Coded Caching for Combination Networks with Multiaccess

In a traditional $(H, r)$ combination network, each user is connected to a unique set of $r$ relays. However, few research efforts to consider $(H, r, u)$ multiaccess combination network problem where each $u$ users are connected to a unique set of $r$ relays. A naive strategy to obtain a coded caching scheme for $(H, r, u)$ multiaccess combination network is by $u$ times repeated application of a coded caching scheme for a traditional $(H, r)$ combination network. Obviously, the transmission load for each relay of this trivial scheme is exactly $u$ times that of the original scheme, which implies that as the number of users multiplies, the transmission load for each relay will also multiply. Therefore, it is very meaningful to design a coded caching scheme for $(H, r, u)$ multiaccess combination network with lower transmission load for each relay. In this paper, by directly applying the well known coding method (proposed by Zewail and Yener) for $(H, r)$ combination network, a coded caching scheme (ZY scheme) for $(H, r, u)$ multiaccess combination network is obtained. However, the subpacketization of this scheme has exponential order with the number of users, which leads to a high implementation complexity. In order to reduce the subpacketization, a direct construction of a coded caching scheme for $(H, r, u)$ multiaccess combination network is proposed by means of Combinational Design Theory, where the parameter $u$ must be a combinatorial number. For arbitrary parameter $u$, a hybrid construction of a coded caching scheme for $(H, r, u)$ multiaccess combination network is proposed based on our direct construction. Theoretical and numerical analysis show that our last two schemes have smaller transmission load for each relay compared with the trivial scheme, and have much lower subpacketization compared with ZY scheme.


I. INTRODUCTION
Coded caching proposed by Maddah-Ali and Niesen(MN) in [1] not only utilizes the users' cache memories in shifting some of the network traffic to off-peak hours, but also creates multicast opportunities that further reduce network congestion during peak traffic hours.The first coded caching system studied is the following shared-link broadcast network with end-user-caches: there exists a single sever with N files with the same length connecting to K users through a shared error-free broadcast link, where each user has a cache of size M files.An F -division (K, M, N ) coded caching scheme consists of two phases: placement phase during the off-peak traffic times and delivery phase during peak traffic times.In the placement phase, the server divides each file into F packets (F is referred to as the subpacketization) with the same length, and then places some packets of size M files in each user's cache without knowledge of later users' demands.If the server directly places some packets in each user's cache, without coding, the placement is said to be uncoded.Otherwise, the placement is called coded.In the delivery phase, each user's demand arrives at the server.According to the users' demands, the server transmits coded packets (XOR of the required packets) in order to satisfy all users' demands with the help of their caches.The maximum normalized transmission amount over all possible demands is defined as the transmission load R, and the coded caching gain is defined as , where K(1 − M N ) is the transmission load of the conventional uncoded caching scheme.The goal is to design a coded caching scheme with transmission load R and the subpacketization F as small as possible due to the requirements of efficiency of transmission and low implementation complexity.The above coded caching model is called a (K, M, N ) caching or MN caching system, for which Maddah-Ali and Niesen [1] proposed the first coded caching scheme (called MN scheme), which is optimal under the constraint of uncoded placement and K ≤ N [2].Yan et al. [3] proposed a combinatorial structure called placement delivery array (PDA) to design a coded caching scheme for MN caching system.It is worth noting that MN scheme can be represented by a special PDA which is called the MN PDA.

A. Traditional combination network caching system
Compared with the MN caching system, a more practical system, where users may communicate with the server through intermediate relays, has gained attention.Since the analysis of relay networks with arbitrary topologies is challenging, many Huang, Wang and Cheng are with Guang xi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, China (e-mail: {hlt11153,jjiang2008,chengqinshi}@hotmail.com).Wang is also with College of Mathematics and Statistics, Guangxi Normal University, Guilin 541004, China.

arXiv:2108.09612v1 [cs.IT] 22 Aug 2021
studies focus on a symmetric version of this general problem known as combination networks with end-user-caches.The (H, r, M, N ) combination network caching system was first proposed in [4] as follows: a server with N files connects H relays (without caches), which in turns connect K = H r users, where each user is equipped with a cache of size M files and each user is connected to a unique set of r relays.All links are assumed to be error-free and interference-free.The transmission load for each relay is defined as the maximum normalized transmission amount from the server to each relay over all relays and all possible demands.The objective is to design a coded caching scheme with the transmission load for each relay and the subpacketization as small as possible.
The first two schemes for combination networks were proposed in [4], one based on uncoded placement and routing in the delivery phase, and the other based on the placement strategy of MN scheme and a linear code for delivery.The authors in [5] proposed a scheme based on coded placement that effectively splits the combination network into H parallel MN caching systems, each of which serves H−1 r−1 users by using MN scheme.This scheme works for any parameters H, r and memory ratio M N and the achieved transmission load for each relay is approximately 1 r of the transmission load of MN scheme.Furthermore, it can be used to deal with any relay networks with arbitrary topologies.There are some other studies on improving the transmission load for each relay based on MN scheme, for instance, [6]- [11] etc. Since the subpacketization of MN scheme increases exponentially with the number of users, all of the above known schemes have high subpacketization, which implies that these schemes not only have high implementation complexity but also can not be used when the files in server are not large enough.
In order to design a scheme with low subpacketization for the combination network caching system, the authors in [12] proposed the concept of combinatorial placement delivery array (CPDA), which is an expansion of PDA.When r divides H (denoted by r|H), based on MN scheme, they proposed a scheme with lower subpacketization while the achieved transmission load for each relay is equal to that of the scheme in [5].However, its subpacketization still increases exponentially with the number of users.The authors in [13] showed that the strongly coloring PDA in [14] is a CPDA, which is constructed by the strong coloring in bipartite graph [15].Consequently, two classes of CPDAs were obtained in [13], which lead to schemes with lower subpacketization and without the limitation of r|H compared with the scheme in [12].

B. Multiaccess combination network caching system
It should be noted that all of the above studies are under the assumption that each user is connected to a distinct set consisting of r relays.However, the number of users in a network system may be time-varying [16] in practice.So it always happens that multiple users are connected to the same r relays when the number of users is larger than H r .Therefore, it is meaningful to study a combination network caching system where multiple users are connected to the same r relays.Assume that there are exactly u users connected to a unique set of r relays.Such setting is denoted by an (H, r, u, M, N ) multiaccess combination network caching system.
Clearly, an (H, r, 1, M, N ) multiaccess combination network caching system is an (H, r, M, N ) combination network caching system proposed in [4].So we can generate an (H, r, u, M, N ) multiaccess combination network caching scheme by repeated application of an (H, r, M, N ) combination network caching scheme u times.However, in this naive strategy not only the coded caching gain among the users who are connected to the same r relays will be omitted, but also the coded caching gain among the users who are connected to different relay subsets containing at least one common relay will not be fully considered.In order to make the transmission load for each relay as small as possible, we prefer to design a scheme with the coded caching gain as large as possible.This motivates us to study the multiaccess combination network caching problem, where the basic idea is to generate coded caching gain among all the users as large as possible instead of generating coded caching gain only among H r users who are connected to distinct sets of r relays.Specifically, the following main results are obtained in this paper.1) By using the idea proposed in [5], a scheme (called ZY scheme) for the multiaccess combination network is obtained, which works for any parameters H, r, u and any memory ratio M N , and the achieved transmission load for each relay is approximately 1 r of the transmission load of MN scheme, since the coded caching gain among the users who are connected to the same relay is fully considered.However, its subpacketizaiton increases exponentially with the number of users.2) In order to reduce the subpacketization, we omit the coded caching gain among the users who are connected to the same r relays and consider the coded caching gain among the users who are connected to different relay subsets containing at least one common relay as much as possible, and directly construct a CPDA P from the view point of Combinatorial Design Theory, which leads to a new scheme (called Scheme A) for the multiaccess combination network with lower subpacketization.Since some special combinatorial structure is used in this scheme, the parameter u has to be a combinatorial number.3) For arbitrary parameter u, a hybrid construction of CPDA is proposed based on the MN PDA and the above directly constructed CPDA P, which leads to a new scheme (called Scheme B) for the multiaccess combination network.It is worth noting that Scheme B not only has the same coded caching gain among the users who are connected to different relay subsets containing at least one common relay as Scheme A, but also fully considers the coded caching gain among the users who are connected to the same r relays by increasing some subpacketization.
The rest of this paper is organized as follows.In Section II, the traditional combination network caching system is extended to the multiaccess combination network caching system, and the concepts of PDA and CPDA are briefly reviewed.In Section III, three schemes for the multiaccess combination network are proposed.In section IV, performance analysis is provided.Finally, conclusion is drawn in Section V while some proofs are provided in the Appendices.

II. PRELIMINARIES
In this section, the multiaccess combination network caching system and the concepts of PDA and CPDA are introduced.First, the following notations are useful in this paper.

A. Placement Delivery Array
Yan et al. [3] proposed a combinatorial structure, called placement delivery array (PDA), to characterize the placement phase and delivery phase of a scheme for the MN caching system simultaneously.
Definition 1: (PDA, [3]) For positive integers K, F , Z and S, an F × K array P = (p j,k ), j ∈ [F ], k ∈ [K], composed of a specific symbol " * " called star and S integers in [S], is called a (K, F, Z, S) placement delivery array (PDA) if it satisfies the following conditions: C1.Each column has exactly Z stars.C2.Each integer in [S] occurs at lease once.C3.For any two distinct entries p j1,k1 and p j2,k2 , p j1,k1 = p j2,k2 = s is an integer only if a. j 1 = j 2 , k 1 = k 2 , i.e., they lie in distinct rows and distinct columns; and b. p j1,k2 = p j2,k1 = * , i.e., the corresponding 2 × 2 subarray formed by rows j 1 , j 2 and columns k 1 , k 2 must be of the following form Example 1: It is easy to verify that the following array is a (6, 4, 2, 4) PDA,

B. Multiaccess combination network caching system
We consider an (H, r, u, M, N ) multiaccess combination network caching system (see Fig. 1) in which a server S er containing N files W = {W 1 , W 2 , . . ., W N }, each of which is uniformly distributed in {0, 1} B for some positive integer B, connects H relays through H error-free and interference-free links.Each set of r relays connects u users, so the total number of users is K = u H r .Each user has a storage capacity of size M files where 0 < M < N and all relays have no cache memory.Each relay h could broadcast the intermediate signals from the server to the users who is connected to it.The users is denoted by r , i ∈ [u]} and user (A, i) is connected to relay h if and only if h ∈ A. The set of relays which connect user k ∈ K is denoted by A k .An F -division (H, r, u, M, N ) multiaccess combination network caching scheme contains the following two phases.
• Placement phase: Each file is divided into F packets with equal size.Then each user k ∈ K directly accesses to the file library W and stores some packets or linear combinations of some packets of the N files in its cache.The set of cached packets by user k is denoted by Z k whose size is at most M files.That is, for each user k ∈ K, there exists a function -The H encoding functions: For each relay h ∈ [H], generates the transmitted message X Ser→h ψ Ser→h (W, Z, d) from the server to the relay h.It is a function of the library W, the cached contents of all users Z and the demand vector d.
-The K decoding functions: For each user k = (A, i) ∈ K, decodes the requested file of user k from all messages received by user k and its own cache, i.e., The transmission load for each relay is defined as

C. Combinatorial placement delivery array
Definition 2: (CPDA, [12]) For any positive integers H, r and u with r < H, a (K = u H r , F, Z, S) PDA P is called a (K, F, Z, S) combinatorial placement delivery array (CPDA) if it satisfies the following condition.

C4. All the columns can be labeled by
, the intersection of the first coordinate A of all column labels (A, i) satisfying that s appears in column (A, i), denoted by I s , is not empty.
The definition of CPDA is proposed based on the definition of PDA.So a CPDA must be a PDA.However, the converse does not hold necessarily, since CPDA has another requirement, i.e., the condition C4.The detailed discussion of the relationship between PDA and CPDA could be found in [13].Based on a CPDA, a scheme for the multiaccess combination network can be obtained by using Algorithm 1.
Algorithm 1 Caching scheme based on (K, F 1 , Z, S) CPDA in [13] 1: procedure PLACEMENT(P, W) end for 6: end procedure 7: procedure DELIVERY(P, W, d) Divide X s into µ s sub-packets, i.e., X s = {X s,1 , X s,2 , . . ., X s,µs }; Server sends X s,l to relay h s,l ; Relay h s,l broadcasts X s,l to its connecting users; end for 17: end procedure From Algorithm 1, a (K, F 1 , Z, S) CPDA P can be explained intuitively as follows.
• Each row j ∈ [F 1 ] represents the index of the j th packet of all files and each column k ∈ K represents user k.If p j,k = * , then user k has cached the j th packet of all files.So the condition C1 of Definition 1 implies that each user caches M = Z F1 N files.• If p j,k = s is an integer, it means that the j th packet of all files is not stored by user k.Then the XOR of the requested packets indicated by s is generated by the server at time slot s, denoted by X s .If the set I s defined in the condition C4 of Definition 2 is {h s,1 , h s,2 , . . ., h s,µs } where 1 ≤ µ s ≤ r, then X s is divided into µ s sub-packets, i.e., X s = {X s,1 , X s,2 , . . ., X s,µs }.Finally, for any l ∈ [µ s ], the server sends X s,l to relay h s,l and relay h s,l forwards X s,l to its connecting users.So the subpacketization is at most rF 1 .The condition C4 of Definition 2 guarantees that user k can receive the whole message X s , since user k is connected to each relay in I s .The condition C3 of Definition 1 guarantees that user k can recover its requested packet indicated by s from X s , since it has cached all the other packets in the message X s except its requested one.The occurrence number of integer s in P, denoted by g s , is the coded caching gain at time slot s, since the message X s is useful for g s users.
CPDA for any positive integers H, r and u with r < H, we have an (H, r, u, M, N ) multiaccess combination network caching scheme with memory ratio M N = Z F1 , subpacketization F ≤ rF 1 .Moreover, if the size of I s , which is defined in Definition 2, is a constant for each s ∈ [S] and if the number of I s containing h is a constant for each relay h ∈ [H], the transmission load for each relay is R = S HF1 .In a PDA, a star not contained in any subarray shown as (1) in C3-b of Definition 1, is called useless.The authors in [17] pointed out that useless stars not only make no contribution to reducing the transmission load, but also result in a high subpacketization.If each column of a (K, F, Z, S) PDA has Z useless stars, the authors in [17] improved the scheme in [14] by deleting all the useless stars and using an [F, F − Z ] q maximum distance separable (MDS) code [18] for some prime power q, and came up with a new coded caching scheme with smaller transmission load and subpacketization than the original scheme in [14] for the same number of users and memory ratio.In fact, this idea also works for the multiaccess combination network caching system.
Lemma 3: Given a (K = u H r , F 1 , Z, S) CPDA P for any positive integers H, r and u with r < H, assume that there exist Z useless stars in each column of P. Then we have an (H, r, u, M, N ) multiaccess combination network caching scheme with memory ratio If the size of I s , which is defined in Definition 2, is a constant for each integer s ∈ [S] and if the number of I s containing h is a constant for each relay h ∈ [H], the transmission load for each relay is R = S H(F1−Z ) .
Proof.Assume that P is a (K = u H r , F 1 , Z, S) CPDA where each column has Z useless stars.Delete the Z useless stars in each column, we obtain a new array Clearly each column of P has Z blanks, Z − Z stars and F 1 − Z integers.Based on P , we modify the placement strategy in Algorithm 1 as follows: the server divides each file into F 1 − Z equal-sized packets and then encodes them using an [F 1 , F 1 − Z ] q MDS code for some prime power q.The resulting encoded packets are denoted by W n,1 , W n,2 ,. .., W n,F1 for each file W n where n ∈ [N ].Using the caching strategy in Lines 3-5 in Algorithm 1, each user Clearly, the memory ratio of each user is M N = Z−Z F1−Z .Now let us consider its subpacketization and transmission load for each relay.For any request vector d in the delivery phase, we use the same delivery strategy as in Algorithm 1. Then each user can get exactly F 1 − Z required coded packets.From the property of an [F 1 , F 1 − Z ] q MDS code, each user can recover its requested file.Since the size of I s is a constant for each integer s ∈ [S] and the number of I s containing h is a constant for each relay h ∈ [H], the transmission load for each relay is R = S H(F1−Z ) .Remark 1: Given a (K, F 1 , Z, S) CPDA P, if each column of P has Z useless stars, then the scheme in Lemma 3 has smaller memory ratio and subpacketization than the scheme in Lemma 2, since Z F1 > Z−Z F1−Z and F 1 > F 1 − Z always hold for any positive integer Z < Z.It is worth noting that for the scheme in Lemma 3, the operation field must be O(rF 1 ), hence the size of each packet must be proximately of length log 2 (rF 1 ) bits.This implies that the size of each file in the server must be more than log 2 (rF 1 )(r(F 1 − Z )).

III. THE SCHEMES FOR THE MULTIACCESS COMBINATION NETWORK
In this section, we will propose three coded caching schemes for the multiaccess combination network caching system.The first one is obtained directly from the idea in [5].The second one is from a direct construction of CPDA via combinatorial design theory and the third one is from a hybrid construction of CPDA based on the CPDA directly constructed before and the MN PDA.
A. The first scheme from the idea in [5] Since the scheme in [5] can be used to deal with any relay networks with arbitrary topologies, it also works for the multiaccess combination network caching setting.Specifically, from the idea in [5] we can get an (H, r, u, M, N ) multiaccess combination network caching scheme as follows.Firstly, the server divides each file into r packets and then encodes them into H coded packets by an [H, r] q MDS code for some prime power q.Denote the h th coded packet of all files by It is worth noting that the size of each coded packet is B r bits.Secondly, for each relay h, by taking the h th coded packet of all files W (h) as the file library and using the ( K = u H−1 r−1 , M, N ) MN scheme, the server sends all the required coded signals to relay h, then relay h forwards them to its connecting users.Let t = KM N , then each user caches exactly bits, since each user is just connected to r relays.Thus the transmission load for each relay is R = K(1−M/N ) r( KM/N +1) .That is the following result.
Lemma 4: (ZY scheme) For any positive integers H, r, u, M and N with r < H and M < N , let N is an integer, we have an (H, r, u, M, N ) multiaccess combination network caching scheme with subpacketization F = r K t and transmission load for each relay R = It is easy to verify that the transmission load for each relay of ZY scheme is approximately 1 r of the transmission load of MN scheme.However, the subpacketization of ZY scheme is exponential order with K = u H−1 r−1 , which may lead to high implementation complexity and infeasibility in reality.Therefore, reducing the subpacketization while slightly increasing the transmission load for each relay as the tradeoff is very meaningful.

B. The second scheme via direct construction of CPDA
In this section, we propose a direct construction of CPDA by means of Combinatorial Design Theory, which leads to a multiaccess combination network caching scheme with much lower subpacketization than ZY scheme in Lemma 4.
Construction 1: For any positive integers H, r, a, ω and λ with max{ω, λ} ≤ r < H and a < H, let the row index set F and the column index set K be respectively.An H a × r ω H r where e = (e 1 , e 2 , . . ., e H ) ∈ {0, 1} H is defined as and Clearly, we have |C| = λ from (3).
In general, the array generated by Construction 1 is a CPDA, where each column has the same number of useless stars.Hence, from Lemma 3 we have the following result, whose proof could be found in Appendix A.

C. The third scheme via hybrid construction of CPDA
From Theorem 1, an (H, r, u = r ω , M, N ) multiaccess combination network caching scheme can be obtained.However, it has a limitation of the parameter u, i.e., u = r ω .In this subsection, we will propose a hybrid construction of CPDA for any parameter u based on a PDA and a CPDA.Let us use an example to illustrate the main idea of the construction.
Mathematically, the construction is given as follows.
Construction 2: Suppose that there exists a Let us return to Example 3, when (10).
By Construction 2, we have the following result, whose proof could be found in Appendix B.
Theorem 2: Given a containing h is a constant for each h ∈ [H], and if there are Z 1 useless stars in each column of P, then L leads to an (H, r, uK 2 , M, N ) multiaccess combination network caching scheme with memory ratio From Theorem 2, the following result can be obtained based on the CPDA in Theorem 1 and the Theorem 3: (Scheme B) For any positive integers H, r, a, ω, λ, t 2 and K 2 with max{ω, λ} ≤ r < H, a < H and t 2 < K 2 , there exists an (H, r, u = K 2 r ω , M, N ) multiaccess combination network caching scheme with the memory ratio, subpacketization and transmission load for each relay being respectively, where x = max{0, λ − r + ω}, y = min{ω, λ}, x = max{0, λ − r + ω} and y = min{ω, λ }.

IV. PERFORMANCE ANALYSIS
In this section, we compare Scheme A in Theorem 1 and Scheme B in Theorem 3 with ZY scheme in Lemma 4 and the naive scheme of repeatedly using the scheme in [17] (referred to as Scheme C).

A. Analytic Comparison of Scheme A,B with ZY scheme
Since it is difficult to give an analytic comparison of Scheme A and Scheme B with ZY scheme for general parameters λ and ω, we focus on the case of λ = 1, ω = 1.In this case, the memory ratio, subpacketization and transmission load for each relay of Scheme A are respectively from ( 6), ( 7) and (8); from (11), ( 12) and ( 13), Scheme B has memory ratio, subpacketization and transmission load for each relay as follows, While ZY scheme has subpacketization and transmission load for each relay as follows, .

So we have
when H is large enough.And we have Clearly, for Scheme A and Scheme B, the transmission load for each relay is just multiplied while the subpacketization is reduced exponentially compared to ZY scheme.Moreover, it is easy to verify that rM HN + 1 K2r( H−1 r−1 )M N , i.e., in Scheme A and Scheme B the growth multiple of transmission loads for each relay are much less than the reduction exponent of the subpacketization.

B. Numerical comparison
The numerical comparison of Scheme A and Scheme B with ZY scheme is given in Table III  Finally, when H = 14, r = 4, u = 6 and K = u H r = 6006, the memory-load and memory-subpacketization tradeoffs are given in Fig. 2. From Fig. 2(a), we can see that for the same number of users and memory ratio, the schemes with transmission load for each relay from small to large are ZY scheme, Scheme B, Scheme A and Scheme C in turn.That is because ZY scheme fully utilizes the multicast opportunities among the users who are connected to the same relay, then its coded caching gain is the largest, so it has the minimum transmission load for each relay; Scheme A and Scheme C only utilizes the multicast opportunities among the users who are connected to different sets of r relays, while omits the multicast opportunities among the users who are connected to the same r relays, and Scheme A utilizes the multicast opportunities among the users who are connected to different sets of r relays more efficiently than Scheme C, so the transmission load for each relay of Scheme A is lower than that of Scheme C; Scheme B not only utilizes the multicast opportunities among the users who are connected to different sets of r relays as Scheme A, but also utilizes the multicast opportunities among the users who are connected to the same r relays, so the transmission load for each relay of Scheme B is lower than that of Scheme A. From Fig. 2(b), we can see that for the same number of users and memory ratio, the schemes with subpacketization from small to large are Scheme A, Scheme C, Scheme B and ZY scheme in turn.So Scheme A and Scheme B have significant advantages in subpacketization compared with ZY scheme and have significant advantages in transmission load for each relay compared with Scheme C.Moreover, the subpacketization of Scheme A is lower than that of Scheme C.

V. CONCLUSION
In this paper, we extended a traditional (H, r) combination network to an (H, r, u) multiaccess combination network, where each u users are connected to a unique set of r relays, and proposed three schemes for such a network, i.e., ZY scheme, Scheme A and Scheme B. The transmission load for each relay of ZY scheme obtained from the idea in [5] is approximately 1 r of the transmission load of MN scheme, but its subpacketization increases exponentially with the number of users.Scheme A obtained by a direct construction of CPDA has significant advantages in subpacketization compared with ZY scheme, where the parameter u must be a combinational number.Scheme B obtained by a hybrid construction of CPDA works for arbitrary parameter u and also has significant advantages in subpacketization compared with ZY scheme.In addition, Scheme A and Scheme B have significant advantages in transmission load for each relay compared with Scheme C of repeatedly using the scheme in [17].Moreover, the subpacketization of Scheme A is lower than that of Scheme C. It is worth noting that the hybrid construction is based on a given CPDA and PDA, and the memory ratio of the resulting CPDA is greater than that of the original CPDA.It is great significance to look for a direct construction of CPDA which works for arbitrary parameter u.

APPENDIX A PROOF OF THEOREM 1
Proof.Let the array generated by Construction 1 be P = (p f ,k ) where f ∈ F and k ∈ K.For any non-star entry (e, C) occurring in P, i.e., there exists some f ∈ F and k

Fig. 1 :
Fig. 1: A multiaccess combination network with H = 4, r = 2, u = 2 . • Delivery phase: Assume that each user k = (A, i) ∈ K randomly requests one file from the file library W. The demand vector is represented by d = (d k ) k∈K , which implies that user k requests the d th k file W d k where d k ∈ [N ].Given (Z, d), the server sends a message X Ser→h of size L Ser→h bits to relay h ∈ [H].Then relay h ∈ [H] forwards X Ser→h to its connecting users.User k can recover its desired file W d k by {X Ser→h | h ∈ A} with help of Z k .This phase can be represented by the following encoding functions and decoding functions.
If each set I s1 for P (denoted by I (P) s1 ) where s 1 ∈ [S 1 ] has the same size µ and the number of I (P) s1 Scheme A in Theorem 1 Scheme B in Theorem 3 ZY scheme in Lemma 4 Scheme C: Repeatedly using the scheme in[17]

Fig. 2 :
Fig. 2: Comparison of Scheme A and Scheme B with ZY scheme and Scheme C when H = 14, r = 4, u = 6.

•
For any set H and for any positive integer r with r < |H|, H r := {A|A ⊆ H, |A| = r}, i.e., H r is the collection of r-sized subsets of H, where | • | denotes the cardinality of a set.• Given an array P = (p j,k ) j∈[F ],k∈[K] with alphabet [S] ∪ { * }, we define P + a = (p j,k + a) j∈[F ],k∈[K] and P × a = (p j,k × a) j∈[F ],k∈[K] for any integer a, where a + * = * , a × * = * .• For any two vectors x and y with the same length, d(x, y) is the number of coordinates in which x and y differ, wt(x)

•
The condition C2 of Definition 1 implies that the number of messages X s sent by the server is exactly S. If the size of I s is a constant for each s ∈ [S], assume that |I s | = µ, and if the number of I s containing h is a constant for each relay h ∈ [H], assume that |{I s |h ∈ I s , s ∈ [S]}| = ν, then we have νH = µS.So the transmission load for each relay is
. It is easy to see from Table III that R T h1

TABLE III :
Numerical comparison of Scheme A and Scheme B when ω = 1, λ = 1 with ZY scheme