}{l} n\\ h \end{array} \right]_q}.\]

Let \(E\) be the set of \(h\)-dim subspaces, a bijection \(f\) is defined from \(E\) to \([0,S)\), where \(S={\left[ \begin{array}{l}n\\h\end{array} \right]_q}\). Then we can get the array \(\Gamma=(a_{U,V})\) \[a_{U,V}=\begin{cases}f(H)\quad &p_{U,V}=H,\\ \quad *\quad \quad &else.\end{cases}\] ◻

Lemma 7. In array \(\Gamma\), if \(a_{U_{i_1},V_{j_1}}=a_{U_{i_2},V_{j_2}}\)=\(s\in S\), \(U_{i_1}\neq U_{i_2}\), \(V_{j_1}\neq V_{j_2}\), then \(a_{U_{i_1},V_{j_2}}=a_{U_{i_2},V_{j_1}}\)=\(*\).

Proof. If \(a_{U_{i_1},V_{j_1}}=a_{U_{i_2},V_{j_2}}\)=\(H\), then \(V_{j_1}\subset U_{i_1},V_{j_2}\subset U_{i_2}\) and \(H\bigoplus V_{j_1}=U_{i_1},H\bigoplus V_{j_2}=U_{i_2}\). Assume that \(V_{j_1}\subset U_{i_2}=H\bigoplus V_{j_2}\), then \(H\bigoplus V_{j_1}=U_{i_1}\subset H\bigoplus V_{j_2}=U_{i_2}\), so we have \(U_{i_1}=U_{i_2}\), which is not true by the select of \(U_{i_1}\) and \(U_{i_2}\). Thus \(V_{j_1}\not\subset U_{i_2}\). Similarly, \(V_{j_2}\not\subset U_{i_1}\). This completes the proof. ◻

Theorem 1. For any positive integer \(n,v,h\) that satisfies \(v< n,h< n,v+h< n\), there exists
\(\bigg({\left[ \begin{array}{l} n\\ v \end{array} \right]_q},{\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q},{\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q-{\left[ \begin{array}{l} n-v\\ \quad h \end{array} \right]_q}},{\left[ \begin{array}{l} n\\ h \end{array} \right]_q}\bigg)\)-PDA, note P. An \({\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}\)\(\bigg({\left[ \begin{array}{l} n\\ v \end{array} \right]_q}, M, N\bigg)\) coded caching scheme can be implemented, where the cache fraction \(\frac {M}{N}\) and the transmission rate \(R\) are as follows: \[\frac {M}{N}=1-\frac {{\left[ \begin{array}{l} n-v\\ \quad h \end{array} \right]_q}}{{\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}}, R=\frac{{\left[ \begin{array}{l} n\\ h \end{array} \right]_q}}{{\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}}.\]

Proof. It can be seen from lemma 5, 6, and 7. ◻

4. Comparison

4.1. Asymptotic Analysis and Numerical Comparison of New Scheme With MN Scheme

For the coded caching scheme in Theorem 1, let \(t={\left[ \begin{array}{l} n\\ v \end{array} \right]_q}-{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}\), We can get an MN coded caching scheme, where the parameters are: \({K={\left[ \begin{array}{l} n\\ v \end{array} \right]_q},}\) \(\frac {M}{N}=1-\frac {{\left[ \begin{array}{l} n-v\\ \quad h \end{array} \right]_q}}{{\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}}.\)

$${F_{MN}} = \Bigg(\makecell {{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}\\{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}-{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}}\Bigg), \;R_{MN}=\frac{{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}}{1+{\left[ \begin{array}{l} n\\v \end{array} \right]_q}-{\left[ \begin{array}{l} v+h\\\quad v \end{array} \right]_q}}.$$

We know that for the MN scheme, when \(\frac{M}{N}\) is a fixed constant, there are \(F=O(2^K)\) and the rate \(R=O(1)\). In our scheme, we keep the rate upper bounded by a constant, i.e., \(R=O(1)\), then our scheme has subexponential subpacketization, i.e., \(F=q^{O((log_q^K)^2)}\). The analysis proceeds as follows. In the first place, we have \[R={\frac{{\prod\limits_{i = h+ 1}^{h+v} {\left( {{q^i} – 1} \right)}} } {{\prod\limits_{i =n-v-h+1}^{n-h} {\left( {{q^i} – 1} \right)} }}}\leq q^{v(2h-n+v+1)},\] we can assume \(v\) and \(2h-n\) as constants, and we know, \[q^{v(n-v)} \leq K={\left[ \begin{array}{l} n\\ v \end{array} \right]_q}\leq q^{v(n-v+1)},\] consider, \[\frac{F}{K}={\frac{{\prod\limits_{i = n -v- h+ 1}^{n-v} {\left( {{q^i} – 1} \right)}} } {{\prod\limits_{i =v+1}^{v+h} {\left( {{q^i} – 1} \right)} }}}\leq q^{h(n-2v-h+1)}\leq q^{(n-v)(n-2v-h+1)},\] then, \[F\leq Kq^{(n-v)(n-2v-h+1)}=q^{log_q^K}q^{(n-v)(n-2v-2h+1)}q^{(n-v)h}.\]

From \(q^{v(n-v)} \leq K,\) it follows that \(n-v\leq \frac{1}{v}log_q^k\), we have, \[F\leq q^{log_q^K}q^{{\frac{n-2v-2h+1}{v}}log_q^K}q^{\frac{1}{v^2}(log_q^K)^2},\] therefore \(F=q^{O((log_q^K)^2)}\).

The following analysis continues as: \[\begin{aligned} \frac{F}{F_{MN}} & = \frac{{\left[ \begin{array}{l} \quad n\\ v+h \end{array} \right]_q}}{\Bigg(\makecell {{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}\\{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}-{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}}\Bigg)} \stackrel{v + h = n – 1}{=} \frac{{\left[ \begin{array}{l} \quad n\\ n-1 \end{array} \right]_q}}{\Bigg(\makecell {{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}\\{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}-{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}}\Bigg)} \\ & = \frac{q^{n-1} + q^{n-2} + \dots + 1}{\binom{K}{K – K \frac{q^{n – v} – 1}{q^n – 1}}} < \frac{q^{n-1} + q^{n-2} + \dots + 1}{\alpha^{\frac{K}{\alpha}}} \end{aligned}\]

where \(\alpha=\frac{q^n-1}{q^n-q^{n-v}}.\)

\[\frac{R}{R_{MN}}=\frac{1+{\left[ \begin{array}{l} n\\ v \end{array} \right]_q}-{\left[ \begin{array}{l} v+h\\ \quad v \end{array} \right]_q}}{{\left[ \begin{array}{l} n-h\\ \quad v \end{array} \right]_q}}\stackrel{v+h=n-1}{=} \frac{1+K-K\frac{q^{n-v}-1}{q^n-1}}{q^v+q^{v-1}+\dots+1} \approx K\Bigg(\frac{q^n-q^{n-v}}{(q^v+q^{v-1}+\dots+1)(q^n-1)}\Bigg ).\]

We can see that when the new scheme in Theorem 1 and the MN scheme have the same number of users and cache fraction, we can see that the subpacketization \(F\) of the new scheme is about at least \(\frac{q^{n-1}+q^{n-2}\dots+1}{\alpha^{\frac{K}{\alpha}}}\) times less than \(F_{MN}\), and the transmission rate \(R\) is about at most \(\frac{K}{\alpha (q^v+q^{v-1}+\dots+1)}\) times that of \(R_{MN}\), where \(\alpha=\frac{q^n-1}{q^n-q^{n-v}}.\)

Next, a numerical comparison of the new scheme and the MN scheme is shown in Table 1 (let \(q=2\), \((n,h,v)=(4,1,2), (5,2,2), (6,3,2), (6,2,3), (7,4,2), (7,3,3),(8,2,5)\)), Table 1 shows that the subpacketization \(F\) in the coded caching scheme in Theorem 1 is much smaller than the subpacketization in the MN scheme at the expense of a portion of the transmission rate \(R\), under the same conditions of the number of users \(K\) and the cache fraction \(\frac{M}{N}\).

Table 1: Comparison of the New Scheme with the MN Scheme
\(K\) \(\frac{M}{N}\) \(F\) \(F\) \(R\) \(R\)
\(Th\) \(MN\) \(Th\) \(MN\) \(Th\) MN \(Th\) MN
35 0.8000 15 \(6.7245\times 10^{6}\) 1 0.2414
155 0.7742 31 \(6.9284\times 10^{34}\) 5 0.2893
651 0.7619 63 \(5.5647\times 10^{153}\) 22.1429 0.3119
1395 0.8889 63 \(7.3757\times 10^{209}\) 10.3333 0.1249
2667 0.7559 127 inf 93 0.3228
11811 0.8819 127 inf 93 0.1339
97155 0.9725 255 inf 42.3333 0.0282

Here we compare the new scheme to the scheme in [12], as shown in Table 2, Table 2 indicates that while surrendering a portion of the transmission rate \(R\), the coded caching scheme presented in Theorem 1 exhibits advantages to a certain extent with regard to the number of users \(K\), subpacketization \(F\), and cache fraction \(\frac{M}{N}\).

Comparison of the New Scheme With the Scheme in [12]
\(scheme\) \(parameters\) \(K\) \(F\) \(\frac{M}{N}\) \(R\)
(n,h,v,q)Th (4,1,2,2) 35 15 0.8000 1.0000
(m,a,b,\(\lambda\))[12] (9,2,3,2) 28 56 0.8750 0.1607
(n,h,v,q)Th (5,1,3,2) 155 31 0.9032 1.0000
(m,a,b,\(\lambda\))[12] (9,4,3,3) 126 84 0.9524 0.1071
(n,h,v,q)Th (6,3,2,2) 651 63 0.7619 22.1429
(m,a,b,\(\lambda\))[12] (12,4,3,2) 495 220 0.7818 3.0000
(n,h,v,q)Th (6,2,3,2) 1395 63 0.8889 10.3333
(m,a,b,\(\lambda\))[12] (13,5,2,2) 1287 78 0.8718 3.6667
(n,h,v,q)Th (7,2,4,2) 11811 127 0.9449 21.0000
(m,a,b,\(\lambda\))[12] (16,7,3,3) 11440 560 0.9375 3.2500
(n,h,v,q)Th (8,2,5,2) 97155 255 0.9725 42.3333
(m,a,b,\(\lambda\))[12] (19,8,3,3) 75582 969 0.9422 12.0000

5. Conclusion

This study presents the construction of PDA in vector space over finite field, which yields a novel coded caching scheme with low subpacketization. A new MN scheme is generated when number of users \(K\) and the cache fraction \(\frac{M}{N}\) are equal. The new scheme has a significant advantage in terms of the subpacketization \(F\) when compared to the new MN scheme based on theoretical and numerical analyses. Upon doing a numerical comparison of the coded caching scheme presented in literature [12], when a portion of transmission rate \(R\), the number of users \(K\), the subpacketization \(F\), and the cache fraction \(\frac{M}{N}\) all demonstrate certain advantages to some degree.

Acknowledgement

This research was supported partly by the scientific research project of Tianjin Municipal Education Commission (Grant No. 2023ZD041) and the Graduate Student Research and Innovation Fund of Civil Aviation University of China (Grant No. 2023YJSKC06006).

Conflict of Interest

The authors declare no conflict of interest.

References:

  1. Cisco, V., 2018. Cisco visual networking index: Forecast and trends, 2017–2022. White paper, 1(1).
  2. Maddah-Ali, M.A. and Niesen, U., 2014. Fundamental limits of caching. IEEE Transactions on information theory, 60(5), pp.2856-2867.
  3. Chittoor, H.H.S., Krishnan, P., Sree, K.S. and Mamillapalli, B., 2021. Subexponential and linear subpacketization coded caching via projective geometry. IEEE Transactions on Information Theory, 67(9), pp.6193-6222.
  4. Niesen, U. and Maddah-Ali, M.A., 2016. Coded caching with nonuniform demands. IEEE Transactions on Information Theory, 63(2), pp.1146-1158.
  5. Cheng, M., Jiang, J., Wang, Q. and Yao, Y., 2019. A generalized grouping scheme in coded caching. IEEE Transactions on Communications, 67(5), pp.3422-3430.
  6. Cheng, M., Jiang, J., Tang, X. and Yan, Q., 2019. Some variant of known coded caching schemes with good performance. IEEE Transactions on Communications, 68(3), pp.1370-1377.
  7. Cheng, M., Zhang, W. and Jiang, J., 2020. Some new coded caching schemes with smaller subpacketization via some known results. IEEE Access, 8, pp.86305-86315.
  8. Cheng, M., Li, J., Tang, X. and Wei, R., 2021. Linear coded caching scheme for centralized networks. IEEE Transactions on Information Theory, 67(3), pp.1732-1742.
  9. Namboodiri, K. K. K., Peter, E. ans Rajan, B. S., 2023. Extended placement delivery arrays for multi-antenna coded caching scheme. IEEE Transactions on Communications.
  10. Mingming, Z., Minquan, C., Jinyu, W., Xi, Z. and Chen, Y., 2020. Improving placement delivery array coded caching schemes with coded placement. IEEE Access, 8, pp.217456-217462.
  11. Yan, Q., Cheng, M., Tang, X. and Chen, Q., 2017. On the placement delivery array design for centralized coded caching scheme. IEEE Transactions on Information Theory, 63(9), pp.5821-5833.
  12. Yan, Q., Tang, X., Chen, Q. and Cheng, M., 2017. Placement delivery array design through strong edge coloring of bipartite graphs. IEEE Communications Letters, 22(2), pp.236-239.
  13. Shanmugam, K., Ji, M., Tulino, A.M., Llorca, J. and Dimakis, A.G., 2016. Finite-length analysis of caching-aided coded multicasting. IEEE Transactions on Information Theory, 62(10), pp.5524-5537.
  14. Shangguan, C., Zhang, Y. and Ge, G., 2018. Centralized coded caching schemes: A hypergraph theoretical approach. IEEE Transactions on Information Theory, 64(8), pp.5755-5766.
  15. Wan, Z., 2002. Geometry of Classical Groups over Finite Fields. Science Press.