diff --git a/Data/para_data.csv b/Data/para_data.csv index bc669fe..e0ef300 100644 --- a/Data/para_data.csv +++ b/Data/para_data.csv @@ -838,3 +838,81 @@ 296,384,0,7,5730.417000,0,2475.98,20.2225,371.225,212.417,0 296,384,0,9,4908.263000,0,2097.58,288.186,380.105,240.339,0 296,384,0,10,4901.544000,0,1814.81,476,438.053,247.114,0 +296,384,25,4,20957.596000,0,6290.06,3168.68,457.057,253.368,0 +296,384,25,5,20252.363000,0,6276.08,2952.78,389.989,192.424,0 +296,384,25,6,20818.924000,0,6257.46,3138.41,464.215,188.912,0 +296,384,25,7,19412.145000,0,6099.81,2891.58,414.454,183.625,0 +296,384,25,8,10807.393000,0,4165.8,2279.57,386.793,201.339,0 +296,384,25,9,11235.700000,0,4491.76,2178.66,391.293,182.745,0 +296,384,25,11,8055.309000,0,3428.13,1819.19,378.51,183.642,0 +296,384,50,4,32686.327000,0,9045.02,6130.36,471.985,225.561,0 +296,384,50,5,32117.368000,0,9209.5,5818.17,402.466,181.513,0 +296,384,50,6,31587.055000,0,9003.02,5748.74,396.801,192.208,0 +296,384,50,7,33795.435000,0,9803.01,5815.04,464.713,212.892,0 +296,384,50,9,18313.359000,0,6897.21,4085,417.022,298.512,0 +296,384,50,10,12117.599000,0,4342.55,3959.21,467.219,223.76,0 +296,384,50,11,12882.252000,0,5313.85,3287.1,391.276,216.899,0 +296,384,75,4,41599.156000,0,11101.4,8517.19,409.586,199.685,0 +296,384,75,5,41773.323000,0,11130.6,8577.68,410.606,194.059,0 +296,384,75,6,41969.873000,0,11182.4,8620.27,409.167,176.669,0 +296,384,75,7,46001.100000,0,12625.8,8658.49,462.459,189.261,0 +296,384,75,8,21785.653000,0,7430.31,6128.7,397.478,209.779,0 +296,384,75,9,25186.173000,0,9277.25,6044,420.031,190.854,0 +296,384,75,10,15386.959000,0,5915.47,4827.39,393.483,188.551,0 +296,384,75,11,18706.319000,0,7717.06,4815.43,457.272,190.944,0 +296,384,100,4,54761.452000,0,14572.1,11487.9,417.345,204.154,0 +296,384,100,5,55379.077000,0,14620.1,11765.8,421.846,215.799,0 +296,384,100,6,55976.503000,0,14618.6,11932.1,492.786,179.29,0 +296,384,100,7,61763.370000,0,17198.5,11437.8,405.289,191.017,0 +296,384,100,9,32707.315000,0,11871.4,7926.63,404.478,223.087,0 +296,384,100,10,18870.817000,0,6907.92,6339.56,461.215,185.955,0 +296,384,100,11,22384.407000,0,9039.57,6203.9,401.914,193.976,0 +296,384,100,12,15286.370000,0,5950.28,5384.03,461.906,173.38,0 +296,768,0,4,15803.794000,0,6923.84,20.177,384.733,206.134,0 +296,768,0,5,15784.437000,0,6928.16,20.1335,383.87,264.697,0 +296,768,0,6,15633.398000,0,6849.12,20.654,380.962,210.925,0 +296,768,0,7,9469.651000,0,4742.29,20.2545,437.602,284.718,0 +296,768,0,8,9368.892000,0,4629.5,321.776,445.242,254.69,0 +296,768,0,10,7342.101000,0,3592.81,556.47,420.168,269.353,0 +296,768,0,11,6981.656000,0,3228.52,642.641,470.023,251.714,0 +296,768,25,4,40347.021000,0,12574.3,6402.65,475.055,182.881,0 +296,768,25,5,38431.171000,0,12398,5795.32,397.484,241.014,0 +296,768,25,6,38218.529000,0,12300.4,5784.5,398.915,187.438,0 +296,768,25,7,37190.591000,0,12124.7,5822.46,394.105,221.352,0 +296,768,25,8,20109.616000,0,8243.04,4255.57,411.297,255.2,0 +296,768,25,10,14193.205000,0,6029.17,3800.06,463.62,194.132,0 +296,768,25,11,14691.615000,0,6741.31,3318.42,390.836,203.417,0 +296,768,50,4,61689.708000,0,17956,11582.5,418.84,190.607,0 +296,768,50,5,62197.894000,0,18118.1,11578.3,479.697,244.81,0 +296,768,50,6,61678.728000,0,17964.5,11543.8,417.045,194.67,0 +296,768,50,7,65543.389000,0,19508.5,11493,474.555,218.915,0 +296,768,50,8,31808.250000,0,11974.7,8166.3,399.787,216.595,0 +296,768,50,9,35372.420000,0,13680.1,8050.37,469.856,317.389,0 +296,768,50,10,21337.285000,0,8635.81,6413.99,490.753,228.582,0 +296,768,50,11,24213.469000,0,10427.5,6265.06,388.528,179.445,0 +296,768,50,12,16559.823000,0,7225.79,5183.65,395.137,209.852,0 +296,768,75,4,82206.796000,0,22199.4,17324.5,435.205,214.867,0 +296,768,75,5,82022.172000,0,22191.6,17244.3,433.446,181.361,0 +296,768,75,6,82323.690000,0,22220.9,17269.9,499.903,175.406,0 +296,768,75,7,89694.707000,0,25032.2,17278.4,454.66,186.831,0 +296,768,75,8,42415.503000,0,14864.7,12115.1,473.163,225.053,0 +296,768,75,9,48873.197000,0,18420.6,11856.5,414.361,219.919,0 +296,768,75,10,29444.131000,0,11783.6,9305.39,395.355,328.721,0 +296,768,75,11,35807.420000,0,15162.4,9614.39,481.16,194.868,0 +296,768,75,12,21662.990000,0,8897.86,7496.68,394.914,185.27,0 +296,768,100,4,108045.208000,0,29068.3,23082.5,446.261,267.015,0 +296,768,100,5,108092.023000,0,29067.9,23140.8,442.634,219.638,0 +296,768,100,6,108493.832000,0,29335.5,23069.6,449.047,175.783,0 +296,768,100,7,122773.959000,0,34494.4,23046.1,490.798,222.695,0 +296,768,100,8,55716.810000,0,19629.5,16088.7,448.127,224.207,0 +296,768,100,9,64502.613000,0,23805.4,15770.2,449.487,215.214,0 +296,768,100,10,36960.648000,0,13814.2,12706.1,459.267,225.007,0 +296,768,100,11,43724.066000,0,18028.4,12232.8,455.641,257.904,0 +296,768,100,12,28264.223000,0,11657.7,9892.72,470.68,245.417,0 +296,1536,0,4,29483.695000,0,13585.3,22.6195,453.742,214.429,0 +296,1536,0,5,28822.511000,0,13440.5,20.594,380.477,256.649,0 +296,1536,0,6,29940.611000,0,13825.6,20.5235,445.191,196.22,0 +296,1536,0,7,16010.069000,0,9162.23,20.625,416.226,193.549,0 +296,1536,0,10,11404.883000,0,6890.57,467.305,379.806,210.596,0 +296,1536,0,11,9135.920000,0,5617.98,371.463,373.14,188.657,0 +296,1536,0,12,9077.742000,0,5531.78,442.529,374.977,192.138,0 diff --git a/Data/timing.csv b/Data/timing.csv index f660d6c..7a6f85e 100644 --- a/Data/timing.csv +++ b/Data/timing.csv @@ -839,6 +839,84 @@ load,exploit,appl,nodes,runtime,task0,task1,task2,task3,task4,task5 296,384,0,7,5730.417000,0,2475.98,20.2225,371.225,212.417,0 296,384,0,9,4908.263000,0,2097.58,288.186,380.105,240.339,0 296,384,0,10,4901.544000,0,1814.81,476,438.053,247.114,0 +296,384,25,4,20957.596000,0,6290.06,3168.68,457.057,253.368,0 +296,384,25,5,20252.363000,0,6276.08,2952.78,389.989,192.424,0 +296,384,25,6,20818.924000,0,6257.46,3138.41,464.215,188.912,0 +296,384,25,7,19412.145000,0,6099.81,2891.58,414.454,183.625,0 +296,384,25,8,10807.393000,0,4165.8,2279.57,386.793,201.339,0 +296,384,25,9,11235.700000,0,4491.76,2178.66,391.293,182.745,0 +296,384,25,11,8055.309000,0,3428.13,1819.19,378.51,183.642,0 +296,384,50,4,32686.327000,0,9045.02,6130.36,471.985,225.561,0 +296,384,50,5,32117.368000,0,9209.5,5818.17,402.466,181.513,0 +296,384,50,6,31587.055000,0,9003.02,5748.74,396.801,192.208,0 +296,384,50,7,33795.435000,0,9803.01,5815.04,464.713,212.892,0 +296,384,50,9,18313.359000,0,6897.21,4085,417.022,298.512,0 +296,384,50,10,12117.599000,0,4342.55,3959.21,467.219,223.76,0 +296,384,50,11,12882.252000,0,5313.85,3287.1,391.276,216.899,0 +296,384,75,4,41599.156000,0,11101.4,8517.19,409.586,199.685,0 +296,384,75,5,41773.323000,0,11130.6,8577.68,410.606,194.059,0 +296,384,75,6,41969.873000,0,11182.4,8620.27,409.167,176.669,0 +296,384,75,7,46001.100000,0,12625.8,8658.49,462.459,189.261,0 +296,384,75,8,21785.653000,0,7430.31,6128.7,397.478,209.779,0 +296,384,75,9,25186.173000,0,9277.25,6044,420.031,190.854,0 +296,384,75,10,15386.959000,0,5915.47,4827.39,393.483,188.551,0 +296,384,75,11,18706.319000,0,7717.06,4815.43,457.272,190.944,0 +296,384,100,4,54761.452000,0,14572.1,11487.9,417.345,204.154,0 +296,384,100,5,55379.077000,0,14620.1,11765.8,421.846,215.799,0 +296,384,100,6,55976.503000,0,14618.6,11932.1,492.786,179.29,0 +296,384,100,7,61763.370000,0,17198.5,11437.8,405.289,191.017,0 +296,384,100,9,32707.315000,0,11871.4,7926.63,404.478,223.087,0 +296,384,100,10,18870.817000,0,6907.92,6339.56,461.215,185.955,0 +296,384,100,11,22384.407000,0,9039.57,6203.9,401.914,193.976,0 +296,384,100,12,15286.370000,0,5950.28,5384.03,461.906,173.38,0 +296,768,0,4,15803.794000,0,6923.84,20.177,384.733,206.134,0 +296,768,0,5,15784.437000,0,6928.16,20.1335,383.87,264.697,0 +296,768,0,6,15633.398000,0,6849.12,20.654,380.962,210.925,0 +296,768,0,7,9469.651000,0,4742.29,20.2545,437.602,284.718,0 +296,768,0,8,9368.892000,0,4629.5,321.776,445.242,254.69,0 +296,768,0,10,7342.101000,0,3592.81,556.47,420.168,269.353,0 +296,768,0,11,6981.656000,0,3228.52,642.641,470.023,251.714,0 +296,768,25,4,40347.021000,0,12574.3,6402.65,475.055,182.881,0 +296,768,25,5,38431.171000,0,12398,5795.32,397.484,241.014,0 +296,768,25,6,38218.529000,0,12300.4,5784.5,398.915,187.438,0 +296,768,25,7,37190.591000,0,12124.7,5822.46,394.105,221.352,0 +296,768,25,8,20109.616000,0,8243.04,4255.57,411.297,255.2,0 +296,768,25,10,14193.205000,0,6029.17,3800.06,463.62,194.132,0 +296,768,25,11,14691.615000,0,6741.31,3318.42,390.836,203.417,0 +296,768,50,4,61689.708000,0,17956,11582.5,418.84,190.607,0 +296,768,50,5,62197.894000,0,18118.1,11578.3,479.697,244.81,0 +296,768,50,6,61678.728000,0,17964.5,11543.8,417.045,194.67,0 +296,768,50,7,65543.389000,0,19508.5,11493,474.555,218.915,0 +296,768,50,8,31808.250000,0,11974.7,8166.3,399.787,216.595,0 +296,768,50,9,35372.420000,0,13680.1,8050.37,469.856,317.389,0 +296,768,50,10,21337.285000,0,8635.81,6413.99,490.753,228.582,0 +296,768,50,11,24213.469000,0,10427.5,6265.06,388.528,179.445,0 +296,768,50,12,16559.823000,0,7225.79,5183.65,395.137,209.852,0 +296,768,75,4,82206.796000,0,22199.4,17324.5,435.205,214.867,0 +296,768,75,5,82022.172000,0,22191.6,17244.3,433.446,181.361,0 +296,768,75,6,82323.690000,0,22220.9,17269.9,499.903,175.406,0 +296,768,75,7,89694.707000,0,25032.2,17278.4,454.66,186.831,0 +296,768,75,8,42415.503000,0,14864.7,12115.1,473.163,225.053,0 +296,768,75,9,48873.197000,0,18420.6,11856.5,414.361,219.919,0 +296,768,75,10,29444.131000,0,11783.6,9305.39,395.355,328.721,0 +296,768,75,11,35807.420000,0,15162.4,9614.39,481.16,194.868,0 +296,768,75,12,21662.990000,0,8897.86,7496.68,394.914,185.27,0 +296,768,100,4,108045.208000,0,29068.3,23082.5,446.261,267.015,0 +296,768,100,5,108092.023000,0,29067.9,23140.8,442.634,219.638,0 +296,768,100,6,108493.832000,0,29335.5,23069.6,449.047,175.783,0 +296,768,100,7,122773.959000,0,34494.4,23046.1,490.798,222.695,0 +296,768,100,8,55716.810000,0,19629.5,16088.7,448.127,224.207,0 +296,768,100,9,64502.613000,0,23805.4,15770.2,449.487,215.214,0 +296,768,100,10,36960.648000,0,13814.2,12706.1,459.267,225.007,0 +296,768,100,11,43724.066000,0,18028.4,12232.8,455.641,257.904,0 +296,768,100,12,28264.223000,0,11657.7,9892.72,470.68,245.417,0 +296,1536,0,4,29483.695000,0,13585.3,22.6195,453.742,214.429,0 +296,1536,0,5,28822.511000,0,13440.5,20.594,380.477,256.649,0 +296,1536,0,6,29940.611000,0,13825.6,20.5235,445.191,196.22,0 +296,1536,0,7,16010.069000,0,9162.23,20.625,416.226,193.549,0 +296,1536,0,10,11404.883000,0,6890.57,467.305,379.806,210.596,0 +296,1536,0,11,9135.920000,0,5617.98,371.463,373.14,188.657,0 +296,1536,0,12,9077.742000,0,5531.78,442.529,374.977,192.138,0 395,6,0,1,549.759000,0,198.494,179.04,44.75,0,5.646 395,6,25,1,539.196000,0,192.308,174.378,44.006,0,5.7 395,6,50,1,545.386000,0,194.225,175.032,44.278,0,5.927 diff --git a/Schrick-Noah_MPI-Tasking.aux b/Schrick-Noah_MPI-Tasking.aux index c5e3610..32ed720 100644 --- a/Schrick-Noah_MPI-Tasking.aux +++ b/Schrick-Noah_MPI-Tasking.aux @@ -102,26 +102,18 @@ \newlabel{sec:test-platform}{{\mbox {VI-D}}{7}{Testing Platform}{subsection.6.4}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-E}}Testing Process}{7}{subsection.6.5}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {VII}Analysis and Results}{8}{section.7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Exploratory Data Analysis}{8}{subsection.7.1}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Parallel Coordinates Plot of MPI Tasking Parameters and Runtime(ms)}}{8}{figure.9}\protected@file@percent } \newlabel{fig:para_coords}{{9}{8}{Parallel Coordinates Plot of MPI Tasking Parameters and Runtime(ms)}{figure.9}{}} -\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-B}}Nonlinear Regression}{8}{subsection.7.2}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {VIII}Results}{8}{section.8}\protected@file@percent } -\newlabel{sec:Tasking-Results}{{VIII}{8}{Results}{section.8}{}} \@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces Number of Nodes and Exploits (Averaged) vs. Runtime (ms)}}{8}{figure.10}\protected@file@percent } \newlabel{fig:nodes-exp}{{10}{8}{Number of Nodes and Exploits (Averaged) vs. Runtime (ms)}{figure.10}{}} -\bibdata{Bibliography} -\bibcite{9678822}{1} \@writefile{lof}{\contentsline {figure}{\numberline {11}{\ignorespaces Applicability of Exploits (\%) and Database Load (\%) (Averaged) vs. Runtime (ms)}}{9}{figure.11}\protected@file@percent } \newlabel{fig:appl-load}{{11}{9}{Applicability of Exploits (\%) and Database Load (\%) (Averaged) vs. Runtime (ms)}{figure.11}{}} -\@writefile{lof}{\contentsline {figure}{\numberline {12}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size}}{9}{figure.12}\protected@file@percent } -\newlabel{fig:Spd-Eff-Task}{{12}{9}{Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size}{figure.12}{}} -\@writefile{lof}{\contentsline {figure}{\numberline {13}{\ignorespaces MPI Tasking Approach Runtime Results}}{9}{figure.13}\protected@file@percent } -\newlabel{fig:Tasking-RT}{{13}{9}{MPI Tasking Approach Runtime Results}{figure.13}{}} -\@writefile{lof}{\contentsline {figure}{\numberline {14}{\ignorespaces Results for the MPI Tasking Approach in Terms of Speedup}}{9}{figure.14}\protected@file@percent } -\newlabel{fig:Tasking-Spd}{{14}{9}{Results for the MPI Tasking Approach in Terms of Speedup}{figure.14}{}} -\@writefile{lof}{\contentsline {figure}{\numberline {15}{\ignorespaces Results for the MPI Tasking Approach in Terms of Efficiency}}{9}{figure.15}\protected@file@percent } -\newlabel{fig:Tasking-Eff}{{15}{9}{Results for the MPI Tasking Approach in Terms of Efficiency}{figure.15}{}} +\@writefile{lof}{\contentsline {figure}{\numberline {12}{\ignorespaces Minimum, Maximum, and Mean Speedups of MPI Tasking Across All Problem Sizes}}{9}{figure.12}\protected@file@percent } +\newlabel{fig:overall-speedup}{{12}{9}{Minimum, Maximum, and Mean Speedups of MPI Tasking Across All Problem Sizes}{figure.12}{}} +\@writefile{lof}{\contentsline {figure}{\numberline {13}{\ignorespaces Minimum, Maximum, and Mean Efficiencies of MPI Tasking Across All Problem Sizes}}{9}{figure.13}\protected@file@percent } +\newlabel{fig:overall-efficiency}{{13}{9}{Minimum, Maximum, and Mean Efficiencies of MPI Tasking Across All Problem Sizes}{figure.13}{}} +\bibdata{Bibliography} +\bibcite{9678822}{1} \bibcite{7993827}{2} \bibcite{8652334}{3} \bibcite{baloyi_guidelines_2019}{4} @@ -134,6 +126,13 @@ \bibcite{pacheco_introduction_2011}{11} \bibcite{ainsworth_graph_2016}{12} \bibcite{yao_efficient_2018}{13} +\@writefile{lof}{\contentsline {figure}{\numberline {14}{\ignorespaces Mean Speedup and Efficiency for the Exploit Parameter Across the Number of Compute Nodes}}{10}{figure.14}\protected@file@percent } +\newlabel{fig:param-exploit}{{14}{10}{Mean Speedup and Efficiency for the Exploit Parameter Across the Number of Compute Nodes}{figure.14}{}} +\@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusion and Future Work}{10}{section.8}\protected@file@percent } +\newlabel{sec:FW}{{VIII}{10}{Conclusion and Future Work}{section.8}{}} +\@writefile{toc}{\contentsline {section}{References}{10}{section*.1}\protected@file@percent } +\@writefile{lof}{\contentsline {figure}{\numberline {15}{\ignorespaces Mean Speedup and Efficiency for the Applicability of Exploit Parameter Across the Number of Compute Nodes}}{10}{figure.15}\protected@file@percent } +\newlabel{fig:param-appl}{{15}{10}{Mean Speedup and Efficiency for the Applicability of Exploit Parameter Across the Number of Compute Nodes}{figure.15}{}} \bibcite{zhang_boosting_2017}{14} \bibcite{dai_fpgp_2016}{15} \bibcite{arifuzzaman_fast_2015}{16} @@ -149,7 +148,6 @@ \bibcite{li_combining_2019}{26} \bibcite{Slurm}{27} \bibstyle{ieeetr} -\@writefile{toc}{\contentsline {section}{\numberline {IX}Conclusion and Future Work}{10}{section.9}\protected@file@percent } -\newlabel{sec:FW}{{IX}{10}{Conclusion and Future Work}{section.9}{}} -\@writefile{toc}{\contentsline {section}{References}{10}{section*.1}\protected@file@percent } -\gdef \@abspage@last{10} +\@writefile{lof}{\contentsline {figure}{\numberline {16}{\ignorespaces Mean Speedup and Efficiency for the Database Load Parameter Across the Number of Compute Nodes}}{11}{figure.16}\protected@file@percent } +\newlabel{fig:param-load}{{16}{11}{Mean Speedup and Efficiency for the Database Load Parameter Across the Number of Compute Nodes}{figure.16}{}} +\gdef \@abspage@last{11} diff --git a/Schrick-Noah_MPI-Tasking.log b/Schrick-Noah_MPI-Tasking.log index b4e7481..fbbee17 100644 --- a/Schrick-Noah_MPI-Tasking.log +++ b/Schrick-Noah_MPI-Tasking.log @@ -1,8 +1,8 @@ -This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 18 APR 2023 16:06 +This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 22 APR 2023 16:00 entering extended mode restricted \write18 enabled. %&-line parsing enabled. -**Schrick-Noah_MPI-Tasking.tex +**Schrick-Noah_MPI-Tasking (./Schrick-Noah_MPI-Tasking.tex LaTeX2e <2022-11-01> patch level 1 L3 programming layer <2023-02-22> @@ -537,34 +537,34 @@ Underfull \hbox (badness 3260) in paragraph at lines 76--79 [] [2] -<./images/horiz_task.drawio.png, id=190, 1181.41376pt x 785.93625pt> +<./images/horiz_task.drawio.png, id=177, 1181.41376pt x 785.93625pt> File: ./images/horiz_task.drawio.png Graphic file (type png) Package pdftex.def Info: ./images/horiz_task.drawio.png used on input line 115 . (pdftex.def) Requested size: 252.0pt x 167.64183pt. -<./images/node-alloc.png, id=193, 818.30719pt x 536.75531pt> +<./images/node-alloc.png, id=180, 818.30719pt x 536.75531pt> File: ./images/node-alloc.png Graphic file (type png) Package pdftex.def Info: ./images/node-alloc.png used on input line 127. (pdftex.def) Requested size: 252.0pt x 165.29492pt. [3 <./images/horiz_task.drawio.png> <./images/node-alloc.PNG>] -<./images/Task1-Data-Dist.png, id=204, 597.98407pt x 197.48781pt> +<./images/Task1-Data-Dist.png, id=192, 597.98407pt x 197.48781pt> File: ./images/Task1-Data-Dist.png Graphic file (type png) Package pdftex.def Info: ./images/Task1-Data-Dist.png used on input line 144. (pdftex.def) Requested size: 252.0pt x 83.22455pt. -<./images/Task1-Case1.png, id=208, 586.44093pt x 339.51843pt> +<./images/Task1-Case1.png, id=196, 586.44093pt x 339.51843pt> File: ./images/Task1-Case1.png Graphic file (type png) Package pdftex.def Info: ./images/Task1-Case1.png used on input line 153. (pdftex.def) Requested size: 252.0pt x 145.89163pt. -<./images/Task1-Case2.png, id=209, 702.37407pt x 414.79968pt> +<./images/Task1-Case2.png, id=197, 702.37407pt x 414.79968pt> File: ./images/Task1-Case2.png Graphic file (type png) Package pdftex.def Info: ./images/Task1-Case2.png used on input line 160. (pdftex.def) Requested size: 252.0pt x 148.82143pt. -<./images/Sync-Fire.png, id=211, 489.83pt x 1053.9375pt> +<./images/Sync-Fire.png, id=199, 489.83pt x 1053.9375pt> File: ./images/Sync-Fire.png Graphic file (type png) Package pdftex.def Info: ./images/Sync-Fire.png used on input line 170. @@ -584,13 +584,13 @@ Underfull \hbox (badness 1389) in paragraph at lines 216--217 LaTeX Warning: No positions in optional float specifier. Default added (so using `tbp') on input line 218. -<./images/NA.png, id=235, 369.38pt x 118.4425pt> +<./images/NA.png, id=223, 369.38pt x 118.4425pt> File: ./images/NA.png Graphic file (type png) Package pdftex.def Info: ./images/NA.png used on input line 242. (pdftex.def) Requested size: 184.68954pt x 59.2211pt. [6 <./images/NA.png>] -<./images/Applicable_E.png, id=246, 360.34625pt x 104.39pt> +<./images/Applicable_E.png, id=234, 360.34625pt x 104.39pt> File: ./images/Applicable_E.png Graphic file (type png) Package pdftex.def Info: ./images/Applicable_E.png used on input line 266. @@ -606,73 +606,82 @@ Underfull \hbox (badness 7451) in paragraph at lines 299--300 [] [7 <./images/Applicable_E.png>] -<./images/para_coords.png, id=262, 1468.48625pt x 451.6875pt> +<./images/para_coords.png, id=250, 1468.48625pt x 451.6875pt> File: ./images/para_coords.png Graphic file (type png) -Package pdftex.def Info: ./images/para_coords.png used on input line 310. +Package pdftex.def Info: ./images/para_coords.png used on input line 309. (pdftex.def) Requested size: 252.0pt x 77.50954pt. -<./images/nodes-runtime.png, id=263, 431.4519pt x 330.9966pt> +<./images/nodes-runtime.png, id=251, 431.4519pt x 330.9966pt> File: ./images/nodes-runtime.png Graphic file (type png) -Package pdftex.def Info: ./images/nodes-runtime.png used on input line 318. +Package pdftex.def Info: ./images/nodes-runtime.png used on input line 317. (pdftex.def) Requested size: 252.0pt x 193.33171pt. -<./images/exploits-runtime.png, id=264, 409.7709pt x 350.5095pt> +<./images/exploits-runtime.png, id=252, 409.7709pt x 350.5095pt> File: ./images/exploits-runtime.png Graphic file (type png) -Package pdftex.def Info: ./images/exploits-runtime.png used on input line 319. +Package pdftex.def Info: ./images/exploits-runtime.png used on input line 318. (pdftex.def) Requested size: 252.0pt x 215.55405pt. -<./images/applicability-runtime.png, id=265, 431.4519pt x 337.5009pt> +<./images/applicability-runtime.png, id=253, 431.4519pt x 337.5009pt> File: ./images/applicability-runtime.png Graphic file (type png) Package pdftex.def Info: ./images/applicability-runtime.png used on input line - 326. + 325. (pdftex.def) Requested size: 252.0pt x 197.13081pt. -<./images/dbload-runtime.png, id=266, 431.4519pt x 337.5009pt> +<./images/dbload-runtime.png, id=254, 431.4519pt x 337.5009pt> File: ./images/dbload-runtime.png Graphic file (type png) -Package pdftex.def Info: ./images/dbload-runtime.png used on input line 327. +Package pdftex.def Info: ./images/dbload-runtime.png used on input line 326. (pdftex.def) Requested size: 252.0pt x 197.13081pt. +<./images/overall-speedup.png, id=258, 409.7709pt x 346.1733pt> +File: ./images/overall-speedup.png Graphic file (type png) + +Package pdftex.def Info: ./images/overall-speedup.png used on input line 337. +(pdftex.def) Requested size: 252.0pt x 212.88737pt. + [8 <./images/para_coords.png> <./images/nodes-runtime.png> <./images/exploits- +runtime.png>] +<./images/overall-efficiency.png, id=274, 409.7709pt x 346.1733pt> +File: ./images/overall-efficiency.png Graphic file (type png) + +Package pdftex.def Info: ./images/overall-efficiency.png used on input line 34 +7. +(pdftex.def) Requested size: 252.0pt x 212.88737pt. -Underfull \hbox (badness 3713) in paragraph at lines 339--340 -[]\OT1/ptm/m/n/10 In terms of efficiency, 2 compute nodes offer the - [] - -[8 <./images/para_coords.png> <./images/nodes-runtime.png> <./images/exploits-r -untime.png>] -<./images/Speedup-Esize-Tasking.png, id=288, 620.208pt x 321.93pt> -File: ./images/Speedup-Esize-Tasking.png Graphic file (type png) - -Package pdftex.def Info: ./images/Speedup-Esize-Tasking.png used on input line - 347. -(pdftex.def) Requested size: 252.0pt x 130.80338pt. -<./images/Eff-Esize-Tasking.png, id=289, 620.208pt x 322.149pt> -File: ./images/Eff-Esize-Tasking.png Graphic file (type png) - -Package pdftex.def Info: ./images/Eff-Esize-Tasking.png used on input line 348 -. -(pdftex.def) Requested size: 252.0pt x 130.89236pt. -<./images/Tasking_RT.png, id=290, 860.46469pt x 257.96375pt> -File: ./images/Tasking_RT.png Graphic file (type png) - -Package pdftex.def Info: ./images/Tasking_RT.png used on input line 355. -(pdftex.def) Requested size: 252.0pt x 75.54756pt. -<./images/Tasking_Spd.png, id=291, 860.46469pt x 276.53313pt> -File: ./images/Tasking_Spd.png Graphic file (type png) - -Package pdftex.def Info: ./images/Tasking_Spd.png used on input line 362. -(pdftex.def) Requested size: 252.0pt x 80.98582pt. -<./images/Tasking_Eff.png, id=292, 860.46469pt x 276.53313pt> -File: ./images/Tasking_Eff.png Graphic file (type png) - -Package pdftex.def Info: ./images/Tasking_Eff.png used on input line 369. -(pdftex.def) Requested size: 252.0pt x 80.98582pt. - (./Schrick-Noah_MPI-Tasking.bbl Underfull \vbox (badness 3815) has occurred while \output is active [] [9 <./images/applicability-runtime.png> <./images/dbload-runtime.png> <./image -s/Speedup-Esize-Tasking.png> <./images/Eff-Esize-Tasking.png> <./images/Tasking -_RT.png> <./images/Tasking_Spd.png> <./images/Tasking_Eff.png>] +s/overall-speedup.png> <./images/overall-efficiency.png>] +<./images/exploit-speedup.png, id=292, 414.8298pt x 312.2064pt> +File: ./images/exploit-speedup.png Graphic file (type png) + +Package pdftex.def Info: ./images/exploit-speedup.png used on input line 357. +(pdftex.def) Requested size: 252.0pt x 189.65482pt. +<./images/exploit-eff.png, id=293, 414.8298pt x 312.2064pt> +File: ./images/exploit-eff.png Graphic file (type png) + +Package pdftex.def Info: ./images/exploit-eff.png used on input line 358. +(pdftex.def) Requested size: 252.0pt x 189.65482pt. +<./images/appl-speedup.png, id=294, 409.7709pt x 312.2064pt> +File: ./images/appl-speedup.png Graphic file (type png) + +Package pdftex.def Info: ./images/appl-speedup.png used on input line 365. +(pdftex.def) Requested size: 252.0pt x 191.99866pt. +<./images/appl-eff.png, id=295, 409.7709pt x 312.2064pt> +File: ./images/appl-eff.png Graphic file (type png) + +Package pdftex.def Info: ./images/appl-eff.png used on input line 366. +(pdftex.def) Requested size: 252.0pt x 191.99866pt. +<./images/load-speedup.png, id=296, 409.7709pt x 312.2064pt> +File: ./images/load-speedup.png Graphic file (type png) + +Package pdftex.def Info: ./images/load-speedup.png used on input line 373. +(pdftex.def) Requested size: 252.0pt x 191.99866pt. +<./images/load-eff.png, id=297, 409.7709pt x 312.2064pt> +File: ./images/load-eff.png Graphic file (type png) + +Package pdftex.def Info: ./images/load-eff.png used on input line 374. +(pdftex.def) Requested size: 252.0pt x 191.99866pt. + (./Schrick-Noah_MPI-Tasking.bbl Underfull \hbox (badness 1442) in paragraph at lines 21--26 \OT1/ptm/m/n/8 A Focus on Cyberphysical Systems and Internet of Things,'' in [] @@ -693,7 +702,8 @@ Underfull \hbox (badness 1859) in paragraph at lines 65--68 []\OT1/ptm/m/n/8 P. Yao, L. Zheng, X. Liao, H. Jin, and B. He, ``An efficient [] - +[10 <./images/exploit-speedup.png> <./images/exploit-eff.png> <./images/appl-sp +eedup.png> <./images/appl-eff.png>] Underfull \hbox (badness 10000) in paragraph at lines 110--114 []\OT1/ptm/m/n/8 J. Siek, L.-Q. Lee, and A. Lumsdaine, [] @@ -715,22 +725,20 @@ Before submitting the final camera ready copy, remember to: uses only Type 1 fonts and that every step in the generation process uses the appropriate paper size. -[10] (./Schrick-Noah_MPI-Tasking.aux) - -LaTeX Warning: Label(s) may have changed. Rerun to get cross-references right. - +[11 <./images/load-speedup.png> <./images/load-eff.png>] +(./Schrick-Noah_MPI-Tasking.aux) Package rerunfilecheck Info: File `Schrick-Noah_MPI-Tasking.out' has not change d. -(rerunfilecheck) Checksum: F261765C4242D52E5D05144E1219080C;3827. +(rerunfilecheck) Checksum: 267D7A1F68719DE5E57F3E8948B6C837;3398. ) Here is how much of TeX's memory you used: - 12305 strings out of 476025 - 196397 string characters out of 5796533 + 12325 strings out of 476025 + 196992 string characters out of 5796533 1871388 words of memory out of 5000000 - 32492 multiletter control sequences out of 15000+600000 + 32510 multiletter control sequences out of 15000+600000 550927 words of font info for 105 fonts, out of 8000000 for 9000 1141 hyphenation exceptions out of 8191 - 75i,14n,76p,2026b,600s stack positions out of 5000i,500n,10000p,200000b,80000s + 75i,14n,76p,2022b,593s stack positions out of 5000i,500n,10000p,200000b,80000s -Output written on Schrick-Noah_MPI-Tasking.pdf (10 pages, 1313338 bytes). +Output written on Schrick-Noah_MPI-Tasking.pdf (11 pages, 897394 bytes). PDF statistics: - 370 PDF objects out of 1000 (max. 8388607) - 304 compressed objects within 4 object streams - 82 named destinations out of 1000 (max. 500000) - 307 words of extra memory for PDF output out of 10000 (max. 10000000) + 373 PDF objects out of 1000 (max. 8388607) + 298 compressed objects within 3 object streams + 81 named destinations out of 1000 (max. 500000) + 298 words of extra memory for PDF output out of 10000 (max. 10000000) diff --git a/Schrick-Noah_MPI-Tasking.out b/Schrick-Noah_MPI-Tasking.out index b9f909e..9a4b3a7 100644 --- a/Schrick-Noah_MPI-Tasking.out +++ b/Schrick-Noah_MPI-Tasking.out @@ -20,8 +20,5 @@ \BOOKMARK [2][-]{subsection.6.4}{\376\377\000T\000e\000s\000t\000i\000n\000g\000\040\000P\000l\000a\000t\000f\000o\000r\000m}{section.6}% 20 \BOOKMARK [2][-]{subsection.6.5}{\376\377\000T\000e\000s\000t\000i\000n\000g\000\040\000P\000r\000o\000c\000e\000s\000s}{section.6}% 21 \BOOKMARK [1][-]{section.7}{\376\377\000A\000n\000a\000l\000y\000s\000i\000s\000\040\000a\000n\000d\000\040\000R\000e\000s\000u\000l\000t\000s}{}% 22 -\BOOKMARK [2][-]{subsection.7.1}{\376\377\000E\000x\000p\000l\000o\000r\000a\000t\000o\000r\000y\000\040\000D\000a\000t\000a\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.7}% 23 -\BOOKMARK [2][-]{subsection.7.2}{\376\377\000N\000o\000n\000l\000i\000n\000e\000a\000r\000\040\000R\000e\000g\000r\000e\000s\000s\000i\000o\000n}{section.7}% 24 -\BOOKMARK [1][-]{section.8}{\376\377\000R\000e\000s\000u\000l\000t\000s}{}% 25 -\BOOKMARK [1][-]{section.9}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n\000\040\000a\000n\000d\000\040\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k}{}% 26 -\BOOKMARK [1][-]{section*.1}{\376\377\000R\000e\000f\000e\000r\000e\000n\000c\000e\000s}{}% 27 +\BOOKMARK [1][-]{section.8}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n\000\040\000a\000n\000d\000\040\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k}{}% 23 +\BOOKMARK [1][-]{section*.1}{\376\377\000R\000e\000f\000e\000r\000e\000n\000c\000e\000s}{}% 24 diff --git a/Schrick-Noah_MPI-Tasking.pdf b/Schrick-Noah_MPI-Tasking.pdf index 449450f..47abf53 100644 Binary files a/Schrick-Noah_MPI-Tasking.pdf and b/Schrick-Noah_MPI-Tasking.pdf differ diff --git a/Schrick-Noah_MPI-Tasking.tex b/Schrick-Noah_MPI-Tasking.tex index fb459c2..794d355 100644 --- a/Schrick-Noah_MPI-Tasking.tex +++ b/Schrick-Noah_MPI-Tasking.tex @@ -246,7 +246,7 @@ Task 1 loops through the number of exploits and checks each exploit against the \end{figure} \subsection{Applicability of Exploits} -When the number of exploits is artificially increased, the runtime for the overall generation process also increases. However, solely increasing the number of exploits adds a strain on only Task 1; Tasks 0, 2, 3, 4, and 5 are not adequately stress-tested through the number of exploits alone. As a result, additional parameters will need to be altered to capture a thorough image of the tasking performance. +When the number of exploits is artificially increased, the runtime for the overall generation process also increases. However, solely increasing the number of exploits adds a strain on only Task 1; Tasks 0, 2, 3, 4, and 5 are not adequately stress tested through the number of exploits alone. As a result, additional parameters will need to be altered to capture a thorough image of the tasking performance. One parameter that can be carefully altered without affecting the resulting graph is the applicability of exploits. As the number of exploits applicable to any state grows, the runtime for Task 2 similarly increases since it must process all applicable exploits and generate new states and edges from the current state. In order for an exploit to be applicable and to not change the resulting graph, the exploit needs to have a precondition that is universally true, with a postcondition that has no effect. For the automobile example, an alteration to the ``not applicable" exploit seen in Figure \ref{fig:NA-exp} can be performed. The new, artificially applicable exploit can be seen in Figure \ref{fig:Appl-exp}. These artificial exploits will be applicable for any asset at any state in the test network, since no car in this example will ever posses a quality that allows it to fly. Likewise, though the exploit will be processed, the postcondition updates the car quality to match the quality it already contains (``flying$\_$car=false" is instantiated in the input network model). The update keyword in the postcondition still triggers the update function, even if no change is actually made. By updating the car quality in this manner, it is ensured that no change to the resulting graph is made, while still gathering accurate timing data and not skipping any functions called in Task 2. @@ -285,7 +285,7 @@ The database load parameter was changed based on percentage of the total resulti \item{100\% Load (Write to the database on every new state) - DBLoad = 1} \end{itemize} -The database load parameter stresses Tasks 0, 4, and 5. Task 4 will be stressed on all load parameters, except for when the load is 0\% (size 395), which serves as the control. Task 4 will experience the greatest stress when the load parameter is 100\% (size 1), since as soon as new states are discovered in previous tasks, Task 4 will begin. Task 0 and Task 5 will experience stress at the same intervals. When the queue of unexplored states increases to a size greater than the load parameter, Task 5 will empty the queue, and Task 0 will be forced to pull new states from the database. +The database load parameter stresses Tasks 0, 4, and 5. Task 4 will be stress tested on all load parameters, except for when the load is 0\% (size 395), which serves as the control. Task 4 will experience the greatest workload when the load parameter is 100\% (size 1), since as soon as new states are discovered in previous tasks, Task 4 will begin. Task 0 and Task 5 will experience stress at the same intervals. When the queue of unexplored states increases to a size greater than the load parameter, Task 5 will empty the queue, and Task 0 will be forced to pull new states from the database. \subsection{Testing Platform} \label{sec:test-platform} All data was collected on a 13 node cluster, with 12 nodes serving as dedicated compute nodes, and 1 node serving as the login node. Each compute node has a configuration as follows: @@ -340,7 +340,7 @@ Figure \ref{fig:overall-speedup} displays the overall minimum, maximum, and mean \label{fig:overall-speedup} \end{figure} -Figure \ref{fig:overall-efficiency} displays the overall minimum, maximum, and mean of efficiency across all problem sizes. In terms of efficiency, 2 compute nodes offer the greatest value. While the 2 compute node configuration does offer the greatest efficiency, it does not provide a speedup greater than 1.0 on any of the testing cases conducted. The results also demonstrate that an odd number of compute nodes in a fully saturated pipeline has better efficiency that an even number of compute nodes. When referring to Figure \ref{fig:node-alloc}, when there is an odd number number of compute nodes, Task 1 is allocated more nodes than Task 2. Task 1 was responsible for iterating through an increased size of the exploit list, so more nodes is advantageous in distributing the workload. However, when many exploits were not applicable, Task 2 had a lower workload. Some test cases only had 6 applicable exploits, which is a substantially lower workload for Task 2 compared to cases where Task 1 had upwards of 49,000 exploits. As the applicability of exploits increase, the disparity in efficiency for odd and even number of nodes is not present. +Figure \ref{fig:overall-efficiency} displays the overall minimum, maximum, and mean of efficiency across all problem sizes. In terms of efficiency, 2 compute nodes offer the greatest value. While the 2 compute node configuration does offer the greatest efficiency, it does not provide a speedup greater than 1.0 on any of the testing cases conducted. The results also demonstrate that an odd number of compute nodes in a fully saturated pipeline has better efficiency that an even number of compute nodes. When referring to Figure \ref{fig:node-alloc}, when there is an odd number number of compute nodes, Task 1 is allocated more nodes than Task 2. Task 1 was responsible for iterating through an increased size of the exploit list, so more nodes is advantageous in distributing the workload. However, when many exploits were not applicable, Task 2 had a lower workload. Some test cases only had 6 applicable exploits, which is a substantially lower workload for Task 2 compared to cases where Task 1 had upwards of 49,000 exploits. As the applicability of exploits increases, the disparity in efficiency for odd and even number of nodes is not present. \begin{figure}[htp] \centering @@ -350,44 +350,30 @@ Figure \ref{fig:overall-efficiency} displays the overall minimum, maximum, and m \label{fig:overall-efficiency} \end{figure} -\section{Results} \label{sec:Tasking-Results} -A series of tests were conducted on the platform described at the beginning of Section \ref{sec:test-platform}, and results were collected in regards to the effect of the MPI Tasking approach on increasing sizes of exploit lists for a varying number of nodes. The exploit list initially began with 6 items, and each test scaled the number of exploits by a factor of 2. The final test was with an exploit list with 49,512 entries. If all of the items in these exploit lists were applicable, the runtime would be too great for feasible testing due to the state space explosion. To prevent state-space explosion but still gather valid results, each exploit list in the tests contained 6 exploits that could be applicable, and all remaining exploits were not applicable. The not applicable exploits were created in a fashion similar to that seen in Figure \ref{fig:NA-exp}. By creating a multitude of not applicable exploits, testing can safely be conducted by ensuring state space explosion would not occur while still observing the effectiveness of the tasking approach. - -The results of the Tasking Approach can be seen in Figure \ref{fig:Spd-Eff-Task}. In terms of speedup, when the number of entries in the exploit list is small, the serial approach has better performance. This is expected due to the communication cost requiring more time than it does to generate a state, as discussed in Section \ref{sec:Task-perf-expec}. However, as the number of items in the exploit list increase, the Tasking Approach quickly begins to outperform the serial approach. It is notable that even when the tasking pipeline is not fully saturated (when there are less compute nodes assigned than tasks), the performance is still approximately equal to that of the serial approach. The other noticeable feature is that as more compute nodes are assigned, the speedup continues to increase. - -In terms of efficiency, 2 compute nodes offer the greatest value since the speedup using 2 compute nodes is approximately 1.0 as the exploit list size increases. While the 2 compute node option does offer the greatest efficiency, it does not provide a speedup greater than 1.0 on any of the testing cases conducted. The results also demonstrate that an odd number of compute nodes in a fully saturated pipeline has better efficiency that an even number of compute nodes. When referring to Figure \ref{fig:node-alloc}, when there is an odd number number of compute nodes, Task 1 is allocated more nodes than Task 2. In the testing conducted, Task 1 was responsible for iterating through an increased size of the exploit list, so more nodes is advantageous in distributing the workload. However, since many exploits were not applicable, Task 2 had a lower workload where only 6 exploits could be applicable. This will be further elaborated upon in Section \ref{sec:FW}, but it is expected that efficiency will increase for real networks, since nodes in Task 2 will see a realistic workload. - -Figures \ref{fig:Tasking-RT}, \ref{fig:Tasking-Spd}, and \ref{fig:Tasking-Eff} display the results of the tasking approach for runtime in milliseconds, speedup, and efficiency respectively in table format. - - +Speedups and efficiencies were also computed across each parameter. Using pivot tables, mean speedups and mean efficiencies were computed for a parameter across all node configurations. Figures \ref{fig:param-exploit}, \ref{fig:param-appl}, \ref{fig:param-load} display the speedups and efficiencies of the exploit parameter, applicability of exploits parameter, and the database load parameter, respectively. The number of nodes has the largest impact on the exploit parameter, and Figure \ref{fig:param-exploit} illustrates that even when fewer nodes are used, speedup can still be obtained as the exploit list grows in size. Figure \ref{fig:param-appl} demonstrates that though Task 2 has less of an impact on overall runtime and contribution to speedup, speedup is still achievable as more compute nodes are added and as the applicability of exploits increase. Figure \ref{fig:param-load} highlights the increasing runtime as more database operations are performed. By dedicating nodes to solely handle database operations, the tasking pipeline is able to move to new state generation without the need to wait for all preceding database operations to complete. \begin{figure} \centering - \includegraphics[width=\linewidth]{"./images/Speedup-Esize-Tasking.png"} - \includegraphics[width=\linewidth]{"./images/Eff-Esize-Tasking.png"} - \caption{Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size} - \label{fig:Spd-Eff-Task} + \includegraphics[width=\linewidth]{"./images/exploit-speedup.png"} + \includegraphics[width=\linewidth]{"./images/exploit-eff.png"} + \caption{Mean Speedup and Efficiency for the Exploit Parameter Across the Number of Compute Nodes} + \label{fig:param-exploit} \end{figure} \begin{figure} \centering - \includegraphics[width=\linewidth]{"./images/Tasking_RT.png"} - \caption[MPI Tasking Approach Runtime Results]{Results for the MPI Tasking Approach in Terms of Runtime in Milliseconds} - \label{fig:Tasking-RT} + \includegraphics[width=\linewidth]{"./images/appl-speedup.png"} + \includegraphics[width=\linewidth]{"./images/appl-eff.png"} + \caption{Mean Speedup and Efficiency for the Applicability of Exploit Parameter Across the Number of Compute Nodes} + \label{fig:param-appl} \end{figure} \begin{figure} \centering - \includegraphics[width=\linewidth]{"./images/Tasking_Spd.png"} - \caption{Results for the MPI Tasking Approach in Terms of Speedup} - \label{fig:Tasking-Spd} -\end{figure} - -\begin{figure} - \centering - \includegraphics[width=\linewidth]{"./images/Tasking_Eff.png"} - \caption{Results for the MPI Tasking Approach in Terms of Efficiency} - \label{fig:Tasking-Eff} + \includegraphics[width=\linewidth]{"./images/load-speedup.png"} + \includegraphics[width=\linewidth]{"./images/load-eff.png"} + \caption{Mean Speedup and Efficiency for the Database Load Parameter Across the Number of Compute Nodes} + \label{fig:param-load} \end{figure} diff --git a/images/appl-eff.png b/images/appl-eff.png new file mode 100644 index 0000000..1c26bfc Binary files /dev/null and b/images/appl-eff.png differ diff --git a/images/appl-speedup.png b/images/appl-speedup.png new file mode 100644 index 0000000..38a49d1 Binary files /dev/null and b/images/appl-speedup.png differ diff --git a/images/exploit-eff.png b/images/exploit-eff.png new file mode 100644 index 0000000..8514dd8 Binary files /dev/null and b/images/exploit-eff.png differ diff --git a/images/exploit-speedup.png b/images/exploit-speedup.png new file mode 100644 index 0000000..78389fb Binary files /dev/null and b/images/exploit-speedup.png differ diff --git a/images/load-eff.png b/images/load-eff.png new file mode 100644 index 0000000..0e3fd28 Binary files /dev/null and b/images/load-eff.png differ diff --git a/images/load-speedup.png b/images/load-speedup.png new file mode 100644 index 0000000..3281190 Binary files /dev/null and b/images/load-speedup.png differ diff --git a/images/overall-efficiency.png b/images/overall-efficiency.png new file mode 100644 index 0000000..688542d Binary files /dev/null and b/images/overall-efficiency.png differ diff --git a/images/overall-speedup.png b/images/overall-speedup.png new file mode 100644 index 0000000..45dffe5 Binary files /dev/null and b/images/overall-speedup.png differ