School of Information University of Michigan Network resilience Lecture 20.

Slides:



Advertisements
Similar presentations
Contagion Processes in Complex Networks
Advertisements

Complex Networks Advanced Computer Networks: Part1.
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Marzieh Parandehgheibi
Emergence of Scaling in Random Networks Albert-Laszlo Barabsi & Reka Albert.
It’s a Small World by Jamie Luo. Introduction Small World Networks and their place in Network Theory An application of a 1D small world network to model.
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
Information Networks Failures and Epidemics in Networks Lecture 12.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
The Impact of Imperfect Information on Network Attack Andrew Melchionna (University of Rochester) Jesús Caloca (Boise State University) Advisors: S. Squires,
Daniel ben -AvrahamClarkson University Boston Universtiy Reuven Cohen Tomer Kalisky Alex Rozenfeld Bar-Ilan University Eugene Stanley Lidia Braunstein.
Information Networks Generative processes for Power Laws and Scale-Free networks Lecture 4.
Information Networks Small World Networks Lecture 5.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Cascading failures in interdependent networks and financial systems -- Departmental Seminar Xuqing Huang Advisor: Prof. H. Eugene Stanley Collaborators:
Network theory and its applications in economic systems -- Final Oral Exam Xuqing Huang Advisor: Prof. H. Eugene Stanley Collaborators: Prof. Shlomo Havlin.
Weighted networks: analysis, modeling A. Barrat, LPT, Université Paris-Sud, France M. Barthélemy (CEA, France) R. Pastor-Satorras (Barcelona, Spain) A.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
Networks FIAS Summer School 6th August 2008 Complex Networks 1.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University.
Error and Attack Tolerance of Complex Networks Albert, Jeong, Barabási (presented by Walfredo)
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
The Erdös-Rényi models
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Complex networks A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, Orsay, France) M. Barthélemy (CEA, France) L. Dall’Asta (LPT, Orsay,
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Lecture 28 Network resilience
Author: M.E.J. Newman Presenter: Guoliang Liu Date:5/4/2012.
NTU GICE Intentional Attacks on Complex Network Speaker: Shin-Ming Cheng Advisor: Kwang-Cheng Chen.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al. Hammad Iqbal CS April 2006.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
E PIDEMIC SPREADING Speaker: Ao Weng Chon Advisor: Kwang-Cheng Chen 1.
School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Complex network of the brain II Hubs and Rich clubs in the brain
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Complex Network Theory – An Introduction Niloy Ganguly.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Network resilience.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Class 10: Robustness Cascades
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Class 21: Robustness Cascades PartII
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Abstract Networks. WWW (2000) Scientific Collaboration Girvan & Newman (2002)
Netlogo demo. Complexity and Networks Melanie Mitchell Portland State University and Santa Fe Institute.
Cascading failures of loads in interconnected networks under intentional attack Yongxiang Xia Department of Information Science and Electronic Engineering.
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Lecture II Introduction to complex networks Santo Fortunato.
Complex network of the brain II Hubs and Rich clubs in the brain Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Lecture 27 Network resilience
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Topics In Social Computing (67810)
Robustness or Network Resilience
Topology and Dynamics of Complex Networks
Lecture 20 Network resilience
Lecture 9: Network models CS 765: Complex Networks
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Presentation transcript:

School of Information University of Michigan Network resilience Lecture 20

Outline network resilience effects of node and edge removal example: power grid discussion of insights from projects p* (exponential graph) models (time permitting, or next Monday)

Network robustness and resillience Q: If a given fraction of nodes or edges are removed… how large are the connected components? what is the average distance between nodes in the components Related to percolation (previously studied on lattices):

Bond percolation in Networks Edge removal bond percolation: each edge is removed with probability (1-p) corresponds to random failure of links targeted attack: causing the most damage to the network with the removal of the fewest edges strategies: remove edges that are most likely to break apart the network or lengthen the average shortest path e.g. usually edges with high betweenness

Edge percolation 50 nodes, 116 edges, average degree 4.64 after 25 % edge removal 76 edges, average degree 3.04 – still well above percolation threshold

Percolation threshold in Erdos-Renyi Graphs average degree size of giant component av deg = 0.99av deg = 1.18 av deg = 3.96 Percolation theshold: how many edges have to be removed before the giant component disappears? As the average degree increases to z = 1, a giant component suddenly appears Edge removal is the opposite process – at some point the average degree drops below 1 and the network becomes disconnected

Calculating the phase transition for networks with arbitrary degree distributions that are otherwise random Let p k be the probability density function for the degrees of nodes in the network. Let q k be the probability density function for the degree of a node at the end of a randomly chosen edge: q k =k p k /. Let f be the occupation probability for each edge. Assume that we start with one node and we want to find the size of the component connected to that node. Let z n be the number of neighbors reachable in n steps. z n+1 = z n x the average excess degree of nodes reachable in n steps (the expectation value of (k-1) over the distribution q k ) x the occupation probability, f z n+1 =f z n ( - )/ Critical value of f: f= /( - ) slide: Michelle Girvan

Node removal and site percolation Ordinary Site Percolation on Lattices: Fill in each site (site percolation) with probability p adapted from slides by Michelle Girvan low p: small islands of connected components. p critical: giant component forms, occupying finite fraction of infinite lattice. Other component sizes are power-law distributed p above critical value: giant component occupies an increasingly large fraction of the system. Mean size of remaining component has a characteristic value.

Percolation on Complex Networks Percolation can be extended to networks of arbitrary topology. We say the network percolates when a giant component forms.

Scale-free networks are resilient with respect to random attack Example: gnutella network, 20% of nodes removed 574 nodes in giant component 427 nodes in giant component

Targeted attacks are affective against scale- free networks Example: same gnutella network, 22 most connected nodes removed (2.8% of the nodes) 301 nodes in giant component574 nodes in giant component

random failures vs. attacks adapted from slide by Reka Albert

Percolation Threshold scale-free networks For scale free graphs there is always a giant component (the network always percolates) Cohen et al., Phys. Rev. Lett. 85, 4626 (2000)

Network resilience to targeted attacks Scale-free graphs are resilient to random attacks, but sensitive to targeted attacks. For random networks there is smaller difference between the two R. Albert, H. Jeong, and A.-L. Barabasi, Attack and error tolerance of complex networks, Nature, 406 (2000), pp. 378–382.

Real networks

Skewness of power-law networks and effects and targeted attack D. S. Callaway, M. E. J. Newman, S. H. Strogatz, and D. J. Watts, Network robustness and fragility: Percolation on random graphs, Phys. Rev. Lett., 85 (2000), pp. 5468–5471. % of nodes removed, from highest to lowest degree k max is the highest degree among the remaining nodes

Preview of the next lecture The link between percolation and traditional epidemiology Grassberger (1983) showed that this can be mapped onto a bond percolation problem with occupation probability T given by the following expression Site percolation can be used to consider vaccination strategies, which can be thought of as a scheme for node removal. The traditional fully mixed model: Start with the SIR model of epidemic disease. The fraction of individuals in the states s, i, and r are governed by the equations: slide by Michelle Girvan

How does assortative mixing impact SIR dynamics? In assortatively mixed networks, the epidemic transition occurs sooner as the transmissibility is increased. In other words, epidemics occur at lower transmissibility than in neutral or disassortative networks. In parameter regimes where epidemics readily occur, the number of infected individuals is generally lower for assortatively mixed networks. M. E. J. Newman, Mixing patterns in networks, Phys. Rev. E, 67 (2003), no slide by Michelle Girvan

Power grid Electric power does not travel just by the shortest route from source to sink, but also by parallel flow paths through other parts of the system. Where the network jogs around large geographical obstacles, such as the Rocky Mountains in the West or the Great Lakes in the East, loop flows around the obstacle are set up that can drive as much as 1 GW of power in a circle, taking up transmission line capacity without delivering power to consumers.

Cascading failures Each node has a load and a capacity that says how much load it can tolerate. When a node is removed from the network its load is redistributed to the remaining nodes. If the load of a node exceeds its capacity, then the node fails

Case study: North American power grid Nodes: generators, transmission substations, distribution substations Edges: high-voltage transmission lines nodes: 1633 generators, 2179 distribution substations, the rest transmission substations 19,657 edges

Degree distribution is exponential

Efficiency of the network Efficiency of the network: average over the most efficient paths from each generator to each distribution station Impact of node removal change in efficiency

Capacity and node failure Assume capacity of each node is proportional to initial load Each neighbor of a node is impacted as follows load exceeds capacity Load is distributed to other nodes/edges The greater a (reserve capacity), the less susceptible the network to cascading failures due to node failure

power grid structural resilience efficiency is impacted the most if the edge removed is the one with the highest load