Subgraphing Root and Database Nodes

This commit is contained in:
Noah L. Schrick 2022-03-21 11:12:37 -05:00
parent 4cdb462a9f
commit a052a60bf1
14 changed files with 172 additions and 136 deletions

View File

@ -1,13 +1,13 @@
\relax
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{49}{}\protected@file@percent }
\newlabel{App:A}{{A}{49}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{50}{}\protected@file@percent }
\newlabel{App:B}{{B}{50}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{50}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{50}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{50}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{50}{}\protected@file@percent }
\newlabel{App:A}{{A}{50}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{51}{}\protected@file@percent }
\newlabel{App:B}{{B}{51}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{51}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{51}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{51}{}\protected@file@percent }
\@setckpt{Appendices}{
\setcounter{page}{51}
\setcounter{page}{52}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
@ -24,7 +24,7 @@
\setcounter{subparagraph}{0}
\setcounter{figure}{0}
\setcounter{table}{0}
\setcounter{caption@flags}{0}
\setcounter{caption@flags}{2}
\setcounter{continuedfloat}{0}
\setcounter{subfigure}{0}
\setcounter{subtable}{0}

View File

@ -43,7 +43,7 @@
\setcounter{subparagraph}{0}
\setcounter{figure}{2}
\setcounter{table}{0}
\setcounter{caption@flags}{0}
\setcounter{caption@flags}{2}
\setcounter{continuedfloat}{0}
\setcounter{subfigure}{0}
\setcounter{subtable}{0}

View File

@ -49,7 +49,7 @@
\setcounter{subparagraph}{0}
\setcounter{figure}{5}
\setcounter{table}{0}
\setcounter{caption@flags}{0}
\setcounter{caption@flags}{2}
\setcounter{continuedfloat}{0}
\setcounter{subfigure}{0}
\setcounter{subtable}{0}

View File

@ -45,11 +45,13 @@
\@writefile{lof}{\contentsline {figure}{\numberline {5.8}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{41}{}\protected@file@percent }
\newlabel{fig:subg}{{5.8}{41}}
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{41}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{41}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{42}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{42}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{42}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.9}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{43}{}\protected@file@percent }
\newlabel{fig:Task1-Case1}{{5.9}{43}}
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{43}{}\protected@file@percent }
\@setckpt{Chapter5}{
\setcounter{page}{43}
\setcounter{page}{44}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
@ -64,9 +66,9 @@
\setcounter{subsubsection}{0}
\setcounter{paragraph}{0}
\setcounter{subparagraph}{0}
\setcounter{figure}{8}
\setcounter{figure}{9}
\setcounter{table}{1}
\setcounter{caption@flags}{0}
\setcounter{caption@flags}{2}
\setcounter{continuedfloat}{0}
\setcounter{subfigure}{0}
\setcounter{subtable}{0}

View File

@ -172,7 +172,19 @@ The design of the subgraphing approach is devised of three main components: work
Each worker node will start each iteration of its while loop by checking for the finalize message or for a new state to receive. If no message is available to receive, it will continue to wait until one is available. Each worker node will continue this process until the finalize message is received, where it will exit the generation process. When a worker node receives a new state, it will follow the original graph generation process with a modification in the exploration approach. Since other nodes will also be generating subgraphs, using a breadth-first search is not the ideal option since the amount of duplicate work would be increased. Instead, the graph generation will utilize a depth-first search approach, where each node will explore up to a specified depth level. This depth level is specified before the generation process begins, so additional tuning can be performed as desired. After either the depth limit is reached, or no other states are reachable to be explored, the node will return its local frontier (if the node still has unexplored states it did not explore) and its generated subgraph. The node will then proceed to wait for a new message from the root node.
\TUsubsubsection{Root Node}
The root node is responsible for two main portions of the subgraphing approach - the distribution of work and the merging of results. The subgraphing approach begins by distributing the only state that is known at the beginning of the generation process to a single node. Once the node returns, two functions may occur. If the node indicates that there are still more states to explore, then the worker node's frontier gets merged with the root node's frontier. If the node discovered new states, then its subgraph gets merged with the root node's graph. This process occurs as long as there are more states to explore. The frontier merging process takes the worker node's frontier and emplaces it to the back of the root node's frontier, with an additional marker. Since each worker node follows a depth-first search, if two worker nodes pop from the front of the queue, there is a high likelihood that the worker nodes are exploring the same segment of the graph, resulting in more duplicate work. To prevent this, each worker node attempts to explore the same segment of the graph throughout the generation process. When the frontiers are merged, the root node includes an additional marker for each worker node to indicate where the end of a node's frontier is in relation to the overall root frontier. When distributing work to a worker node, the root node will pull a state from the queue at a position equal to the node marker. If no marker is found for a worker node and the queue is not empty, then a random state is pulled from the queue instead. Figure \ref{fig:front-merg} displays the frontier merging process along with the data distribution.
\begin{figure}[htp]
\includegraphics[width=\linewidth]{"./Chapter5_img/front_merge.drawio.png"}
\vspace{.2truein} \centerline{}
\caption{Frontier Merging and Data Distribution Process}
\label{fig:front-merg}
\end{figure}
The root node is also responsible for merging the subgraphs. The root node will receive a subgraph from each node if a subgraph exists, and add all unseen states to the root graph. This is conducted using the hash of each state, since using the state ID is inconsistent across worker nodes. If a state already exists in the root graph, the duplicate state is not added. Likewise, edges are added if the edge has not already been added to the root graph. For the subgraphing approach, edges have been slightly altered from having class members of ''From{\_}State{\_}ID" and ''To{\_}State{\_}ID" to ''From{\_}State{\_}Hash" and ''To{\_}State{\_}Hash" to ensure consistency across nodes.
\TUsubsubsection{Database Node}
A node dedicated to database operations is also present in this approach. The work performed for the subgraphing approach is identical to the work performed by Tasks 4 and 5 in the tasking approach, which is discussed in Section \ref{sec:T4T5}.
\TUsubsection{Performance Expectations}

View File

@ -0,0 +1 @@
<mxfile host="app.diagrams.net" modified="2022-03-21T15:13:56.309Z" agent="5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.74 Safari/537.36" etag="bq0hjWULFKfw4sdTiiCD" version="17.1.3" type="device"><diagram id="fkCfZY8VdyelDie9_iks" name="Page-1">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</diagram></mxfile>

Binary file not shown.

After

Width:  |  Height:  |  Size: 34 KiB

View File

@ -1,23 +1,23 @@
\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{45}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{45}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{45}{}\protected@file@percent }
\@setckpt{Chapter6}{
\setcounter{page}{45}
\setcounter{page}{46}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
@ -34,7 +34,7 @@
\setcounter{subparagraph}{0}
\setcounter{figure}{0}
\setcounter{table}{0}
\setcounter{caption@flags}{0}
\setcounter{caption@flags}{2}
\setcounter{continuedfloat}{0}
\setcounter{subfigure}{0}
\setcounter{subtable}{0}

View File

@ -1,9 +1,9 @@
\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{45}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{45}{}\protected@file@percent }
\newlabel{sec:FW}{{7.1}{45}}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{46}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{46}{}\protected@file@percent }
\newlabel{sec:FW}{{7.1}{46}}
\@setckpt{Chapter7}{
\setcounter{page}{46}
\setcounter{page}{47}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
@ -20,7 +20,7 @@
\setcounter{subparagraph}{0}
\setcounter{figure}{0}
\setcounter{table}{0}
\setcounter{caption@flags}{0}
\setcounter{caption@flags}{2}
\setcounter{continuedfloat}{0}
\setcounter{subfigure}{0}
\setcounter{subtable}{0}

View File

@ -32,9 +32,9 @@
\bibcite{cook_rage_2018}{9}
\bibcite{berry_graph_2007}{10}
\@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{46}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{47}{}\protected@file@percent }
\@writefile{toc}{\addvspace {10pt}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{46}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{47}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\bibcite{ainsworth_graph_2016}{11}
\bibcite{yao_efficient_2018}{12}
@ -54,4 +54,4 @@
\bibcite{louthan_hybrid_2011}{26}
\bibstyle{ieeetr}
\@input{Appendices.aux}
\gdef \@abspage@last{60}
\gdef \@abspage@last{61}

View File

@ -14,3 +14,4 @@
\contentsline {figure}{\numberline {5.6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }}{39}{}%
\contentsline {figure}{\numberline {5.7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }}{39}{}%
\contentsline {figure}{\numberline {5.8}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{41}{}%
\contentsline {figure}{\numberline {5.9}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{43}{}%

View File

@ -1,25 +1,25 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 20 MAR 2022 21:11
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.3.21) 21 MAR 2022 11:11
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
**Schrick-Noah_MS-Thesis
(./Schrick-Noah_MS-Thesis.tex
LaTeX2e <2021-11-15> patch level 1
L3 programming layer <2021-11-22>
L3 programming layer <2022-02-24>
(/usr/share/texmf-dist/tex/latex/base/report.cls
Document Class: report 2021/10/04 v1.4n Standard LaTeX document class
(/usr/share/texmf-dist/tex/latex/base/size12.clo
File: size12.clo 2021/10/04 v1.4n Standard LaTeX file (size option)
)
\c@part=\count183
\c@chapter=\count184
\c@section=\count185
\c@subsection=\count186
\c@subsubsection=\count187
\c@paragraph=\count188
\c@subparagraph=\count189
\c@figure=\count190
\c@table=\count191
\c@part=\count185
\c@chapter=\count186
\c@section=\count187
\c@subsection=\count188
\c@subsubsection=\count189
\c@paragraph=\count190
\c@subparagraph=\count191
\c@figure=\count192
\c@table=\count193
\abovecaptionskip=\skip47
\belowcaptionskip=\skip48
\bibindent=\dimen138
@ -58,27 +58,28 @@ File: pdftex.def 2020/10/05 v1.2a Graphics/color driver for pdftex
\Gin@req@width=\dimen140
)
(/usr/share/texmf-dist/tex/latex/caption/subcaption.sty
Package: subcaption 2020/10/07 v1.3j Sub-captions (AR)
Package: subcaption 2022/01/07 v1.5 Sub-captions (AR)
(/usr/share/texmf-dist/tex/latex/caption/caption.sty
Package: caption 2020/10/26 v3.5g Customizing captions (AR)
Package: caption 2022/03/01 v3.6b Customizing captions (AR)
(/usr/share/texmf-dist/tex/latex/caption/caption3.sty
Package: caption3 2020/10/21 v2.2e caption3 kernel (AR)
\captionmargin=\dimen141
\captionmargin@=\dimen142
\captionwidth=\dimen143
\caption@tempdima=\dimen144
\caption@indent=\dimen145
\caption@parindent=\dimen146
\caption@hangindent=\dimen147
Package: caption3 2022/03/17 v2.3b caption3 kernel (AR)
\caption@tempdima=\dimen141
\captionmargin=\dimen142
\caption@leftmargin=\dimen143
\caption@rightmargin=\dimen144
\caption@width=\dimen145
\caption@indent=\dimen146
\caption@parindent=\dimen147
\caption@hangindent=\dimen148
Package caption Info: Standard document class detected.
)
\c@caption@flags=\count192
\c@continuedfloat=\count193
\c@caption@flags=\count194
\c@continuedfloat=\count195
)
\c@subfigure=\count194
\c@subtable=\count195
\c@subfigure=\count196
\c@subtable=\count197
)
(/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
Package: tocloft 2017/08/31 v2.3i parameterised ToC, etc., typesetting
@ -112,8 +113,8 @@ Package tocloft Info: The document has chapter divisions on input line 51.
\cftbeforefigskip=\skip77
\cftfigindent=\skip78
\cftfignumwidth=\skip79
\c@lofdepth=\count196
\c@lotdepth=\count197
\c@lofdepth=\count198
\c@lotdepth=\count199
\cftbeforelottitleskip=\skip80
\cftafterlottitleskip=\skip81
\cftbeforetabskip=\skip82
@ -124,19 +125,22 @@ Package tocloft Info: The document has chapter divisions on input line 51.
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
Package: iftex 2020/03/06 v1.0d TeX engine tests
Package: iftex 2022/02/03 v1.0f TeX engine tests
)) (./TUthesis.sty
\numofchapters=\count198
\committeesize=\count199
\numofchapters=\count266
\committeesize=\count267
)
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
File: l3backend-pdftex.def 2021-12-14 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count266
File: l3backend-pdftex.def 2022-02-07 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count268
\l__pdf_internal_box=\box51
)
(./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux
) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux)
(./Appendices.aux))
) (./Chapter4.aux) (./Chapter5.aux
LaTeX Warning: Label `fig:Task1-Case1' multiply defined.
) (./Chapter6.aux) (./Chapter7.aux) (./Appendices.aux))
\openout1 = `Schrick-Noah_MS-Thesis.aux'.
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 121.
@ -153,18 +157,19 @@ LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 121.
LaTeX Font Info: ... okay on input line 121.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 121.
LaTeX Font Info: ... okay on input line 121.
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
[Loading MPS to PDF converter (version 2006.09.02).]
\scratchcounter=\count267
\scratchdimen=\dimen148
\scratchcounter=\count269
\scratchdimen=\dimen149
\scratchbox=\box52
\nofMPsegments=\count268
\nofMParguments=\count269
\nofMPsegments=\count270
\nofMParguments=\count271
\everyMPshowfont=\toks17
\MPscratchCnt=\count270
\MPscratchDim=\dimen149
\MPnumerator=\count271
\makeMPintoPDFobject=\count272
\MPscratchCnt=\count272
\MPscratchDim=\dimen150
\MPnumerator=\count273
\makeMPintoPDFobject=\count274
\everyMPtoPDFconversion=\toks18
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
@ -407,44 +412,59 @@ File: ./Chapter5_img/subgraphing.drawio.png Graphic file (type png)
Package pdftex.def Info: ./Chapter5_img/subgraphing.drawio.png used on input l
ine 165.
(pdftex.def) Requested size: 247.22552pt x 223.13535pt.
[40] [41 <./Chapter5_img/subgraphing.drawio.png>]) [42]
[40]
LaTeX Warning: Reference `fig:front-merg' on page 41 undefined on input line 17
5.
[41 <./Chapter5_img/subgraphing.drawio.png>]
<./Chapter5_img/front_merge.drawio.png, id=206, 1059.96pt x 465.74pt>
File: ./Chapter5_img/front_merge.drawio.png Graphic file (type png)
<use ./Chapter5_img/front_merge.drawio.png>
Package pdftex.def Info: ./Chapter5_img/front_merge.drawio.png used on input l
ine 178.
(pdftex.def) Requested size: 469.75499pt x 206.4044pt.
[42]) [43 <./Chapter5_img/front_merge.drawio.png>]
\openout2 = `Chapter6.aux'.
(./Chapter6.tex
CHAPTER 6.
[43
[44
]) [44]
]) [45]
\openout2 = `Chapter7.aux'.
(./Chapter7.tex
CHAPTER 7.
) [45
) [46
] (./Schrick-Noah_MS-Thesis.bbl [46
] (./Schrick-Noah_MS-Thesis.bbl [47
] [47])
\c@appendixno=\count273
[48]
] [48])
\c@appendixno=\count275
[49]
\openout2 = `Appendices.aux'.
(./Appendices.tex [49
(./Appendices.tex [50
])
[50] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
[51] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
(./Chapter7.aux) (./Appendices.aux))
LaTeX Warning: There were undefined references.
LaTeX Warning: There were multiply-defined labels.
)
(\end occurred inside a group at level 6)
@ -456,13 +476,13 @@ LaTeX Warning: There were undefined references.
### semi simple group (level 1) entered at line 52 (\begingroup)
### bottom level
Here is how much of TeX's memory you used:
3638 strings out of 478353
68975 string characters out of 5854635
369768 words of memory out of 5000000
21683 multiletter control sequences out of 15000+600000
407326 words of font info for 40 fonts, out of 8000000 for 9000
3742 strings out of 478276
70808 string characters out of 5853013
363714 words of memory out of 5000000
21866 multiletter control sequences out of 15000+600000
473155 words of font info for 41 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
67i,8n,77p,1398b,1431s stack positions out of 5000i,500n,10000p,200000b,80000s
67i,8n,77p,1728b,1424s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
@ -471,10 +491,10 @@ ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
y10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmti12.pfb></usr/
share/texmf-dist/fonts/type1/public/amsfonts/cm/cmtt12.pfb></usr/share/texmf-di
st/fonts/type1/public/cm-super/sfrm1200.pfb>
Output written on Schrick-Noah_MS-Thesis.pdf (60 pages, 1168713 bytes).
Output written on Schrick-Noah_MS-Thesis.pdf (61 pages, 1184836 bytes).
PDF statistics:
272 PDF objects out of 1000 (max. 8388607)
160 compressed objects within 2 object streams
278 PDF objects out of 1000 (max. 8388607)
163 compressed objects within 2 object streams
0 named destinations out of 1000 (max. 500000)
91 words of extra memory for PDF output out of 10000 (max. 10000000)
96 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

View File

@ -62,35 +62,35 @@
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{40}{}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{40}{}%
\contentsline {subsubsection}{Worker Nodes}{41}{}%
\contentsline {subsubsection}{Root Node}{41}{}%
\contentsline {subsubsection}{Database Node}{42}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{42}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{43}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{43}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{43}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{43}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{43}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{43}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{43}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{43}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{43}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{43}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{43}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{43}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{43}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{43}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{44}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{44}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{44}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{45}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{45}{}%
\contentsline {subsubsection}{Root Node}{42}{}%
\contentsline {subsubsection}{Database Node}{43}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{43}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{44}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{44}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{44}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{44}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{44}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{44}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{44}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{44}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{44}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{44}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{44}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{44}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{44}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{44}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{45}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{45}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{45}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{46}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{46}{}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{46}{}%
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{47}{}%
\addvspace {10pt}
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{46}{}%
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{47}{}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{49}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{50}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{50}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{50}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{50}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{50}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{51}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{51}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{51}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{51}{}%