Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching

We illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy spa...

Full description

Bibliographic Details
Main Author: Chao Tian
Format: Article
Language:English
Published: MDPI AG 2018-08-01
Series:Entropy
Subjects:
Online Access:http://www.mdpi.com/1099-4300/20/8/603
_version_ 1818035069391994880
author Chao Tian
author_facet Chao Tian
author_sort Chao Tian
collection DOAJ
description We illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach; however, our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several small cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proven. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that outer bounds can be computed through strategically relaxing the LP in different ways, which can be used to explore the problem computationally. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.
first_indexed 2024-12-10T06:49:11Z
format Article
id doaj.art-b7cc87b576c1438ea7f3433ce9cffa87
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-12-10T06:49:11Z
publishDate 2018-08-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-b7cc87b576c1438ea7f3433ce9cffa872022-12-22T01:58:35ZengMDPI AGEntropy1099-43002018-08-0120860310.3390/e20080603e20080603Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of CachingChao Tian0Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USAWe illustrate how computer-aided methods can be used to investigate the fundamental limits of the caching systems, which are significantly different from the conventional analytical approach usually seen in the information theory literature. The linear programming (LP) outer bound of the entropy space serves as the starting point of this approach; however, our effort goes significantly beyond using it to prove information inequalities. We first identify and formalize the symmetry structure in the problem, which enables us to show the existence of optimal symmetric solutions. A symmetry-reduced linear program is then used to identify the boundary of the memory-transmission-rate tradeoff for several small cases, for which we obtain a set of tight outer bounds. General hypotheses on the optimal tradeoff region are formed from these computed data, which are then analytically proven. This leads to a complete characterization of the optimal tradeoff for systems with only two users, and certain partial characterization for systems with only two files. Next, we show that by carefully analyzing the joint entropy structure of the outer bounds for certain cases, a novel code construction can be reverse-engineered, which eventually leads to a general class of codes. Finally, we show that outer bounds can be computed through strategically relaxing the LP in different ways, which can be used to explore the problem computationally. This allows us firstly to deduce generic characteristic of the converse proof, and secondly to compute outer bounds for larger problem cases, despite the seemingly impossible computation scale.http://www.mdpi.com/1099-4300/20/8/603computer-aided analysisinformation theory
spellingShingle Chao Tian
Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
Entropy
computer-aided analysis
information theory
title Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
title_full Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
title_fullStr Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
title_full_unstemmed Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
title_short Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
title_sort symmetry outer bounds and code constructions a computer aided investigation on the fundamental limits of caching
topic computer-aided analysis
information theory
url http://www.mdpi.com/1099-4300/20/8/603
work_keys_str_mv AT chaotian symmetryouterboundsandcodeconstructionsacomputeraidedinvestigationonthefundamentallimitsofcaching