Improved Hotplug Caching Schemes Using PDAs and t-Designs
Abstract
We consider a coded caching system in which some users are offline at the time of delivery. Such systems are called hotplug coded caching systems. A placement delivery array (PDA) is a well-known tool for constructing a coded caching scheme for dedicated caches. In this paper, we introduce the concept of PDAs for hotplug coded caching schemes and refer to it as a hotplug placement delivery array (HpPDA). We give an algorithm to describe the placement and the delivery phase of a hotplug coded caching scheme using HpPDA. We show that an existing hotplug coded caching scheme given by Y. Ma and D. Tuninetti in 2022 corresponds to a class of HpPDAs and then propose a method to further improve the rate of that scheme. Additionally, we construct a class of HpPDAs using -designs, which corresponds to a scheme for hotplug coded caching systems. We further improve the rate of this scheme and prove that the cut-set bound is achieved in some higher memory range for a hotplug coded caching system with three active users.
Index Terms:
Hotplug coded caching systems, Placement delivery array, Combinatorial designsI Introduction
Coded caching is an emerging tool to reduce transmission load during peak traffic hours in the network. The concept of coded caching was first introduced in by Maddah-Ali and Niesen in [1]. In a general setup of coded caching systems, there is a server with files and users connected to the server by an error-free shared link. Each user is equipped with a cache of size equivalent to files. A coded caching scheme consists of two phases: the placement phase and the delivery phase. In the placement phase, the server stores some content in each user’s cache when the network is not busy and the users have not presented their demands yet. In the delivery phase, when all users have revealed their demands, the transmission from the server will be made in such a way that each user will get their demanded files using transmissions and the cache content. The aim of any coded caching scheme is to jointly design such placement and delivery phases that minimize transmission load at the time of delivery.
Several coded caching schemes have been proposed in the literature [1, 2, 3, 4, 5, 6]. The first and popular scheme presented in [1] is referred to as the Maddah-Ali and Niesen (MAN) scheme. In [7], this scheme was proved to achieve the converse bound on the rate when the placements are uncoded, and the number of files is not less than the number of users. For the case when the number of files is less than the number of users, the authors of [4] have proposed an improved version of the MAN scheme, referred to as the YMA (Yu, Maddah-Ali and Avestimehr) scheme that achieves the converse bound on the rate given in [4]. There are many variations of the coded caching model, such as coded caching systems with decentralized server [8], hierarchical coded caching [9], coded caching with nonuniform demands [10], multi-antenna coded caching [11], coded caching for multi-level popularity and access [12], coded caching with private demands [13].
Another variation of the basic coded caching model is the hotplug coded caching system [14], in which some users are offline at the time of delivery. Clearly, this is more practical than the original setup because some users may fail to convey their demands to the server; however, in the MAN scheme, the demands of all users are needed to generate the transmissions. In a hotplug coded caching system, there are a total of users, but only users are active at the time of delivery. During the placement, only the number of active users should be known to the server, not their identity. That means placements in the users’ cache will be made in such a way that in the delivery phase, the server can send the transmissions as soon as the demands of any active users are received. In [14], authors have provided a scheme for hotplug coded caching systems based on the MAN scheme, in which coded placements were made using Maximum Distance Separable (MDS) codes [15]. An MDS code has the property that any symbols out of symbols are information symbols, i.e., the information can be recovered from any set of code symbols. Also, in [16], authors have considered the case of user inactivity for centralized and decentralized coded caching systems. Recently, in [17], the hotplug coded caching systems were studied with the demand privacy condition.
The high subpacketization was the problem of the MAN scheme when it came to the implementation. To tackle that problem, in [18], authors proposed the concept of placement delivery array (PDA), which provides both placement and delivery strategies in a single array. They proposed a new centralized coded caching scheme using PDAs and also proved that the MAN scheme corresponds to a class of PDA referred to as MAN PDA. There are many coded caching schemes proposed in the literature based on the PDAs [19, 20, 21, 22, 23, 24].
I-A Contributions
The contributions of this paper are listed as follows.
-
1.
We introduce the concept of placement delivery arrays for hotplug coded caching schemes and refer to it as HpPDA.
-
2.
Corresponding to each HpPDA, we define the placement and delivery phases of a hotplug coded caching scheme in Algorithm 1.
-
3.
We provide a class of HpPDA that corresponds to the first new scheme given in [14]. Since the placement and delivery phases of the first new scheme were similar to the MAN scheme but with coded placements, the corresponding class of HpPDA consists of MAN PDA. Therefore, we refer to this class as MAN HpPDA.
-
4.
We provide a method to further reduce the rate of a hotplug coded caching scheme using HpPDA, and using that method, we reduce the rate of the scheme that corresponds to MAN HpPDA.
-
5.
We propose a class of HpPDAs based on -designs, and the hotplug coded caching scheme corresponds to that is referred to as -Scheme in this paper. -Scheme provides multiple non-trivial memory rate points using one -design. This is in contrast to the work in [25, 26, 27, 28] using designs where the schemes corresponds to only one non-trivial point. The rate of -Scheme is further improved.
-
6.
Further, we present the comparison of -Scheme with the existing schemes for several examples of -designs, which show that -Scheme is better than the existing schemes in certain higher memory ranges.
-
7.
Using two classes of - design, we show that -Scheme for a hotplug coded caching system with three active users achieves the converse lower bound for some memory points.
I-B Paper organization
This paper focuses on the hotplug coded caching systems [14]. In the next section, we describe the model of a hotplug coded caching system and briefly review the scheme of [14]. The definitions of PDA and some combinatorial designs are given in Section III with some results on -designs, which will be useful in the proposed construction of HpPDAs. In Section IV, we define HpPDA, and corresponding to each HpPDA, we define a hotplug coded caching scheme whose placement and delivery phases are defined in Algorithm 1 given in Section IV. Then, we provide a class of HpPDA that corresponds to the scheme given in [14]. We summarize our results in Section V. In Section VI, we provide a method to reduce the rate of a hotplug coded caching scheme using HpPDAs. Based on that method, we reduce the rate of the scheme given in [14]. In Section VII, we construct a class of HpPDA based on a class of combinatorial designs called -designs, and then we improve the rate of that scheme. The comparison between the rate of the proposed scheme with the existing schemes is given in Section VIII. In the last, we prove that the cut-set bound is achieved in some higher memory ranges for a hotplug coded caching system with three active users in Section IX. Finally, we conclude the paper in Section X.
I-C Notations
For a positive integer , denotes the set and denotes the set . For two sets and , the notation denotes the set of elements in A which are not in B. For a set , the number of elements in it is represented by . The binomial coefficient represented as is equal to , where and are positive integers such that . For a set and a positive integer , the notation represents the collection of all the subsets of of size .
II Hotplug coded caching system
In a hotplug coded caching system, , a server stores files, denoted by each of size bits. The number of users are connected to the server via an error-free shared link. Each user has a cache of size of files.
In placement phase, server is unware of which users will be active and what will be their demands. Assumption is that server knows that there will be number of users active at the time of delivery. In delivery phase, the active users will send their demand to the server, the server will send the transmissions on shared link in such a way that the demand of each active user is statisfied using transmissions and cache content.
In [14], authors proposed three schemes named as baseline scheme, first new scheme and second new scheme. We briefly describe the first new scheme in the following subsection.
II-A Existing scheme for hotplug caching system based on MAN scheme [14]
We will refer to this scheme as MT (Ma and Tuninetti) scheme in the rest of the paper. Fix and partition each file into equal-size subfiles as
Then, for every , we treat the subfiles of each file as the information symbols of an MDS code with generator matrix of dimension . The MDS coded symbols are
Placement Phase: The cache content of user is
Delivery phase: Let denote the set of active users. Clearly, and . The demands of active users are denoted by . Then for all server will broadcast the following subfile
In case of repeated demands, there are out of redundant transmissions, which need not be sent (according to the YMA delivery [4]), where .
This scheme achieves the rate memory pair
where .
II-B Converse bounds
For a hotplug coded caching system, we can utilize any converse result from the classical coded caching system with users and files. Clearly, the rate of a hotplug system cannot be better than the rate of a system where the server has prior knowledge of the set of active users. The following bound was given in [1] on the rate of the classical coded caching system and is called cut-set bound.
Lemma 1 ([1]).
For files and users each with cache of size , the rate of a classical coded caching system is bounded by
The following converse bound was given by Yu et al. in [29].
Lemma 2 ([29]).
For files and users each with cache of size , the rate of a classical coded caching system is lower bounded by
for any , where is the minimum value such that
III Preliminaries
In this section, we review the definition of PDAs for dedicated coded caching systems, and PDA construction of MAN coded caching scheme. In Section VII, we will use combinatorial designs to construct PDAs for hotplug coded caching scheme, for which we review some basic definitions and results related to designs in this section.
Definition 1 (Placement Delivery Array [18]).
For positive integers and , an array , composed of a specific symbol “” and non-negative integers from , is called a - PDA if it satisfies the following conditions:
-
C1.
The symbol “” appears times in each column,
-
C2.
Each integer occurs at least once in the array,
-
C3.
For any two distinct entries and , is an integer only if
-
(a)
, i.e., they lie in distinct rows and distinct columns; and
-
(b)
, i.e., the corresponding sub-array formed by rows and columns must be of the following form
-
(a)
A -PDA corresponds to a coded caching scheme with users, files, cache memory of size of files, subpacketization level , and rate .
Remark 1.
A PDA is called a - regular PDA if each integer appears exactly times in .
Example 1.
A - PDA,
Construction of MAN PDA [18]: Let be an positive integer, and . Now arrange all the subsets of size of in a some specific order and define to be its order for a set . Then MAN PDA , whose rows are indexed by the elements in and columns are index by the elements in , is defined as
Here, is a - regular PDA, which corresponds to a coded caching scheme with users, files, cache memory of size of files, and rate .
Example 2.
A - MAN PDA for ,
Now we present some basic definitions of designs. For more details of these results, refer to [30].
Definition 2 (Design).
A design is a pair such that the following properties are satisfied:
-
1.
is a set of elements called points, and
-
2.
is a collection of nonempty subsets of called blocks.
Definition 3 (-design).
Let and be positive integers such that . A - design is a design such that the following properties are satisfied:
-
1.
,
-
2.
each block contains exactly points, and
-
3.
every set of distinct points is contained in exactly blocks.
For the sake of simplified presentation, the parantheses and commas have been dropped from the blocks in the following examples and in some other examples later, i.e., a block is written as .
Example 3.
Let , and . This is a - design.
Example 4.
Let , and . This is a - design.
Corresponding to a - design there exists a - design , where .
Definition 4 (Incidence Matrix).
Let be a design where and . The incidence matrix of is the matrix such that , and .
Theorem 1 ([30]).
Suppose that is a - design. Suppose that , where . Then there are exactly
(1) |
blocks in that contain all the points in .
Therefore, the number of blocks in a -design is , and each point belongs to exactly blocks. Clearly, a - design is also an - design, for all .
Theorem 1 can be generalized as follows.
Theorem 2 ([30]).
Suppose that is a - design. Suppose that , where , and . Then there are exactly
blocks in that contain all the points in and none of the points in .
The next corollary directly follows from Theorem 2.
Corollary 1.
Suppose that is a - design and , where with . Then there are exactly
(2) |
blocks in that contain all the points in and none of the points in .
IV PDA for hotplug coded caching system
In this section, we introduce a PDA structure for hotplug coded caching system, and then provide an algorithm to characterize the placement and delivery of a hotplug coded caching scheme.
Definition 5 (Hotplug placement delivery array (HpPDA)).
Let and be integers such that and . Consider two arrays given as follows
-
•
which is an array containing ‘’ and null. Each column contains number of ‘’s.
-
•
which is a -PDA.
For each , there exists a subset such that
(3) |
where denotes the subarray of whose rows corresponds to the set and columns corresponds to the set , and denotes that the positions of all ‘’s are same in both the arrays. We call it a - HpPDA .
Example 5.
For the parameters and , a HpPDA is given by
Clearly, for each , there exists such that . In this example, for all .
Example 6.
For the parameters , a HpPDA is given as
Here, for each , there exists such that .
Theorem 3.
Given a -HpPDA , there exists a hotplug coded caching scheme with the following parameters,
-
•
subpacketization level is ,
-
•
where denotes the number of files each user can store in it’s cache and ,
-
•
rate, ,
which can be obtained by Algorithm 1, in which MDS code is used for encoding the subfiles of each file,.
Proof.
In the placement phase of Algorithm 1, array is used to fill the cache of each user. The columns of corresponds to users and rows corresponds to coded subfiles of each file . The cache of the user contains the subfile if . Since each column of constains number of *’s and the size of each coded subfile is , we have . Since , we have .
In the delivery phase of Algorithm 1, array is used for the transmissions. Let , be the set of active users with demands . By the property of HpPDA, for set there exists a subset such that .
Then a PDA is constructed for users with the help of , and corresponding to each integer in , a transmission is made. Since is a PDA, each integer in -th column will provide user a coded subfile of the desired file . There are total stars and integers in a column. Hence using the transmissions, each user will get coded subfiles of the desired file, and there are already coded subfiles of every file in each user’s cache. Therefore, the user have total (as ) number of coded subfiles of the desired file, and using those subfiles, the user can recover the desired file. Since the total number of transmissions is equal to the total number of integers in PDA , which is equal to , therefore, the rate is .
∎
IV-A HpPDA for the MT scheme
In this section, we present a class of HpPDA for a hotplug coded caching scheme given in Section II. We refer to HpPDAs in this class as MAN HpPDAs. For , let
(4) | ||||
Further, let be an -PDA for MAN scheme for users, and can be obtained by replacing all the integers by null in an -PDA for MAN scheme for users. Therefore, we have
(5) |
and is an one to one map from to , and the array
(6) |
Note 1.
The HpPDA given in this subsection corresponds to the MT scheme without YMA delivery, i.e., the rate is . However, if , some redundant transmissions can be reduced using YMA delivery.
Theorem 4.
For the parameters defined in (4), is a -HpPDA.
Proof.
Clearly, is an PDA obtained from MAN scheme for users, and is a array whose rows are indexed by the elements in the set and columns are indexed by the elements in . The array contains exactly “”'s in each column. Now we need to prove that the pair satisfy the property (3).
Let . Consider a set . Clearly, . Corresponding to the sets and , we have a subarray of such that if and only if , . Also, if and only if , . There is an one to one correspondence such that . Also, there is an one to one correspondence such that , for all . Clearly, , , if and only if . Therefore, we have if and only if , . Hence . ∎
Example (Example 6 continued).
Consider the HpPDA given in Example 6 which corresponds to a hotplug coded caching system with users and active users. This HpPDA can be achieved by the method given in Subsection IV-A for .
Now using HpPDA in Algorithm 1, we get a hotplug coded caching scheme in the following way.
Placement Phase: From Line 2 in Algorithm 1, each file is divided into subfiles, i.e., . Encode all the subfiles of file into coded subfile , using a MDS code with generator matrix , i.e.,
From Lines 4-6 in Algorithm 1, the caches of all users are filled as follows:
Delivery Phase: Let the set of active users be with demands . From Line 11 in Algorithm 1, we get
From Lines 12-15 in Algorithm 1, the server trasmits the following coded files:
To recover a file, only six coded subfiles are required because the MDS codes used in this example has dimension . The demand of user is . The user gets from , respectively. Since user already has in its cache, it can recover file . Similarly, user and will get their desired files. We have
There exist HpPDAs other than MAN HpPDAs given in subsection IV-A as shown in the following example.
Example 7.
Consider a hotplug coded caching system with users and active users. Then for , we have HpPDA , where
For each , there exists such that . A choice of for each set of size is given in Table I.
Now using HpPDA in Algorithm 1, we get an hotplug coded caching scheme in the following way.
Placement Phase: From Line 2 in Algorithm 1, each file is divided into subfiles, i.e., . Encode all the subfiles of file into coded subfile , using an MDS code with generator matrix , i.e.,
From Lines 4-6 in Algorithm 1, the caches of all users are filled as follows:
Delivery Phase: Let the set of active users be with demands . From Line 11 in Algorithm 1, we get
From Lines 12-15 in Algorithm 1, the server trasmits the following coded files: and . To recover a file, only five coded subfiles are required because the MDS codes used in this example has dimension . The demand of the user is . The user gets from , respectively. Since the user already has in its cache, it can recover file . Similarly, the users and will get their desired files. Here, we have
V Main results
In this section we summarise our main results, which will be proved in the subsequent sections. In the following theorem, we give the memory-rate points achievable by the improved version of MAN HpPDA given in Section VI.
Theorem 5.
For hotplug coded caching system, the lower convex envelope of the following points is achievable
for all .
In the following theorem, we give the memory-rate points achievable by HpPDAs constructed using -designs in Section VII. For a - design, is defined in (1) and is defined in (2), for .
Theorem 6.
[-Scheme] For , such that , a hotplug coded caching scheme exist with the following memory-rate points
The rate given in Theorem 6 can be further improved which is described in Subsection VII-A. Further, in Section VIII, we give a comparison of improved -Scheme with other existing scheme for multiple examples of -designs and show that we are getting better rate in some higher memory ranges. Also, we get some memory-rate points which achieves the cut-set bound.
The following two clasess of -designs are given in [30, Theorem 9.14] and [30, Theorem 9.27], respectively.
-
•
For all even integers , there exists a - design.
-
•
For all prime powers , there exists a - design.
Using these clasess of designs, we get some optimal memory-rate points achieving cut-set bound for a hotplug coded caching system.
Theorem 7.
For a hotplug coded caching system, where is an even integer and , we get the optimal memory-rate points
where , and for some .
Theorem 8.
For a hotplug coded caching system, where is a prime power and , we get the optimal memory-rate points
where , and for some .
VI Hotplug coded caching scheme with improved rate
The rate of the scheme given in Theorem 3 can be improved further if . All the coded subfiles of a file are obtained using MDS code. Therefore, to recover a file , only coded files are needed (by the property of MSD codes).
In the placement phase of Algorithm 1, number of coded subfiles of each file are placed in each user’s cache. In the delivery phase of Algorithm 1, each active user is getting coded subfiles of desired file. But only coded subfiles of the desired file are needed for the recovery as coded subfiles of every file are already placed in user’s cache. That means each user is getting more coded subfiles of the desired file than required. Since the -th active user gets one coded subfile corresponding to each integer in -th column of array , we can remove integers from each column of array .
Let denote the set of integers appearing in the -th column of array , where . Clearly, and for all . Choose a subset such that
(7) |
Make a new array by replacing all by null in array . So the array has only number of integers. By running Algorithm 1 for HpPDA , we get a hotplug coded caching scheme with rate,
Since this can be done for any set which statisfy the condition in (7), choose the largest possible set , so that the reduction in rate will be large.
Clearly, If , then there will be no improvement in the rate.
VI-A Improved version of the MT scheme
Consider the MAN HpPDA for the MT scheme, where and are defined in (5) and (6). There are total number of ’s and number of integers in each column of array , and an integer appears exactly in number of columns. Therefore, number of integers can be removed from the array in such a way that no column will have less than number of integer, i.e., there exists a set which satisfies (7) and . Hence we have
Remark 2.
-
•
In Example 6, the set satisfies the condition given in (7), and therefore we have
Now by using Algorithm 1 for HpPDA , we get rate . That means in the delivery phase, the server only transmits and . The user gets coded subfile using . Then user gets its desired file using from its cache and . The comparison with the existing schemes [14] is given in Fig. 1.
Figure 1: Example 4: (6, 4, 6) hotplug coded caching system. - •
For some other examples, the comparison of the improved MT scheme with existing schemes is given in Fig. 2 and Fig. 3.


VII Construction of HpPDA from -designs
Let be a - design with non-repeated blocks, where , and for all . Consider an array whose rows are indexed by the blocks in and columns are indexed by the points in . The array is a array containing “” and null, and defined as
(8) |
In other words, can be obtained by the transpose of the incidence matrix of design after replacing by , and by .
For , consider the parameters and given in (1) and (2), respectively. Now for , let , and consider a set
Clearly, . The integers are choosen in such a way that . Consider an array whose rows are indexed by the elements in and columns are indexed by the points in . The array is a array, defined as
(9) |
Note: Further, in this section, non star entries in an array (or PDA) are refered as integers. For example, in array defined in (9), the non star entries are of the form , where is a subset of of size and , which will be refered as the integer entries.
Example 8.
Consider the - design , where
The array can be obtained as follows.
In this example, we have . By choosing and , we have and
Therefore, the array can be obtained as follows.
or equivalently,
To show that the arrays and constructed above using a -design form a HpPDA, first we prove that is a PDA in the following lemma.
Lemma 3.
For , and , the array defined in (9) is a PDA, where
(10) |
Proof.
The array is a array whose rows are indexed by the elements in and columns are indexed by the points in . We can rewite as
where for all and . Clearly, . Now break the array into subarrays denoted by , where . The subarray is a array whose rows are indexed by the elements in and columns are indexed by the elements in .
To prove that is a PDA, we will prove that is a PDA, for all , and there is no integer common in two different subarrays and , where either or . For all , we have
-
C1.
The number of “”’s appear in -th column of is
for all
-
C2.
The set of integers appearing in array is
(here, integers are denoted by a pair , where is set of size and ). Clearly, , and each integer appears exactly times.
-
C3.
Consider two distinct integer entries and such that , where . We have which implies that
(11) Since both entries are different, we have and . Using (11), and the fact that , we have and , which implies that .
Therefore, is a - regular PDA for all . Since every integer entry in PDA depends on , there is no integer common in PDA and , where . Also in an integer entry in PDA , the cardinality of is , hence no integer entry will be common in PDA and , where .
The array is made of disjoint subarrays , , and each subarrays is a PDA. Therefore, is a
∎
Remark 3.
For some and , the PDA is a - MAN PDA.
We identify all PDAs in Example 8 as follows.
Example (Example 8 continued).
For we have the following PDAs.
Theorem 9.
For , such that , the pair forms a -HpPDA, where are defined in (3) and .
Proof.
From Lemma 3, we know that is a PDA. The array defined in (8) is a array containing “” and null, whose rows are indexed by the blocks in and columns are indexed by the points in , i.e., . From Theorem 1, we know that in a - design each point appears in exactly blocks. Hence there are exactly number of “”'s in each column of , i.e., .
Now we need to prove that the pair satisfies the property (3).
For a given subset and , there are exactly blocks which contains and does not contain any element from (from Theorem 2). Let the set of those blocks be denoted by , i.e., . Clearly, . Let the elements in are denoted as . In other words, we can say that is a block which contains and does not contain any element from .
Let . Consider a set , where . Clearly, . Corresponding to the sets and , we have a subarray of such that if and only if . Now divide array into subarrays denoted by , for . The subarray is a array whose rows are indexed by the elements in and columns are indexed by the elements in such that if and only if , or we can say if and only if . Since denotes a block which contains and does not contain any element from , we can say that if and only if .
To prove that , we will prove that for all and .
The array is a array whose rows are indexed by the elements in and columns are indexed by the elements in such that if and only if , where for all and . We prove in the following three steps.
-
1.
First, we show that there is an one to one correspondence between the sets which are used to index the columns of arrays and . Clearly, there is an one to one correspondence such that .
-
2.
In this step, we show that there is an one to one correspondence between the sets which are used to index the rows of arrays and . For given and , there is an one to one correspondence such that , for all .
-
3.
In the last step, we show that the conditions to have a ”*” entry in and corresponds to each other under the defined maps and . Clearly, for , we have , if and only if , where . Therefore, we have if and only if .
Hence . ∎
Remark 4.
The users are represented by the points in and subpackitization level is . All subfiles of each file are coded with MDS code to get coded subfiles.
Corollary 2.
[-Scheme] For , such that , HpPDA gives a hotplug coded caching scheme with cache memory and rate as follows
Example (Example 8 continued).
Consider a subset of of size , say . For all , we have , and . For all , we have , and .
Therefore, there exists a subset of ,
such that we have a subarray of as follows.
Here, is an HpPDA which corresponds to hotplug coded caching system with Since , the rate can be reduced further to by using the method given in Section VI (explained in deatil in the next section).
For conditions, , and , we have following three choices for and ,
-
1.
with ,
-
2.
with ,
-
3.
with .
First case (Case 1)) has already been discussed. Now we explain other two cases.
Case 2) For and , we have and
Therefore, the array can be obtained as follows.
Then we get HpPDA which corresponds to hotplug coded caching system with Since , the rate can be reduced further to by using the method given in Section VI.
Case 3) For and , we have and
Therefore, the array can be obtained as follows.
Here we will get HpPDA which corresponds to hotplug coded caching system with Again, since , the rate can be reduced further to by using the method given in Section VI.
The parameters of hotplug coded caching scheme for all three choices of ’s using - design are given in Table II.
Rate | Improved rate | |||
---|---|---|---|---|
For a given - design, we get a hotplug coded caching scheme. We get different cache memory points for the different choice of such that and . In Example 8, we get hotplug coded caching scheme for (from Case 1) and Case 2)) and (from Case 3)). Suppose we get the same value of for different choices of , i.e., is same as in Case 1) and Case 2) of Example 8. Then we simply consider the choice of with minimum value of which will correspond to the minimum rate.
Remark 5.
Since a - design is also an - design, for all , therefore, a hotplug coded caching scheme can be constructed with number of active users using the proposed scheme for - design.
Remark 6.
Since there exists a - design if there is a - design , for , therefore, a hotplug coded caching scheme can be constructed with users and active users using the proposed -Scheme for - design.
VII-A Improved version of -Scheme
Consider the HpPDA for -Scheme constructed in Section VII, where and are defined in (9) and (8). Now, we will reduce the rate of -Scheme using the method given in Section VI in which we choose a subset such that
(12) |
where denotes the set of integers appearing in the -th column of array , .
There are total number of ’s and number of integers in each column of array . Since for all and , is a regular PDA in which each integer occurs exactly times. So to find a set , which satisfies the above condition, we start choosing integers from subarray for the minimum value of for which . Since the occurrence of an integer in will be less than the occurrence of an integer in if , we can choose a set with larger cardinality.
The following lemma will help to find a subset of the set of integers in which satisfies condition (12).
Lemma 4.
For a regular PDA , for some and , defined in the proof of Lemma 3, and a positive integer , there exist a set such that
where is the set of all integers in and denotes the set of integers appearing in -th column of . The cardinality of the set is
(A way to find a set with given cardinality, when , is presented in Function 1.)
Proof.
If then take . Since the number of integers in a column of is , we have
(13) |
and clearly, . Now consider the case when . Each element in corresponds to a subset of of size , and corresponding to each subset of size , there is an element in the set , and will appear in at the positions i.e., integers corresponding to a set of size will appear in the column , for all . Consider a set such that for and . The maximum possible cardinality of such a set is ; let . Clearly, Now consider set as the union of different number of sets like . Then
and
∎
Note 2.
In Step 5 of Function 1, a set such that will exist, for all , because .
Now, we will construct a set satisfying condition (12) for the array constructed in (9). The following theorem and Algorithm 2 give a way to construct such a set . Consider a set in which all the values of for which are arranged in increasing order. Let
(14) |
such that .
Theorem 10.
Proof.
Here, we will always use notation for the set satisfying condition (15). Let denotes the set of integers in PDA . Clearly, . As explained before, we start choosing integers for set from subarray for the minimum value of for which , i.e., first, we will start choosing integers from the PDAs . Therefore, if then from Lemma 4, we have a set with . Now, if then from Lemma 4, we can select all integers of in set , and than will contain integers from each column of array (as well as ). Then we select remaining from next array if . That means if then we have
Continuing this way, we can say that for some if then we have .
If , then we will start selecting integers from the arrays in a similar manner. Therefore, for if then we have
where .
Since we have elements in the set , we can further continue this process until . Therefore, in general If , for some and , then
where .
∎
Corollary 3.
Example (Example 8 continued).
Consider the Case 1) for which , and . We get and the rate .
We have and . The following condition is statisfied for and .
(16) |
Hence, from Theorem 10, we have a set statisfying condition (12) with cardinality
Therefore, the improved rate for this case is .
In Example 8, we got two memory-rate pairs for an hotplug coded caching system which are and . The first pair statisfies the cut-set bound given in Lemma 1, and hence it is optimal. The second pair does not achieve the cut-set bound, but it gives better rate than the other scheme. The rate is achieved for the memory by using the memory sharing between two memory-rate pairs and achieved by the baseline scheme [14]. Further the rate is achieved for the memory by using the memory sharing between the memory-rate pair achieved by the MT scheme (first new scheme in [14]) and the trivial memory-rate pair . Clearly, the rate achieved by the improved version of -Scheme is better. The comparison is given in Fig. 4 and Table III. Also, the subpaketization of the -Scheme is , whereas the subpaketization of the baseline scheme for the memory is .
Parameters | Improved -Scheme | Baseline scheme [14] | MT scheme [14] | |
---|---|---|---|---|
Subpacketization | ||||
Rate | ||||
Subpacketization | ||||
Rate |

VIII Numerical evaluations
In this section, we consider several other examples of -designs and show that we are getting better rate using improved -Scheme than the existing schemes in some higher memory ranges. Also, we get some memory-rate points which achieves the cut-set bound.
There exists a - design and a construction of this design is given in [30]. By using improved -Scheme for this design we get a rate for hotplug coded caching system shown in Fig. 5. Further, as described in Remark 5 that a - design is also an - design, for all . Therefore, there exists a - design using which we get a hotplug coded caching scheme with number of active users using improved -Scheme, and Fig. 6 shows the memory-rate tradeoff corresponding to it. Similarly, a - design obtained from - design will correspond to a hotplug coded caching scheme for which memory-rate tradeoff is given in Fig. 7 with . It is clear from Fig. 7 that the improved -Scheme achives the cut-set bound from the memory point , while the baseline scheme achives it from .



There exist another - design with points and , which also corresponds to a hotplug coded caching scheme. In Fig. 8, we compare the memory-rate tradeoff of the schemes obtained by - design and - design for a hotplug coded caching system.

In a similar way, we obtain - design from - design and a - design from - design. The both designs correspond to a hotplug coded caching scheme and the comparison of the memory-rate tradeoff of these schemes is given in Fig. 9 for . It can be seen that both schemes achieves the cut-set bound in the higher memory ranges. However, the MT scheme [14] achieves the converse bound completely for a hotplug coded caching system.

IX Optimality
In this section, we focus on the hotplug coded caching schemes obtained using the improved -Scheme from the following two clasess of -designs.
-
•
For all even integers , there exists a - design.
-
•
For all prime powers , there exists a - design.
Using these clasess of designs, we get some optimal memory-rate points achieving cut-set bound for hotplug coded caching system.
Theorem 11.
For a hotplug coded caching system, where is an even integer and , we get the optimal memory-rate points
where , and for some .
Example 9.
Consider a hotplug coded caching system, where . We have and . For and , the condition is satisfied for . Therefore, we have the following optimal memory rate point
which satisfy the cut-set bound as . Similarly, we get the following points for different choices of and .
-
•
For and , we get .
-
•
For and , we get .
-
•
For and , we get .
-
•
For and , we get .
The memory-rate tradeoff for this example is given in Fig. 10.

Theorem 12.
For a hotplug coded caching system, where is a prime power and , we get the optimal memory-rate points
where , and for some .
Example 10.
Consider a hotplug coded caching system, where and , i.e., a hotplug coded caching system. We have and . For and , the condition is satisfied for . Therefore, we have the following optimal memory rate point
which satisfy the cut-set bound as . Similarly, we get the following points for different choices of and .
-
•
For and , we get .
-
•
For and , we get .
The memory-rate tradeoff for this example is given in Fig. 11.

In Fig. 12, we give a compared memory-rate tradeoffs for a hotplug coded caching system, one obtained from a - design with and other obtained from a - design with . The Fig. 12 indicates that each design outperforms the other within certain memory ranges.

IX-A hotplug coded caching scheme from a - design
In this subsection, we find the memory-rate points for a hotplug coded caching scheme using a - design. Using -Scheme for this design, we have
where and . Since we have , using Theorem 10, we further improve the rate. Considering the case when and both are non-zero, we have and . Now for , the condition
given in Theorem 10 is satisfied if
for some . That means
or which is equivalent to
(17) |
Further, for and , we have
Therefore, the improved rate is
and we get the following memory-rate point
(18) |
where , and for some .
Using the method given above, we get the proof of Theorem 11 and Theorem 12 using a - design, where is an even integer, and - design, where is a prime power, respectively.
IX-B Comparison with the baseline scheme [14]
The baseline scheme is a classical YMA scheme [29] with restricted set of demand vectors . For a hotplug coded caching system, the lower convex envelope of the following memory-rate points are achievable by the baseline scheme.
for all , where . This scheme achieves the cut-set bound for , i.e., the baseline scheme start achieving the cut-set bound from the memory .
Now we show that for a hotplug coded caching system, our improved -Scheme start achieving the cut-set bound from the memory less than using Theorem 11 and Theorem 12.
For a - design, is fixed. Therefore, from equation 18, we get the optimal rate for the memory
where , and for some . Since , we have . After choosing maximum value of which is , we get for some . Here will be an integer for . Therefore, we have
where such that is an integer. Now we prove that the memory point is less than for the following cases.
-
1.
For a hotplug coded caching system using - design, where is an even integer and , we have and Therefore, we have
where . Since and ,
-
2.
For a hotplug coded caching system using - design, where is a prime power, and , we have and Therefore, we have
where . Since ,
X Conclusion
In this paper, we considered a practical scenario of a coded caching model in which some users are inactive at the time of delivery, known as a hotplug coded caching system. We introduced a structure called HpPDA that corresponds to a hotplug coded caching scheme, and then we described the placement and delivery phase of that scheme in Algorithm 1. We provided a method to further improve the rate of the proposed hotplug coded caching scheme using HpPDA. Further, we presented a construction of HpPDAs using -designs and then presented a way to improve the rate. We compare the rate of the scheme obtained from HpPDAs using -designs with the existing schemes. For a hotplug coded caching system with three active users, we proved that the cut-set bound is achieved for some higher memory range. Following are the possible directions for further research.
-
1.
Two distinct classes of HpPDAs have been introduced in this paper. The first class consists of MAN HpPDAs, and the second class comes from the -designs. However, there exist other HpPDAs which does not fall into these classes, such as Example 7, which can not be obtained by any of these methods. Therefore, exploring further classes of HpPDAs is an interesting problem.
-
2.
Exploring different combinatorial designs from existing literature and using them to create a new class of HpPDAs is an exciting direction.
-
3.
The problem of high subpacketization still remains with the MAN HpPDAs. However, the subpacketization is lower in HpPDAs obtained from -designs compared to the MAN HpPDAs. It will be interesting to find new classes of HpPDAs with lower subpacketization.
Acknowledgments
This work was supported partly by the Science and Engineering Research Board (SERB) of the Department of Science and Technology (DST), Government of India, through J.C. Bose National Fellowship to Prof. B. Sundar Rajan and by the C V Raman postdoctoral fellowship awarded to Charul Rajput.
References
- [1] M. A. Maddah-Ali and U. Niesen, “Fundamental limits of caching,” IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2856–2867, 2014.
- [2] M. M. Amiri, Q. Yang, and D. Gündüz, “Coded caching for a large number of users,” in 2016 IEEE Information Theory Workshop (ITW). IEEE, 2016, pp. 171–175.
- [3] Z. Chen, P. Fan, and K. B. Letaief, “Fundamental limits of caching: Improved bounds for users with small buffers,” IET Communications, vol. 10, no. 17, pp. 2315–2318, 2016.
- [4] Q. Yu, M. A. Maddah-Ali, and A. S. Avestimehr, “The exact rate-memory tradeoff for caching with uncoded prefetching,” IEEE Transactions on Information Theory, vol. 64, no. 2, pp. 1281–1296, 2017.
- [5] H. Ghasemi and A. Ramamoorthy, “Improved lower bounds for coded caching,” IEEE Transactions on Information Theory, vol. 63, no. 7, pp. 4388–4413, 2017.
- [6] P. N. Muralidhar, D. Katyal, and B. S. Rajan, “Maddah-ali-niesen scheme for multi-access coded caching,” in 2021 IEEE Information Theory Workshop (ITW). IEEE, 2021, pp. 1–6.
- [7] K. Wan, D. Tuninetti, and P. Piantanida, “An index coding approach to caching with uncoded cache placement,” IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1318–1332, 2020.
- [8] M. A. Maddah-Ali and U. Niesen, “Decentralized coded caching attains order-optimal memory-rate tradeoff,” IEEE/ACM Transactions On Networking, vol. 23, no. 4, pp. 1029–1040, 2014.
- [9] N. Karamchandani, U. Niesen, M. A. Maddah-Ali, and S. N. Diggavi, “Hierarchical coded caching,” IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3212–3229, 2016.
- [10] U. Niesen and M. A. Maddah-Ali, “Coded caching with nonuniform demands,” IEEE Transactions on Information Theory, vol. 63, no. 2, pp. 1146–1158, 2016.
- [11] S. P. Shariatpanahi, G. Caire, and B. H. Khalaj, “Multi-antenna coded caching,” in 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017, pp. 2113–2117.
- [12] J. Hachem, N. Karamchandani, and S. N. Diggavi, “Coded caching for multi-level popularity and access,” IEEE Transactions on Information Theory, vol. 63, no. 5, pp. 3108–3141, 2017.
- [13] K. Wan and G. Caire, “On coded caching with private demands,” IEEE Transactions on Information Theory, vol. 67, no. 1, pp. 358–372, 2020.
- [14] Y. Ma and D. Tuninetti, “On coded caching systems with offline users,” in 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022, pp. 1133–1138.
- [15] S. Ling, and C. Xing, “Coding theory: a first course,” Cambridge University Press, 2004.
- [16] J. Liao and O. Tirkkonen, “Fundamental rate-memory tradeoff for coded caching in presence of user inactivity,” arXiv preprint arXiv:2109.14680, 2021.
- [17] Y. Ma and D. Tuninetti, “Demand privacy in hotplug caching systems,” arXiv preprint arXiv:2305.06518, 2023.
- [18] Q. Yan, M. Cheng, X. Tang, and Q. Chen, “On the placement delivery array design for centralized coded caching scheme,” IEEE Transactions on Information Theory, vol. 63, no. 9, pp. 5821–5833, 2017.
- [19] Q. Yan, X. Tang, Q. Chen, and M. Cheng, “Placement delivery array design through strong edge coloring of bipartite graphs,” IEEE Communications Letters, vol. 22, no. 2, pp. 236–239, 2017.
- [20] C. Shangguan, Y. Zhang, and G. Ge, “Centralized coded caching schemes: A hypergraph theoretical approach,” IEEE Transactions on Information Theory, vol. 64, no. 8, pp. 5755–5766, 2018.
- [21] M. Cheng, J. Jiang, Q. Yan, and X. Tang, “Constructions of coded caching schemes with flexible memory size,” IEEE Transactions on Communications, vol. 67, no. 6, pp. 4166–4176, 2019.
- [22] J. Michel and Q. Wang, “Placement delivery arrays from combinations of strong edge colorings,” IEEE Transactions on Communications, vol. 68, no. 10, pp. 5953–5964, 2020.
- [23] X. Zhong, M. Cheng, and J. Jiang, “Placement delivery array based on concatenating construction,” IEEE Communications Letters, vol. 24, no. 6, pp. 1216–1220, 2020.
- [24] M. Cheng, J. Jiang, X. Tang, and Q. Yan, “Some variant of known coded caching schemes with good performance,” IEEE Transactions on Communications, vol. 68, no. 3, pp. 1370–1377, 2019.
- [25] S. Agrawal, K. S. Sree, and P. Krishnan, “Coded caching based on combinatorial designs,” in 2019 IEEE International Symposium on Information Theory (ISIT), IEEE, 2019, pp. 1227-1231.
- [26] J. Li and Y. Chang, “Placement Delivery Arrays Based on Combinatorial Designs,” in IEEE Communications Letters, vol. 26, no. 2, pp. 296-300, 2022.
- [27] M. Cheng, K. Wan, P. Elia, and G. Caire, “Coded Caching Schemes for Multiaccess Topologies via Combinatorial Design,” arXiv preprint arXiv:2310.20239, 2023.
- [28] D. Katyal, P. N. Muralidhar, and B. S. Rajan, “Multi-access coded caching schemes from cross resolvable designs,” IEEE Transactions on Communications, vol. 69, no. 5, pp. 2997-3010, 2021.
- [29] Q. Yu, M. A. Maddah-Ali, and A. S. Avestimehr, “Characterizing the rate-memory tradeoff in cache networks within a factor of 2,” IEEE Transactions on Information Theory, vol. 65, no. 1, pp. 647–663, 2018.
- [30] D. R. Stinson, Combinatorial designs: constructions and analysis. Springer, 2004, vol. 480.