ESD.342 Random networks Lecture 13

3 downloads 0 Views 1MB Size Report
“Long loop/no loop” models (Newman, Calloway, Watts) usually assume random tree-like ..... Ramasco, D. Paolotti, N. Perra, M. Tizzoni, W. Van den Broeck, V.
Random Networks and Percolation

• • • • •

Percolation, cascades, pandemics Properties, Metrics of Random Networks Basic Theory of Random Networks and Cascades

Watts Cascades Analytic Model of Watts Cascades

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

1/46

Types of Percolation Models

• “Short loop” models (Stauffer, Grimmett, Morris) usually assume regular network structure or same nodal degree for all nodes • “Long loop/no loop” models (Newman, Calloway, Watts) usually assume random tree-like structure • “Collective action” models (Schelling, Granovetter) assume k = n (all nodes see all other nodes) • “Local action” models assume z K * 19/46

Example Percolation on a Tree

zi = excess degrees at step i ni = ith neighbors z1=3 z2=2

n1=3 n2=z2*n1=2*3=6

z3=2

n3=z3*n2=z3*z2*n1=2*2*3=12

For E - R, avg excess degree of a neighbor = z −1 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

20/46

Single Node Seed, No Threshold

Seed

First Step

Second Step

Number of nodes hit on first step =

number of edges out from seed = Sz

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

21/46

Multi-Node Seed, Threshold

Number of nodes hit < number of edges out because some nodes are hit multiple times, allowing stable nodes to be flipped 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

22/46

Two Steps, Multi-Node Seed, Threshold

1 ≤ k ≤ K* : flip if ≥ 1 neighbor flips K * +1 ≤ k ≤ 2K* : flip if ≥ 2 neighbors flip

Seed

First Step

Second Step

K* = 4 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

23/46

Denser connections: better resistance to cascade

Watts’ Cascade Diagram

2/16/2011

Theoretical boundary: infinite nodes Simulation boundary: 10000 nodes Network is too densely connected Network is disconnected

K* = ⎣1/ φ⎦ Lower threshold: more likely to cascade Watts, PNAS April 2002

Random networks © Daniel E Whitney 1997-2010 and cascades

24/46

Vulnerable Clusters in Finite E-R

Networks

pk

z k

K* 2K* 3K* 4K*

pk

z k

K* 2K* 3K* 4K*

pk

z k

K* 2K* 3K* 4K*

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

25/46

Watts Theory and Simulations

• Theory – Global cascades region: “small” seed can start a global cascade – No global cascades region: “small” seed cannot start a global cascade • Simulations on network with 10000 nodes – Global cascades region: seed of one node can start a global cascade – No global cascades region: seed of one node cannot start a global cascade 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

26/46

Cascades in Finite E-R Networks Can

Happen in the No Global Cascades Region

D. E. Whitney, ŅDynamic theory of cascades on finite clustered random networks with a threshold ruleÓPhysical Review E. E 82, 066110 (2010)

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

27/46

Simulations: Necessary Seed Sizes (n =

4500)

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

28/46

Simulations: Threshold Seed Size - A

Phase Transition

Likelihood of TNC vs Size of Seed 100 90

n = 4500, z = 11.5, K* = 4

80 70 60 50 40 30

“Threshold” seed size = 215

20 10 0 150

170

190

210

230

250

270

290

Size of Seed

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

29/46

Typical Cascade Trajectories Throughout

Transition Range of Seed Size

n = 4500, z = 11.5, K* = 4 350

S = 200 (no TNCs)

300

S = 210 (no TNCs) 250

S = 220 (30% TNCs)

200

S = 220 (70% no TNCs) S = 230 (90% TNCs)

150

S = 230 (90% TNCs) 100

S = 240 (100% TNCs) 50

S = 270 (100% TNCs) S = 300 (100% TNCs)

0 1

3

5

7

9

11

13

15

Step

“Near death” phenomenon 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

30/46

Theory k

pk = ∑ pS (i,S ) pnS (k − i,n − S ) i= 0

⎛ S⎞ i S−i ⎛ N −1 − S ⎞ k−i N −1−S−(k−i) pk = ∑ ⎜ ⎟ p (1 − p) ⎜ ⎟ p (1 − p) ⎝ k −i ⎠ i= 0 ⎝ i ⎠ k

Any unflipped node: n-S of them

Any unflipped node: n-S-F1 of them

Seed = S

Network = n

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

First flipped set = F1

31/46

Theory Step 2 k k −i ⎛ S ⎞

F1−i' S−i ⎛ F1⎞ i' p = ∑ ∑ ⎜ ⎟ p (1 − p) ⎜ ⎟ p 1− pF1 F1 k i i' ⎝ ⎠ ⎝ ⎠ i=0 i'=0 i

(

)

⎛n − S − F1 −1⎞ k−i−i' n−S−F1−1−(k−i−i') ×⎜ ⎟ pnSF1 (1− pnSF1) ⎝ k − i − i' ⎠ pF1 = z F1 /n reflects available edges from F1

pnSF1 reflects larger p of unflipped nodes

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

32/46

Theory: Cascades in “Global Cascades”

Region - Seed = 1 Node

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

33/46

Theory and Simulations: Cascade in “Global

Cascades” Region

n = 4500, z = 11.5, S = 1, K* = 9 Theory and Simulation (avg of 10 runs) 4000

T = theory S = simulation

3500 3000 2500

Flip Flip Flip Flip

2000 1500

by Step (T) Total (T) by Step (S) Total (S)

1000 500 0 1

3

5

7

9

11

13

15

Step

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

34/46

Theory and Simulations: A Cascade in “No

Global Cascades” Region

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

35/46

Theory: Ability to Predict Threshold Seed Size S Transition: Theory and Simulations n = 4500, z = 14.56, K* = 4

S Transition: Theory and Simulations n = 4500, z = 14.56, K* = 5 1

1

0.9

0.9

0.8

0.8

0.7

0.7 0.6

0.6 Simulations Theory

0.5

0.4

0.4

0.3

0.3

0.2

0.2

0.1

0.1 0 120

Simulations Theory

0.5

130

140

150

160

170

0 240

180

250

260

270

280

290

300

310

Size of Seed, S

Size of Seed, S

S Transition: Theory and Simulations n = 4500, z = 11.5, K* = 5

S Transition: Theory and Simulations n = 4500, z = 11.5, K* = 4

1 1

0.9

0.9

0.8

0.8

0.7

0.7

0.6 0.5 0.4 0.3 0.2 0.1 0 2/16/2011 50 70

Simulations Theory

0.6 Simulations Theory

0.5 0.4 0.3 0.2 0.1

Random networks © Daniel E Whitney 1997-2010 90 110 130 150 Size of Seed, S and cascades 0 150

200

250

Size of Seed, S

300

36/46

At S = 215, Failure Most of the Time

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

37/46

Occasionally, Success: Why?

Wake-up “Near death” 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

38/46

Cause of Wake-up After Near Death

• Caused by a critical mass phenomenon • Near death only a few nodes flip on each step • At most they can hit one node each since, for so few nodes, the likelihood of multiple hits is about zero • So only nodes that are one hit short of flipping have any chance to flip during this phase • This chance is proportional to how many one-shorts there are on any step and how many net edges Fj has • This population is growing but at the same time the number of flippers is falling

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

39/46

Derivation of Critical Mass

pr(a node in the network links to Fj) = # nodes with edges to Fj = Fj z Fj

Fj z Fj n

=# nodes that will be hit by Fj

fraction of these that will flip = N fractional representation of one short in the network = OS NOS Fj zFj n number of nodes that Fj flipped nodes will flip = n

If each node in Fj flips one node, the cascade is self - sustaining. NOS zFj So 1 = n or NOS = n /zFj or Fj * NOS = Fj * n /zFj 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

40/46

Theory and Simulations: Evolution of max

One Short Failures (avg of 20 runs)

If one short exceeds the bound, a TNC almost always occurs.

If one short does not exceed the bound, a TNC almost never occurs.

Variation in one short can cause a TNC when mean is below bound.

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

41/46

When r > 0 Cascades Occur for Bigger z

Increasing r generates larger vulnerable clusters 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

42/46

References

• [Callaway, Newman, Strogatz, Watts] “Network Robustness and Fragility: Percolation on Random Graphs,” Phys Rev Lett (85) 25, Dec 18, 2000 pp 5468-5471 • [Dall’Asta] “Inhomogeneous Percolation Models for Spreading Phenomena in Random Graphs,” arXiv:cond-mat/0509020 1 Sept 2005 • [Newman] “Structure and Function of Complex Networks,” arXive:cond­ mat/0303516 v1 25 March 2003 pp 20-23 and 38-39 • [Newman] “Random Graphs as Models of Networks” Chapter 2 in Handbook of Graphs and Networks ed. Bornholdt and Schuster, New York: Wiley 2005 • [Newman, Strogatz, Watts] “Random Graphs with Arbitrary Degree Distributions and Their Applications” arXive:cond-mat/0007235 v2 7 May 2001 • [Watts] “A Simple Model of Global Cascades on Random Networks” PNAS April 30, 2002, pp 5766-5771 • [Wikipedia] http://en.wikipedia.org/wiki/Percolation_theory and

http://en.wikipedia.org/wiki/Percolation_threshold 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

43/46

More References

• D. E. Whitney, Dynamic theory of cascades on finite clustered random networks with a threshold rule, Physical Review E. E 82, 066110 (2010) • Granovetter, M., “Threshold Models of Collective Behavior,” (1978) Am J. Soc. 83, 1420-1443 • Lopez-Pintado, D., “Diffusion in Complex Social Networks,” Games and Economic Behavior, forthcoming • Morris, S. N., “Contagion,” Rev Econ Studies, (67) 57-78 (2000) • Rogers, E. M., Diffusion of Innovations, New York: Free Press, 2003 • Schelling, T.C., “A Study of Binary Choices with Externalities,” J. Conflict Resolution, 17 (3) 381- 428 (1973) • Valente, T. W. Network Models of the Diffusion of Innovations, Hampton 1995 2/16/2011 Random networks © DanielPress, E Whitney 1997-2010 44/46 and cascades

More References

• http://cnets.indiana.edu/tag/epidemic-modeling • Multiscale mobility networks and the spatial spreading of infectious diseases.�D.Balcan, V. Colizza, B. Gonsalves, H. Hu, J. J. Ramasco, A. Vespignani�Proc Natl Acad Sci U S A 106, 21484-21489 (2009). • Predictability and epidemic pathways in global outbreaks of infectious diseases: the SARS case study�V. Colizza, A. Barrat, M. Barthelemy, A. Vespignani�BMC Medicine 5, 34 (2007) • Seasonal transmission potential and activity peaks of the new influenza A(H1N1): a Monte Carlo likelihood analysis based on human mobility�D. Balcan, H. Hu, B. Goncalves, P. Bajardi, C. Poletto, J. J. Ramasco, D. Paolotti, N. Perra, M. Tizzoni, W. Van den Broeck, V. Colizza, A. Vespignani�, BMC Medicine 7, 45 (2009) 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

45/46

Backups

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

46/46

Generalized Random Networks

• E-R random network has a Poisson degree distribution • Random networks can be built with arbitrary degree distributions, but software is required • Newman says that it is better to generate a specific degree sequence from the distribution and then generate a network with that degree sequence in order to guarantee that the software uses the same degree sequence all the way through the generating process

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

47/46

Subgraph Shapes vs p p ~ n a , z ~ n a +1 z

0

n-1 n-1/2

n-1/3

n-1/4

1

n1/3

n1/2

p

0 n-2 n-3/2

n-4/3

n-5/4

n-1

n-2/3

n-1/2

0.1

0.178

a

z for n = 1000: 0 0.001 0.0316

1

10

31.6

The threshold probabilities at which different subgraphs appear in a random graph. For pn 3 / 2 → 0 the graph consists of isolated nodes. For p ~ n −3 / 2 trees of order 3 appear, while for p ~ n −4 / 3 trees of order 4 appear, but not many. At p ~ n −1 trees of all orders are present and at the same time cycles of all orders appear, but again, not many. The probability p ~ n −2 / 3 marks the appearance of complete subgraphs of order 4 and p ~ n −1/ 2 corresponds to complete subgraphs or order 5. As a approaches 0 the graph contains complete subgraphs of increasing order. 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

48/46

Site and Bond Percolation on Regular

Graphs

• “The most common percolation model is to take a regular lattice, like a square lattice, and make it into a random network by randomly ‘occupying’ sites (vertices) or bonds (edges) with a statistically independent probability p. At a critical threshold pc, long-range connectivity first appears, and this is called the percolation threshold.” [see wikipedia reference “percolation threshold”] • For a square grid, pc = 0.5 for bond percolation and pc = 0.59274621 for site percolation 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

49/46

Percolation Step by Step

Regular Networks: Occupancy Each node has 2 neighbors.

It must be linked to both for

there to be a chance of a

giant cluster. So pc = 1.

Each node has 4 neighbors. It must be linked to at least 2 for there to be a chance of a giant cluster. So pc = 0.5.

Random Networks: z

In a random network with n nodes each node has n neighbors. It must be linked to at least one for there to be a chance of a giant cluster. So pc = 1/n. But z = pn so this is the same as zc = 1. See Albert and Barabasi “Stat Mech of Complex Networks” for a detailed derivation

There is no proof or formula for pc when d > 2 except for d > 19 and some special cases. See Slade, Gordon, “Probabilistic Models of Critical Phenomena,”

Princeton Companion to Mathematics, edited by Timothy Gowers.

Scheduled for publication in 2007. for a detailed discussion

http://www.math.ubc.ca/~slade/

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

50/46

Vulnerable Clusters Multiply the Seed’s

Search Efficiency and Effectiveness

By itself, a single seed cannot flip a stable node Other stable nodes Vulnerable cluster

Seed Vulnerable nodes have a few links to each other (average ~ 1.5) and more links to stable nodes outside their cluster. Working together, vulnerable nodes can flip stable nodes but most likely this happens only when vulnerable nodes co-exist in clusters 2/16/2011 Random networks © Daniel E Whitney 1997-2010 and cascades

51/46

Cluster-Hopping Creates TNCs When

Vulnerable Clusters Are Small

Vulnerable cluster

Seed

Stable node Vulnerable node

Whitney, ICCS, 2007 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

52/46

Do Random Networks Have Cycles?

⎛ n⎞

⎜ ⎟ k! zk ⎝ k⎠ k Expected k − cycles = p ≈ for n >> k

2k 2k number of loops in random networks 1E+22 1E+20 1E+18 1E+16 1E+14 1E+12

loops z = 3

1E+10

loops z = 6

1E+08 1E+06 10000 100 1 0

10

20

30

40

50

60

n - number of nodes

Diestel, R., Graph Theory, 3rd edition online at page 298

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

53/46

and cascades

54/46

Percolation Theory for Random Graphs • Most theory assumes we are dealing with a sparse network that has few or no closed loops, especially no small closed loops • This is measured by the clustering coefficient, which is small for big random networks where the theory has been developed • If there is no clustering or small closed loops then it is easy to calculate how many neighbors, second neighbors, third neighbors, etc, a given node has because no node is its own third neighbor and the probability that a node is its own nth neighbor goes down as n goes up. • If there are more nth neighbors than (n-1)th neighbors for all n and the network is tree-like, then there is a giant cluster • The calculations can be done for any random graph whose degree distribution is known, not just E-R random graphs, as long as there is negligible clustering 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

55/46

Variants of the Theory • 1. The percolation (or cascade) proceeds when a link is established between two nodes. This is basic simple percolation described on the previous slide. • 2. The percolation proceeds if a link is established with a node that is “vulnerable” – A) Vulnerability can be a function of k or it can be the same for all nodes (some number 0 ≤ b ≤ 1) – B) Simple percolation has b = 1 for all nodes – C) Watts rumors cascade model has

b = 1 for k ≤ K *

b = 0 for k > K *

2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

56/46

Derivation of Cascade Conditions (Newman)

Its degree = 4 Its excess degree = 3 The neighbor The edge The node

Pick an edge leading from a node and follow it to a neighboring node. What is the (excess) degree distribution of this neighbor? If its degree = k, its edges are k-times more numerous than if its degree = 1 (think of the edge list) But the fraction of nodes with degree k is pk. So the likelihood of encountering a node of degree k by this process is proportional to kpk

Distribution of excess degrees of neighbor = qk−1 =

kpk

or



∑ kp

qk =

(k + 1) pk +1 z

k

k= 0 ∞



q = avg excess degree of neighbor = ∑ kqk = k= 0

2/16/2011

∑ (k + 1)kp



k +1

k= 0

z

=

∑ k(k −1) p k= 0

z

k

< k 2 > −z z2 = = z z1

Random networks © Daniel E Whitney 1997-2010 57/46 Ref: Newman, “Random and Graphs as Models of Networks,” Ch 2 in Handbook of Graphs and Networks, ed Bornholdt and Schuster cascades

continuing

avg number of 2nd neighbors per 1st neighbor = z2 =< k 2 > −z avg number of 3rd neighbors per 2nd neighbor = z 3 = z2 =< k 2 > −z ⎡ z2 ⎤ Avg number of mth neighbors = z1⎢ ⎥ ⎣ z1 ⎦ ⎡ z2 ⎤ This diverges when ⎢ ⎥ = 1

⎣ z1 ⎦

m−1

(from prev slide)



∑ k(k −1) p Generalizeable Cascade condition

k

k= 0

z or



∑ k(k −1) p

k

k= 0

Molloy-Reed criterion

= 1

=z

For E - R k 2 = k

2

= z2

So, for E - R this is the same as z = 1

2/16/2011 Random networks © Daniel E Whitney 1997-2010 and cascades

(See notes)

58/46

continuing For the case where all nodes have vulnerability = b: ∞

b∑ k(k −1) pk = z

See notes

k= 0

For the case where vulnerability is a function ρk of k ∞

∑ k(k −1)ρ

k pk = z

k= 0

Watts rumor cascade model :

ρk =

Supporting derivations of these typically use generating functions 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

{

1 for k ≤ K * 0 for k > K *

59/46

Rules for Simulating Cascades

• Build a random network with some value of z and set the value of K* • Choose a node at random (the seed) and flip it • Find its neighbors and flip all that are vulnerable • Find their neighbors and flip all that can be flipped – “Vulnerable” ones flip if one neighbor flipped – “First-order” stable ones flip if two neighbors flipped, etc • Keep going until all nodes have flipped that can • Use some criterion to say if a global cascade has happened or not • Watts made a new network each time but I reused the network to save time. This permitted me to examine it. 2/16/2011

Random networks © Daniel E Whitney 1997-2010 and cascades

60/46

MIT OpenCourseWare http://ocw.mit.edu

ESD.342 Network Representations of Complex Engineering Systems Spring 2010

For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.