diff --git a/Appendices.aux b/Appendices.aux index 4f08963..892a4c3 100644 --- a/Appendices.aux +++ b/Appendices.aux @@ -1,13 +1,13 @@ \relax -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{50}{}\protected@file@percent } -\newlabel{App:A}{{A}{50}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{51}{}\protected@file@percent } -\newlabel{App:B}{{B}{51}} -\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{51}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{51}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{51}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{51}{}\protected@file@percent } +\newlabel{App:A}{{A}{51}} +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{52}{}\protected@file@percent } +\newlabel{App:B}{{B}{52}} +\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{52}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{52}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{52}{}\protected@file@percent } \@setckpt{Appendices}{ -\setcounter{page}{52} +\setcounter{page}{53} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Chapter5.aux b/Chapter5.aux index bc14202..0d5580e 100644 --- a/Chapter5.aux +++ b/Chapter5.aux @@ -47,11 +47,12 @@ \@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{41}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Root Node}{42}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.9}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{43}{}\protected@file@percent } -\newlabel{fig:Task1-Case1}{{5.9}{43}} +\newlabel{fig:front-merg}{{5.9}{43}} \@writefile{toc}{\contentsline {subsubsection}{Database Node}{43}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{43}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.4}\it Results}{44}{}\protected@file@percent } \@setckpt{Chapter5}{ -\setcounter{page}{44} +\setcounter{page}{45} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} @@ -62,7 +63,7 @@ \setcounter{part}{0} \setcounter{chapter}{5} \setcounter{section}{4} -\setcounter{subsection}{3} +\setcounter{subsection}{4} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} diff --git a/Chapter5.tex b/Chapter5.tex index 78885ca..b49da59 100644 --- a/Chapter5.tex +++ b/Chapter5.tex @@ -187,4 +187,8 @@ The root node is also responsible for merging the subgraphs. The root node will A node dedicated to database operations is also present in this approach. The work performed for the subgraphing approach is identical to the work performed by Tasks 4 and 5 in the tasking approach, which is discussed in Section \ref{sec:T4T5}. \TUsubsection{Performance Expectations} +This approach is intended to reduce runtime when the frontier grows at a rate faster than can be explored. However, since this approach is designed for distributed systems, there is no guarantee that speedup can be achieved when duplicate work is performed. Not only is there wasted time by the worker nodes when duplicate work occurs, but duplicate work also contributes to a longer runtime due to increased communication between nodes to adequately explore the graph, and also leads to increased numbers of merging calls by the root node. The ideal scenario for the subgraphing approach is when the graph is sparse, and the graph more aligns with a tree structure where each node only has one parent. When the graph is sparse, there is a lower likelihood of duplicate work occurring, since worker nodes have a lower probability of exploring a graph node that connects to a different graph node that has been (or will be) explored by another worker node. If each graph node were only able to have one parent, there is a lower likelihood that worker nodes would explore the same graph cluster. + +\TUsubsection{Results} + diff --git a/Chapter6.aux b/Chapter6.aux index f29bb92..21c1ffb 100644 --- a/Chapter6.aux +++ b/Chapter6.aux @@ -1,23 +1,23 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{44}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{45}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{45}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{45}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{46}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{46}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{46}{}\protected@file@percent } \@setckpt{Chapter6}{ -\setcounter{page}{46} +\setcounter{page}{47} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Chapter7.aux b/Chapter7.aux index 09bdb82..bd2f212 100644 --- a/Chapter7.aux +++ b/Chapter7.aux @@ -1,9 +1,9 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{46}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{46}{}\protected@file@percent } -\newlabel{sec:FW}{{7.1}{46}} +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{47}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{47}{}\protected@file@percent } +\newlabel{sec:FW}{{7.1}{47}} \@setckpt{Chapter7}{ -\setcounter{page}{47} +\setcounter{page}{48} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Schrick-Noah_MS-Thesis.aux b/Schrick-Noah_MS-Thesis.aux index d121652..b1c2a2f 100644 --- a/Schrick-Noah_MS-Thesis.aux +++ b/Schrick-Noah_MS-Thesis.aux @@ -32,9 +32,9 @@ \bibcite{cook_rage_2018}{9} \bibcite{berry_graph_2007}{10} \@writefile{toc}{{\hfill \ }} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{47}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{48}{}\protected@file@percent } \@writefile{toc}{\addvspace {10pt}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{47}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{48}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} \bibcite{ainsworth_graph_2016}{11} \bibcite{yao_efficient_2018}{12} @@ -54,4 +54,4 @@ \bibcite{louthan_hybrid_2011}{26} \bibstyle{ieeetr} \@input{Appendices.aux} -\gdef \@abspage@last{61} +\gdef \@abspage@last{62} diff --git a/Schrick-Noah_MS-Thesis.log b/Schrick-Noah_MS-Thesis.log index 1f7055c..e9eb0a2 100644 --- a/Schrick-Noah_MS-Thesis.log +++ b/Schrick-Noah_MS-Thesis.log @@ -1,4 +1,4 @@ -This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.3.21) 21 MAR 2022 11:11 +This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.3.21) 21 MAR 2022 12:03 entering extended mode restricted \write18 enabled. %&-line parsing enabled. @@ -424,39 +424,39 @@ File: ./Chapter5_img/front_merge.drawio.png Graphic file (type png) Package pdftex.def Info: ./Chapter5_img/front_merge.drawio.png used on input l ine 178. (pdftex.def) Requested size: 469.75499pt x 206.4044pt. - [42]) [43 <./Chapter5_img/front_merge.drawio.png>] + [42] [43 <./Chapter5_img/front_merge.drawio.png>]) [44] \openout2 = `Chapter6.aux'. (./Chapter6.tex CHAPTER 6. -[44 +[45 -]) [45] +]) [46] \openout2 = `Chapter7.aux'. (./Chapter7.tex CHAPTER 7. -) [46 +) [47 -] (./Schrick-Noah_MS-Thesis.bbl [47 +] (./Schrick-Noah_MS-Thesis.bbl [48 -] [48]) +] [49]) \c@appendixno=\count275 - [49] + [50] \openout2 = `Appendices.aux'. - (./Appendices.tex [50 + (./Appendices.tex [51 ]) -[51] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) +[52] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux) (./Appendices.aux)) @@ -491,10 +491,10 @@ ts/type1/public/amsfonts/cm/cmr12.pfb> -Output written on Schrick-Noah_MS-Thesis.pdf (61 pages, 1184836 bytes). +Output written on Schrick-Noah_MS-Thesis.pdf (62 pages, 1185960 bytes). PDF statistics: - 278 PDF objects out of 1000 (max. 8388607) - 163 compressed objects within 2 object streams + 281 PDF objects out of 1000 (max. 8388607) + 165 compressed objects within 2 object streams 0 named destinations out of 1000 (max. 500000) 96 words of extra memory for PDF output out of 10000 (max. 10000000) diff --git a/Schrick-Noah_MS-Thesis.pdf b/Schrick-Noah_MS-Thesis.pdf index 407af0f..75354b2 100644 Binary files a/Schrick-Noah_MS-Thesis.pdf and b/Schrick-Noah_MS-Thesis.pdf differ diff --git a/Schrick-Noah_MS-Thesis.toc b/Schrick-Noah_MS-Thesis.toc index 66f2e5e..3eb5a28 100644 --- a/Schrick-Noah_MS-Thesis.toc +++ b/Schrick-Noah_MS-Thesis.toc @@ -65,32 +65,33 @@ \contentsline {subsubsection}{Root Node}{42}{}% \contentsline {subsubsection}{Database Node}{43}{}% \contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{43}{}% -\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{44}{}% -\contentsline {section}{\numberline {6.1}\bf Small Networks}{44}{}% -\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{44}{}% -\contentsline {subsection}{\numberline {6.1.2}\it Results}{44}{}% -\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{44}{}% -\contentsline {section}{\numberline {6.2}\bf Large Networks}{44}{}% -\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{44}{}% -\contentsline {subsection}{\numberline {6.2.2}\it Results}{44}{}% -\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{44}{}% -\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{44}{}% -\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{44}{}% -\contentsline {subsection}{\numberline {6.3.2}\it Results}{44}{}% -\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{44}{}% -\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{44}{}% -\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{45}{}% -\contentsline {subsection}{\numberline {6.4.2}\it Results}{45}{}% -\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{45}{}% -\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{46}{}% -\contentsline {section}{\numberline {7.1}\bf Future Work}{46}{}% +\contentsline {subsection}{\numberline {5.4.4}\it Results}{44}{}% +\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{45}{}% +\contentsline {section}{\numberline {6.1}\bf Small Networks}{45}{}% +\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{45}{}% +\contentsline {subsection}{\numberline {6.1.2}\it Results}{45}{}% +\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{45}{}% +\contentsline {section}{\numberline {6.2}\bf Large Networks}{45}{}% +\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{45}{}% +\contentsline {subsection}{\numberline {6.2.2}\it Results}{45}{}% +\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{45}{}% +\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{45}{}% +\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{45}{}% +\contentsline {subsection}{\numberline {6.3.2}\it Results}{45}{}% +\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{45}{}% +\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{45}{}% +\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{46}{}% +\contentsline {subsection}{\numberline {6.4.2}\it Results}{46}{}% +\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{46}{}% +\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{47}{}% +\contentsline {section}{\numberline {7.1}\bf Future Work}{47}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{47}{}% +\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{48}{}% \addvspace {10pt} -\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{47}{}% +\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{48}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{50}{}% -\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{51}{}% -\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{51}{}% -\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{51}{}% -\contentsline {subsubsection}{A Sub-subsection in an Appendix}{51}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{51}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{52}{}% +\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{52}{}% +\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{52}{}% +\contentsline {subsubsection}{A Sub-subsection in an Appendix}{52}{}%