On Multi-Server Coded Caching in the Low Memory Regime

Similar documents
Multicast Mode Selection for Multi-antenna Coded Caching

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

arxiv: v1 [cs.it] 12 Jan 2011

How (Information Theoretically) Optimal Are Distributed Decisions?

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

Degrees of Freedom of the MIMO X Channel

Feedback via Message Passing in Interference Channels

On Coding for Cooperative Data Exchange

Space-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

Cache-Aided Interference Channels

Delivery Time Minimization in Edge Caching: Synergistic Benefits of Subspace Alignment and Zero Forcing

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

Variations on the Index Coding Problem: Pliable Index Coding and Caching

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Delivery Time Minimization in Edge Caching: Synergistic Benefits of Subspace Alignment and Zero Forcing

Interference: An Information Theoretic View

Two Models for Noisy Feedback in MIMO Channels

Capacity of Two-Way Linear Deterministic Diamond Channel

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Capacity Regions of Two-Way Diamond. Channels

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Interference Alignment with Incomplete CSIT Sharing

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Interference Management in Wireless Networks

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

State of the Cognitive Interference Channel

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Hamming Codes as Error-Reducing Codes

Cloud-Based Cell Associations

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

Orthogonal vs Non-Orthogonal Multiple Access with Finite Input Alphabet and Finite Bandwidth

Joint Relaying and Network Coding in Wireless Networks

On the Optimum Power Allocation in the One-Side Interference Channel with Relay

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Symmetric Decentralized Interference Channels with Noisy Feedback

SHANNON S source channel separation theorem states

Lecture 8 Multi- User MIMO

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling

A Novel Asymmetric Coded Placement in Combination Networks with end-user Caches

Completely Stale Transmitter Channel State Information is Still Very Useful

Degrees of Freedom in Multiuser MIMO

Multicasting over Multiple-Access Networks

Communication over MIMO X Channel: Signalling and Performance Analysis

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

IN RECENT years, wireless multiple-input multiple-output

Diversity Gain Region for MIMO Fading Multiple Access Channels

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay

Maximising Average Energy Efficiency for Two-user AWGN Broadcast Channel

Degrees of Freedom Region for the MIMO X Channel

THE emergence of multiuser transmission techniques for

THE multi-way relay channel [4] is a fundamental building

MULTIPATH fading could severely degrade the performance

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling

SHANNON showed that feedback does not increase the capacity

Interference Alignment for Heterogeneous Full-duplex Cellular Networks

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding

Degrees of Freedom Region of the MIMO Interference Channel With Output Feedback and Delayed CSIT

TWO-WAY communication between two nodes was first

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks

Degrees of Freedom of Wireless X Networks

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

MU-MIMO in LTE/LTE-A Performance Analysis. Rizwan GHAFFAR, Biljana BADIC

Rate-Splitting for Multigroup Multicast Beamforming in Multicarrier Systems

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

On Information Theoretic Interference Games With More Than Two Users

Multiple Antennas in Wireless Communications

Fundamental Storage-Latency Tradeoff in Cache-Aided MIMO Interference Networks

The Multi-way Relay Channel

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

Spatial Modulation Testbed

Performance Analysis of Multiuser MIMO Systems with Scheduling and Antenna Selection

Resource Allocation Challenges in Future Wireless Networks

Acentral problem in the design of wireless networks is how

A Differential Detection Scheme for Transmit Diversity

Decentralized Caching Schemes and Performance Limits in Two-layer Networks

Exploiting Interference through Cooperation and Cognition

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels

Message Passing in Distributed Wireless Networks

Fairness and Efficiency Tradeoffs for User Cooperation in Distributed Wireless Networks

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE

ISSN Vol.03,Issue.17 August-2014, Pages:

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel

Chapter 10. User Cooperative Communications

Opportunistic network communications

MIMO Interference Management Using Precoding Design

Multiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Random access on graphs: Capture-or tree evaluation

Opportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks

Transcription:

On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental Sciences (IPM), Tehran, Iran Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran. pooya@ipm.ir, khalaj@sharif.edu Abstract In this paper we determine the delivery time for a multi-server coded caching problem when the cache size of each user is small.we propose an achievable scheme based on coded cache content placement, and employ zero-forcing techniques at the content delivery phase. Surprisingly, in contrast to previous multi-server results which were proved to be order-optimal within a multiplicative factor of, for the low memory regime we prove that our achievable scheme is optimal. Moreover, we compare the performance of our scheme with the uncoded solution, and show our proposal s improvement over the uncoded scheme. Our results also apply to Degrees-of-Freedom (DoF) analysis of Multiple-Input Single-Output Broadcast Channels (MISO-BC) with cache-enabled users, where the multiple-antenna transmitter replaces the role of multiple servers. This shows that interference management in the low memory regime needs different caching techniques compared with medium/high memory regimes discussed in previous works. I. INTRODUCTION Caching content during network off-peak hours to relieve congestion at network high-peak hours is a well-investigated technique in the literature of content delivery networks both in This research was in part supported by a grant from IPM

wired networks ([], []) and in wireless settings ([], []). Coded caching [5], which has been proposed in the context of information theoretic analysis of caching networks, can be considered as a paradigm shift in this direction by providing multicasting gains (proportional to the total storage available in the network) to users with distinct demands. This approach is shown to provide substantial gains in different scenarios such as hierarchical networks [7], on-line coded caching [6], and DD networks [8]. An important line of research in the framework of coded caching is to investigate how one can use multiple transmitters to boost the coded caching scheme performance. This problem has been considered in the context of wired networks under the name of multi-server coded caching [8], [9], [0], [], and in the context of wireless networks under the names of MISO-BC networks [], [], cache-enabled interference networks [], [5], [6], and multi-antenna coded caching [7]. The interesting result in [8] (and follow-up works) shows that with multiple transmitters the multiplexing gain offered by the transmitters and the multicasting gain of coded caching are additive, which is applicable to all the above wired and wireless multi-transmitter setups. This encouraging result suggests that using multiple transmitters along with coded caching techniques will guarantee high data rates needed for future wireless content delivery applications. In this paper we consider a multi-server coded caching setup where, in contrast to previous works, the cache size of each user is much smaller than the size of a single file. In this regime the cache content placement scheme used is storing a linear combination of sub-files in users caches. The delivery phase would benefit from zero-forcing techniques. Interestingly, we show that this strategy is optimal, by presenting a matching converse proof for the delivery time. It should be noted that our paper can be considered as a generalization of the work [9], which considers a low memory regime in a single-server setup, to the multiple-server setup. The structure of the paper is as follows. In Section II we present the problem setup. In section III we consider the problem in the low memory regime which contains two subsections, each investigating a different regime for the number of antennas. Finally, section IV concludes the paper. II. SYSTEM MODE We consider transmitters sending data to K cache-enabled users via a inear Network. All the transmitters are assumed to have access to a library of N files W = {W,..., W N }, each of F bits. This is a general model which covers a wired network setup where a single server is connected to an intermediate network with unit-capacity links (or equivalently servers each

with a unit-capacity links), and each user is connected to the network with one unit-capacity link. Moreover, internal nodes do random linear network coding resulting in a linear network (see [8]). Alternatively, this model covers a wireless Multi-Input Single-Output Broadcast (MISO-BC) setup, where a multi-antenna base station with antennas delivers content to K single-antenna users (see []). Based on the inear Network assumption mentioned above, if the transmit vector in time slot i is x(i), the received signal at user k will be: y k (i) = h H k x(i), k =,..., K () where h k is the channel vector from the transmitters to the user k. In this paper we omit the time slot index whenever it is clear from the context. The network operates in two phase, namely, the Cache Content Placement and the Content Delivery phases. In the first phase, which is assumed to happen during network low-peak hours, the users caches are filled with data from the library. More specifically, we denote the cache content of user k as Z k to be a function of the library W, which should have an entropy less than MF bits. It should be noted that this phase is operated without knowing users content requests in the content delivery phase. In the second phase, which is assumed to occur during network high-peak hours, each user requests a content from the library, denoted collectively by the indexes vector d = {d,..., d K }, where d k [N] denotes the request index of user k. In order to assume the worst case request vector d, and remove any non-coded multicasting opportunities, we assume that all the users request distinct files from the library (i.e., d i d j if i j). According to these requests, the transmitters collaboratively send a space-time block code X(d) of size T, such that each user can decode its requested file with the help of its received signal at the second phase, along with its cache contents acquired in the first phase. We define the Delivery Time T to be the number of network/channel uses needed to transmit X as the performance metric for the caching schemes. III. THE OW MEMORY REGIME In this section we consider the performance of network in the regime of low memory. More specifically, we assume K = N and M = /N. Thus, each user can cache only a fraction of each file. In the first subsection we assume = N, and propose a scheme which achieves the optimal performance. Then in the next subsection we investigate the case of < N.

A. Problem Parameters: K = N M = /N, = N et us begin explaining the main idea via an example : Example. In this example we assume = transmitters, K = N = receivers and files, and M =. et us denote the files as A, B, C, and D. In the cache content placement the users caches are filled as follows: Z = {A + B + C + D } () Z = {A + B + C + D } Z = {A + B + C + D } Z = {A + B + C + D } Suppose in the second phase the first, second, third, and fourth users request files A, B, C, and D respectively. The signal transmitted by the transmitters will be: w {,,} w {,,} w {,,} X = B + C h H w {,,} + D h H w {,,} h H w {,,} w {,,} X = A h H w {,,} w {,,} X = A h H w {,,} w {,,} X = A h H w {,,} w {,,} + C h H w {,,} w {,,} + B h H w {,,} w {,,} + B w {,,} + D h H w {,,} w {,,} + D h H w {,,} w {,,} + C h H w {,,} h H w {,,} The unit-size vectors wi S are chosen such that h H j wi S = 0 for all j S\{i}. et us focus on the received signals by all the users after transmission of X : h H h H w {,,} X = B h H h H w {,,} h H w {,,} X = C h H w {,,} h H h H w {,,} X = B h H w {,,} By transmitting X we will have: h H h H w {,,} X = A h H w {,,} h H h H w {,,} X = A h H w {,,} h H w {,,} + C h H w {,,} h H w {,,} + D h H w {,,} h H h H w {,,} X = C h H w {,,} h H w {,,} + C h H w {,,} h H w {,,} + D h H w {,,} h H h H w {,,} X = D h H w {,,} = B + C + D h H h H w {,,} X = D h H w {,,} = A + C + D () () (5) It should be noted that the example of K = N =, M = /, and = is investigated in [8].

5 By transmitting X we will have: h H h H w {,,} X = A h H w {,,} h H h H w {,,} X = A h H w {,,} And finally by transmitting X we have: h H h H w {,,} X = A h H w {,,} h H h H w {,,} X = A h H w {,,} h H h H w {,,} X = B h H w {,,} h H w {,,} + B h H w {,,}, h H h H w {,,} X = B h H w {,,} + B h H w {,,} + D h H w {,,} h H w {,,} h H w {,,} + C h H h H w {,,} X = D h H w {,,} = A + B + D, h H h H w {,,} X = C h H w {,,} = A + B + C h H w {,,} h H w {,,} By collecting all the decoded sub-files we arrive at the below table which shows the decoded data by each user following each transmission. We call this table as the Delivery Table for this problem. Row Signal User User User User Time Slot X B + C + D B C D X A A + C + D C D X A B A + B + D D X A B C A + B + C Then, it is clear that each user can decode its requested file with the help of its cache contents. Since each row in the delivery table takes /N = / time slots, sending the transmit blocks X, X, X, and X will result in the Delivery Time of (6) (7) T = = (8) Now, following emma in [8] we have the following lower bound on the delivery time ( T max s s ) s {,...,K} min(s, ) N/s M ( K K ) N/K M = (9) which shows that the above achievable scheme is optimal. The above delivery delay of T = should be compared to the uncoded scheme in which every user caches M/N fraction of each file. Thus, by applying the classical Zero-Forcing and

6 forming parallel streams, the Delivery Time will be K( M/N) T = (0) = 5 which shows that the optimal proposed scheme will result in time slots less delay. well. As we see next, the same concept of Delivery Table can be extended to other examples as Example. In this example we assume = transmitters, K = N = 5 receivers and files, and M =. et us denote the files as A, B, C, D, and E, and suppose the users require them respectively. In the cache content placement the users caches are filled as follows: Z i = {A i + B i + C i + D i + E i } () for i =,..., 5. Along the same guidelines provided in Example one can arrive at the following delivery table for this example. Signal User User User User User 5 X B + C + D + E B C D E X A A + C + D + E C D E X A B A + B + D + E D E X A B C A + B + C + E E X 5 A 5 B 5 C 5 D 5 A 5 + B 5 + C 5 + D 5 Then one can easily arrive at the delivery time of T = 5 5 Time for the uncoded scheme will be T = K( M/N) = which is optimal. The Delivery () = 6 5 which shows that the optimal proposed scheme will result in 5 time slots less delay. The following theorem generalizes the above examples. Theorem. Suppose K = N, = N, and M =. Then, the optimal delivery time is N T =. Proof. et us present our achievable scheme in Algorithm I.

7 Algorithm Multi-Server Coded Caching for Small Cache Size : procedure CACHE-PACEMENT(W,..., W N ) : for all n =,..., N do : W n = {W i n} for i =,..., N : end for 5: for all k =,..., K do 6: Z k = N n= W k n 7: end for 8: end procedure 9: procedure CONTENT-DEIVERY(W,..., W N, d,..., d K, H = [h,..., h K ]) 0: for all i =,..., K do : X i K : Transmit X i : end for : end procedure k=,k i W i d k w [K]\{i} k h H i w[k]\{i} k where h H j w S k = 0 for all j S\{k} Next we show that Algorithm delivers all the desired requests to the users correctly. et us focus on an arbitrary user j which has requested the file W dj. Upon transmission of X i for i j this user receives since h H j w [K]\{i} j h H j X i = K k=,k i h H Wd i j w [K]\{i} k k h H i w[k]\{i} k () h H = Wd i j w [K]\{i} j j h H i w[k]\{i} j 0 and h H i w [K]\{i} j 0 with high probability, user j can decode Wd i j for all i [N]\{j}. So for decoding the whole file it remains for this user to decode W j d j. Now let us focus on what this user receives after transmission of X j : h H j X j = K W j h H j w [K]\{j} k d k k=,k j h H j w[k]\{j} k K = by subtracting this from Z j we will have: N Wn j n= k=,k j K k=,k j W j d k () W j d k = W j d j (5) which is the missing part. Thus user j can decode W dj, and similarly, all the users can decode

8 their requests. The Delivery Time of this achievable can be calculated as the number of transmit blocks X i, which is N, times the delivery time of each, which is /N, resulting in T =. Finally, following from the converse emma in [8] we have ( T max s s {,...,K} min(s, ) which concludes the proof. ( K = N = K N/K M ) s N/s M ) (6) In comparison with the uncoded scheme which arrives at the delivery time of K( M/N) T = (7) = + N we see /N time slots improvement in the delivery time. B. Problem Parameters: K = N M = /N, < N In the last subsection we observed that as long as we have = N antennas, each row of the delivery table can be delivered in one shot of length /N time slots. However, when we have less antennas, delivery of each row is different. In each row of the delivery table the goal is to deliver N individual messages to N of the users and the sum of these messages to the remaining user. For example, in the first row of Example s delivery table there are three individual messages for the second, third, and the fourth users, and the sum of these messages should be delivered to the first user. As we have shown in the previous subsection, this is feasible if we have = N transmitters. Next, we explain how the achievable scheme changes if we have less antennas. Example. The setup of this example is the same as Example except that now we have = antennas. Suppose the goal is to deliver M to the user, M to the user, M to the user, and M + M + M to the user. All M i s have the length of /N = /, thus, with three transmitters we could fulfill this task in one shot of length /. However in order to do this

9 with = antennas first we need to further split each sub-file into two equal mini-files, i.e., M i = {M i, M i }, i =,,. Then, we send the following signals M M h h H h h h H h + (M + M ) h h H h h M h H h (8) h M + (M h H h + M ) h h H h It can be easily checked that the data different users receive are as summarized in the table below User User User User Time Slot M M + M - M + M + M - M M M M M - M + M M + M + M 8 8 8 Now it is clear that user can decode M = {M, M }, user can decode M = {M, M }, and user can decode M = {M, M }. Also by subtracting the second row from the first row, user can decode M + M + M. User can also add the second and third rows to arrive at M +M +M. Thus, user can arrive at M +M +M = {M +M +M, M +M +M }. The total time for finishing this task is /8 = /8 time slots achieved by = in contrast to / time slots achieved in Example by = antennas, i.e., a multiplicative factor of / more time slots needed due to less transmitters available. Since all the rows in the delivery table of Example can be treated similarly, the total time needed is now T =. On the other hand from the converse argument in Theorem we know T N = (9) which shows that the proposed scheme is optimal. The Delivery Time for the uncoded scheme will be K( M/N) T = = 5 8 which shows that the optimal proposed scheme will result in 8 time slots less delay. Example. Here we revisit Example with = antennas. Each row in Example consisted of delivering an independent message to one of the four users, and the sum of these messages (0)

0 to the remaining user. Assume we want to deliver M, M, M, and M to the users,,,. In addition the message M + M + M + M should be delivered to the user 5. Since we have = transmitters, we can send three independent messages in parallel. Here we split each message into three equal parts, i.e., M i = {M i, M i, M i }. Then, the below table shows the coding strategy in this case User User User User User 5 M M + M M M M - M M + M + M M + M M M M - M M M + M + M M - M M M M + M + M M - M M M M M + M M + M M + M M + M It is clear that user can decode M = {M, M, M }, user can decode M = {M, M, M }, user can decode M = {M, M, M }, and user can decode M = {M, M, M }. Also, by adding the first and second rows, user 5 can decode M + M + M + M, by adding the second and third rows user 5 can decode M + M + M + M, and by adding the third and fourth rows user 5 can decode M + M + M + M. Thus, user 5 can collectively arrive at M + M + M + M which was desired. The whole task of sending this single row is fulfilled in 5, which is a multiplicative factor worse than the = case. Thus, the total delivery time will be T = N, which matches the converse of T =. Also, for the uncoded scheme we will have K( M/N) T = = 8 5 The following theorem characterizes the optimal delivery time for all < N if N is a multiple of. Theorem. Suppose K = N, M =, and divides N. Then, the optimal delivery time N is T = N. Proof. If we had =, then each row of the delivery table would take (N ) N () time slots. With transmitters available, we can group the users which require independent messages in groups of size and use zero-forcing to remove intra-group interference. This will reduce the transmission of each to take (N ). Since we have a total of N rows, the total time N needed would be T = N. The converse argument is identical to that of Theorem which

shows the optimality of the scheme. The uncoded scheme arrives at the delivery time of K( M/N) T = ( = + ) ( ) N N which is greater than our proposed scheme s delay. () IV. CONCUSIONS We have characterized the optimal delivery time of coded caching in multi-server networks in the low memory regime. Our achievable scheme includes caching coded content, and using zero forcing at the content delivery phase. Our converse matches the achievable scheme s performance which ensures its optimality. Also, we have compared the delivery time of our proposal with the conventional uncoded scheme, where every user caches a fraction of each file separately, and have shown our proposal s superiority. The results can also be interpreted as DoF performance of multiple-antenna coded caching schemes, and cache-enabled interference channels where the transmitters play the role of a distributed MIMO transmitter. REFERENCES [] J. Kangasharju, J. Roberts, and K. Ross, Object Replication Strategies in Content Distribution Networks, Computer Communications, vol. 8, no., pp. 76-8, 00. [] S. Borst, V. Gupta, and A. Walid, Distributed Caching Algorithms for Content Distribution Networks, Proc. of IEEE INFOCOM, San Diego-CA, March 00, pp. -9. [] S. Gitzenis, G. S. Paschos, and. Tassiulas, Asymptotic aws for Joint Content Replication and Delivery in Wireless Networks, Proc. of IEEE INFOCOM, Orlando-F, March 0, pp. 5-59. [] S. P. Shariatpanahi, H. Shah-Mansouri, and B. Hossein Khalaj, Caching gain in interference-limited wireless networks, IET Communications, vol. 9, no. 0, pp. 6977, 05. [5] M. A. Maddah-Ali and U. Niesen, Fundamental limits of caching, in IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 856-867, May 0. [6] R. Pedarsani, M. A. Maddah-Ali and U. Niesen, Online coded caching, in IEEE/ACM Transactions on Networking, vol., no., pp. 86-85, April 06. [7] N. Karamchandani, U. Niesen, M. A. Maddah-Ali, S. Diggavi, Hierarchical coded caching, IEEE Transactions on Information Theory, June 06. [8] S. P. Shariatpanahi, S. A. Motahari and B. H. Khalaj, Multi-server coded caching, in IEEE Transactions on Information Theory, vol. 6, no., pp. 75-77, Dec. 06. [9] E. ampiris, P. Elia, Adding transmitters dramatically boosts coded-caching gains for finite file sizes, arxiv preprint arxiv:80.089, 08.

[0] N. Mital, D. Gunduz, and C. ing, Coded caching in a multi-server system with random topology, in IEEE Wireless Communications and Networking Conference (WCNC), Apr. 08. [] M. Cheng, Q. Zhang, J. Jiang, Improved rate for a multi-server coded caching, arxiv:80.070 [cs.it] [] J. Zhang and P. Elia, Fundamental limits of cache-aided wireless BC: Interplay of coded-caching and CSIT feedback, in IEEE Transactions on Information Theory, vol. 6, no. 5, pp. -60, May 07. [] S. P. Shariatpanahi, G. Caire, and B. H. Khalaj, Physical-layer schemes for wireless coded caching, arxiv preprint arxiv:7.05969, 07. [] N. Naderializadeh, M. A. Maddah-Ali and A. S. Avestimehr, Fundamental limits of cache-aided interference management, in IEEE Transactions on Information Theory, vol. 6, no. 5, pp. 09-07, May 07. [5] Y. Cao, M. Tao, F. Xu, and Kangqi iu, Fundamental Storage-atency Tradeoff in Cache-Aided MIMO Interference Networks, in IEEE Transactions on Wireless Communications, 06. [6] M. A. T. Nejad, S. P. Shariatpanahi and B. H. Khalaj, On storage allocation in cache-enabled interference channels with mixed CSIT, in Proc. of IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 07, pp. 77-8. [7] S. P. Shariatpanahi, G. Caire, and B. H. Khalaj, Multi-antenna coded caching, in Proc. of International Symposium on Information Theory (ISIT), 07. [8] M. Ji, G. Caire and A. F. Molisch, Fundamental limits of caching in wireless DD networks, in IEEE Transactions on Information Theory, vol. 6, no., pp. 89-869, Feb. 06. [9] Z. Chen, P. Fan, and K. B. etaief, Fundamental limits of caching: Improved bounds for small buffer users, arxiv:07.95, 0.