Lecture 7/8 Flashcards

(17 cards)

1
Q

What is a Network? Or Graph?

A

Is a set of NODES connected by LINKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are Two types of Links

A

Directed - with direction
Undirected - no direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the total number of connections o a node “I” to its nearest neighbouring node

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the motivation behind Network Theory?

A

As systems become come complex and interconnected it is important to understand how failure of a single component might effect other systems/subsystems down the line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the clustering coefficient C?

A

Is the measure of local connectivity,

C=1 - Fully connected Graph
C = 0 - fully sequential Graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss the strengths and limitations of applying network theory for
quantifying the reliability of infrastructures and assess the vulnerability
to large-area breakdowns

A

Strengths:
1.

Weakness:
1. Neglet dynamic change
2. Challenges in accurately modeling cross-sector interdependencies (eg. Switzerland electricity network also has European connections, in class the model we looked at did not consider this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different connectivity properties of Poisson, Exponential
and Power-law networks? Discuss the degree distribution of real-world
networks. Focus on both technical and non-technical networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Discuss the tolerance of exponential and scale-free networks against
random failures and targeted attacks.

How does the global connectivity varies with respect to random failures and targeted attacks of increasing
magnitude?

A

Exponential Networks:
Good global and local connectivity (local robustness due to clusters and global accessibility due to shortcuts among clusters)
Less vulnerable to malicious attacks (no preferential nodes), tolerant to random faults

Power-Law Networks - Scale-Free Networks
Few highly connected nodes
Robustness to random faults but vulnerability to targeted malicious attacks (due to the highly-connected hubs)

If you look at the pictures it makes sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the The degree distribution P(k) ?

A

The degree distribution P(k) gives the probability that any randomly chosen
vertex has degree k.

k = The total number of connections of a node i to its nearest neighboring
nodes is called its degree ki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the underlying assumption in using the shortest path for
characterizing the service of a network system?

A

the communication/service between two nodes is routed along the shortest path

Different algoriths can be used the find the shortest path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which properties of the connectivity are measured by the characteristic path length L?

A

Characteristic path length: average of all shortest paths in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition on the average clustering coefficient C?

A

The average clustering coefficient C of a network is a measure of local connectivity.

C = 1 for a fully-connected graph

C =0 for a complete sequential graph, i.e., a ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a weighted network? What additional information do weights add to connectivity? How are weights included in the indicators of connectivity of networks?

A

L and C are applicable only to unweighted networks in which only the topological information on the existence
or absence of a link, with no reference to the physical length and capacity of the link, is retained

The model of a realistic network could be weighed to account also for the physical properties of the systems
(Time or Distance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Difference between Failure and Attack?

A

Failure: nodes are removed randomly

Attack: most connected nodes are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you compute the efficiency matrix ε of a given network? Which indication about the path from node i to node j does the matrix element ε provide?

A

its simply 1/d –> if there is a non zero value

if d = 0 then ε=0

17
Q

Given any network, detail the steps of the procedure to quantify the vulnerability of the network to the removal of its links and nodes. Which indicators would you use to quantify this vulnerability?

A

Degradation of the global efficiency of the network due to the disconnection of a set of its links