add acronym
This commit is contained in:
@@ -5,21 +5,53 @@
|
||||
\label{Introduction} % Change X to a consecutive number; for
|
||||
% referencing this chapter elsewhere, use \ref{ChapterX}
|
||||
|
||||
\begin{figure}[h!]
|
||||
\centering
|
||||
\includesvg[width=\textwidth]{Figures/clan_thesis_argumentation_tree.drawio.svg}
|
||||
\caption{Argumentation Tree for the Clan Thesis}
|
||||
\label{fig:clan_thesis_argumentation_tree}
|
||||
\end{figure}
|
||||
|
||||
%----------------------------------------------------------------------------------------
|
||||
% SECTION 1
|
||||
%----------------------------------------------------------------------------------------
|
||||
|
||||
\section{Methodology}
|
||||
|
||||
In this chapter, we will discuss the methodology used in this
|
||||
research. We will discuss the research design, and the research limitations.
|
||||
This chapter outlines the methodology employed in the present
|
||||
research to evaluate and analyze the Clan framework. A visual
|
||||
representation of the argumentation flow central to the Clan Thesis
|
||||
is provided in Figure \ref{fig:clan_thesis_argumentation_tree}.
|
||||
|
||||
\begin{figure}[H]
|
||||
\centering
|
||||
\includesvg[width=1\textwidth,
|
||||
keepaspectratio]{Figures/clan_thesis_argumentation_tree.drawio.svg}
|
||||
\caption{Argumentation Tree for the Clan Thesis}
|
||||
\label{fig:clan_thesis_argumentation_tree}
|
||||
\end{figure}
|
||||
|
||||
The structure of this thesis adopts a multi-problem-oriented approach
|
||||
rather than focusing on a single isolated problem. Specifically, it
|
||||
addresses a set of interrelated challenges within the context of
|
||||
enhancing the reliability and manageability of \ac{P2P}
|
||||
networks. The primary objective of this research is to investigate
|
||||
how the Clan framework provides effective solutions to these challenges.
|
||||
|
||||
To achieve this goal, the research is divided into two main components:
|
||||
\begin{enumerate}
|
||||
\item \textbf{Development of a Theoretical Model} \\
|
||||
A theoretical model of the Clan framework will be constructed. This
|
||||
model will consist of a formal specification of the foundational
|
||||
axioms of the system, including the properties and principles that
|
||||
govern its design. From these base axioms, the research will derive
|
||||
key theorems and explore their corresponding boundary conditions. The
|
||||
theoretical analysis will aim to elucidate the underlying mechanisms
|
||||
of the framework and provide a concrete foundation for its evaluation.
|
||||
|
||||
\item \textbf{Empirical Verification of the Theoretical Model} \\
|
||||
To validate the theoretical model, a series of experiments will be
|
||||
conducted on various components of the Clan framework. These
|
||||
experiments will assess how the theoretical predictions align with
|
||||
practical observations. This step is essential to determine the
|
||||
extent to which the theoretical model holds under real-world
|
||||
conditions and to identify its limitations, if any.
|
||||
\end{enumerate}
|
||||
|
||||
TODO
|
||||
|
||||
\section{Related Work}
|
||||
|
||||
@@ -36,21 +68,18 @@ the development and positioning of the Clan framework.
|
||||
|
||||
Nix addresses significant issues in software deployment by utilizing
|
||||
a technique that employs cryptographic
|
||||
hashes to ensure unique paths for component instances[1].
|
||||
hashes to ensure unique paths for component instances \cite{dolstra_nix_2004}.
|
||||
The system is distinguished by its features, such as concurrent
|
||||
installation of multiple versions and variants,
|
||||
atomic upgrades, and safe garbage collection.
|
||||
These capabilities lead to a flexible deployment system that
|
||||
harmonizes source and binary deployments.
|
||||
Nix conceptualizes deployment without imposing rigid policies,
|
||||
thereby offering adaptable strategies for component management[2].
|
||||
thereby offering adaptable strategies for component management.
|
||||
This contrasts with many prevailing systems that are constrained by
|
||||
policy-specific designs,
|
||||
making Nix an agile choice for modern deployment needs[3]. The
|
||||
insights gained from Nix's approach
|
||||
to non-interference and de-risking upgrades through atomic
|
||||
transactions highlight the potential
|
||||
for deploying software components seamlessly in decentralized networks[4].
|
||||
making Nix an easily extensible, safe and versatile deployment solution
|
||||
for configuration files and software.
|
||||
|
||||
\subsection{NixOS: A Purely Functional Linux Distribution}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user