9,336 research outputs found
Cache-Aided Coded Multicast for Correlated Sources
The combination of edge caching and coded multicasting is a promising
approach to improve the efficiency of content delivery over cache-aided
networks. The global caching gain resulting from content overlap distributed
across the network in current solutions is limited due to the increasingly
personalized nature of the content consumed by users. In this paper, the
cache-aided coded multicast problem is generalized to account for the
correlation among the network content by formulating a source compression
problem with distributed side information. A correlation-aware achievable
scheme is proposed and an upper bound on its performance is derived. It is
shown that considerable load reductions can be achieved, compared to state of
the art correlation-unaware schemes, when caching and delivery phases
specifically account for the correlation among the content files.Comment: In proceeding of IEEE International Symposium on Turbo Codes and
Iterative Information Processing (ISTC), 201
Caching in Combination Networks: Novel Multicast Message Generation and Delivery by Leveraging the Network Topology
Maddah-Ali and Niesen's original coded caching scheme for shared-link
broadcast networks is now known to be optimal to within a factor two, and has
been applied to other types of networks. For practical reasons, this paper
considers that a server communicates to cache-aided users through
intermediate relays. In particular, it focuses on combination networks where
each of the users is connected to a distinct -subsets of
relays. By leveraging the symmetric topology of the network, this paper
proposes a novel method to general multicast messages and to deliver them to
the users. By numerical evaluations, the proposed scheme is shown to reduce the
download time compared to the schemes available in the literature. The idea is
then extended to decentralized combination networks, more general relay
networks, and combination networks with cache-aided relays and users. Also in
these cases the proposed scheme outperforms known ones.Comment: 6 pages, 3 figures, accepted in ICC 2018, correct the typo in (6) of
the previous versio
Correlation-Aware Distributed Caching and Coded Delivery
Cache-aided coded multicast leverages side information at wireless edge
caches to efficiently serve multiple groupcast demands via common multicast
transmissions, leading to load reductions that are proportional to the
aggregate cache size. However, the increasingly unpredictable and personalized
nature of the content that users consume challenges the efficiency of existing
caching-based solutions in which only exact content reuse is explored. This
paper generalizes the cache-aided coded multicast problem to a source
compression with distributed side information problem that specifically
accounts for the correlation among the content files. It is shown how joint
file compression during the caching and delivery phases can provide load
reductions that go beyond those achieved with existing schemes. This is
accomplished through a lower bound on the fundamental rate-memory trade-off as
well as a correlation-aware achievable scheme, shown to significantly
outperform state-of-the-art correlation-unaware solutions, while approaching
the limiting rate-memory trade-off.Comment: In proceeding of IEEE Information Theory Workshop (ITW), 201
Coded Caching for a Large Number Of Users
Information theoretic analysis of a coded caching system is considered, in
which a server with a database of N equal-size files, each F bits long, serves
K users. Each user is assumed to have a local cache that can store M files,
i.e., capacity of MF bits. Proactive caching to user terminals is considered,
in which the caches are filled by the server in advance during the placement
phase, without knowing the user requests. Each user requests a single file, and
all the requests are satisfied simultaneously through a shared error-free link
during the delivery phase.
First, centralized coded caching is studied assuming both the number and the
identity of the active users in the delivery phase are known by the server
during the placement phase. A novel group-based centralized coded caching (GBC)
scheme is proposed for a cache capacity of M = N/K. It is shown that this
scheme achieves a smaller delivery rate than all the known schemes in the
literature. The improvement is then extended to a wider range of cache
capacities through memory-sharing between the proposed scheme and other known
schemes in the literature. Next, the proposed centralized coded caching idea is
exploited in the decentralized setting, in which the identities of the users
that participate in the delivery phase are assumed to be unknown during the
placement phase. It is shown that the proposed decentralized caching scheme
also achieves a delivery rate smaller than the state-of-the-art. Numerical
simulations are also presented to corroborate our theoretical results
Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom
We consider the problem of verifying deadlock freedom for symmetric cache
coherence protocols. In particular, we focus on a specific form of deadlock
which is useful for the cache coherence protocol domain and consistent with the
internal definition of deadlock in the Murphi model checker: we refer to this
deadlock as a system- wide deadlock (s-deadlock). In s-deadlock, the entire
system gets blocked and is unable to make any transition. Cache coherence
protocols consist of N symmetric cache agents, where N is an unbounded
parameter; thus the verification of s-deadlock freedom is naturally a
parameterized verification problem. Parametrized verification techniques work
by using sound abstractions to reduce the unbounded model to a bounded model.
Efficient abstractions which work well for industrial scale protocols typically
bound the model by replacing the state of most of the agents by an abstract
environment, while keeping just one or two agents as is. However, leveraging
such efficient abstractions becomes a challenge for s-deadlock: a violation of
s-deadlock is a state in which the transitions of all of the unbounded number
of agents cannot occur and so a simple abstraction like the one above will not
preserve this violation. In this work we address this challenge by presenting a
technique which leverages high-level information about the protocols, in the
form of message sequence dia- grams referred to as flows, for constructing
invariants that are collectively stronger than s-deadlock. Efficient
abstractions can be constructed to verify these invariants. We successfully
verify the German and Flash protocols using our technique
- …