Description
Part 1
You will be assigned a resource allocation strategy early this week to craft a united response to the questions below. Prepare a miniature brief that describes your assigned resource allocation strategy, and develop an illustration to aid in your explanation.
Refer to the Lower Colorado Dams Network as the network to which you will allocate your resources using the model you were assigned last week. You have $30 million to allocate to the Lower Colorado Dams Network.
Using the allocation model assigned to your small group last week, each group should present its strategy for how these dollars would be apportioned. Be true to the allocation strategys concept, and answer the following questions:
What specific monies will you assign to which assets, links, network components, or sector elements? Explain how your allocation model guided your decisions.
What strengths does your allocation model have to allocating resources to this network? Be comprehensive and specific in your answer.
What shortcomings or detriments does your allocation model reveal for allocating resources to this network? Be comprehensive and specific in your answer.
- Provide 23 modifications to this model that would enhance it for allocating resources to this network. If you believe this model is ideal and no modifications are necessary, explain why you believe this.
- Respond to Another Student: Review at least 1 other student’s Key Assignment Outline and provide meaningful feedback. Refrain from general feedback, such as simply stating “good job.” Your feedback to other students is most helpful if you not only point out weak areas but also offer suggestions for improvement. The best feedback takes a three-stage approach to identify what was done well, weaknesses, and areas for improvement.
- Part 2
- Post an outline of your Unit 4 IP Key Assignment draft for peer review. Review and provide feedback to a minimum of 1 peer. In crafting your outline, return to the discussions and assignments from the earlier phases of this course. There is no specific order for your final product (Key Assignment), but you should demonstrate good organization skills and comprehensive inclusion of the main elements. You may also look at the illustrations or M.U.S.E. items to be reminded of components to include. For the outline you will share here, be as specific and detailed as possible. For example, do not simply state Risk Assessment. Instead (as an example), state:
Risk Assessment of the Hoover Dam as the most critical node in the Lower Colorado Dams Network.
This asset is chosen as most critical because
Threats considered include erosion, user demand, earthquake, terrorist attack
Consequences considered include, loss of all reserved water in dam, impact on agriculture, damage or destruction to lower dams
The most likely Threats include
Reply
A scale-free network is a type of network that is distinguished by the presence of large hubs and has a power-law degree distribution. The power law means that the vast majority of nodes have fewer connections and a few important hubs have a very large number of connections. On the other hand, a small-world network is a graph-like structure in which most nodes are not neighbours or close to one another but the neighbours of these nodes are most likely to be neighbors of each other and with very few steps, they can easily be reached.
My selection of network is the scale-free network and an example of this is online social networks. This is because the fraction of nodes with degree k follows a power law. Although they may be identified as weakly scale-free. They are seen as scale-free because they appear to have a degree distribution with a power-law tail. The nodes are the people within the networks and the edges or links are what connect them. They can be identified as a cascading network as this type of network influences each others behaviors and decisions.
Understanding the difference between scale-free and small-world networks helps to plan protective measures more successfully because you learn exactly what type of network you are dealing with and the type of protective measures to put forward in order to have it protected from any kind of cyber-attacks. The measures that are put on scale-free networks differ from those in small-world networks as they have interlinked connections and could be brought down by an attack on a single or few nodes which may lead to a failure. Online social networks are very vulnerable and the Barabasi Albert scale-free model is used to measure their vulnerability.
Examples that may be seen from this are electric power networks between the Western States and the Nordic transmission grid. Because the network that is being dealt with is known, the topological characteristics of these networks are calculated and then compared to their error and attack tolerance. Another example is how some vertices can easily spread faults leading to a high probability of network failure and some are affected by propagated faults. Therefore, the right measures are put forward to avoid this.
PART 2
The type of vulnerability that can be assessed from it is that the thickness of the gusset was designed proportional to the bending moment and this did not give sufficient consideration to the effects of the forces from diagonal truss members. The design of the node of the bridge was inadequate to effectively distribute dead and live nodes. The ductile steel is equally comprised of gusset plates and this compromised it. The environment may not have contributed to the fall of the bridge although the aftermath of it had an effect as the air was polluted and so was the water and soil. Other vulnerabilities included destroyed vehicles, toxin releases, and hydrologic impacts.
Soramäki, Kimmo; et al. (2021 ). “The topology of interbank payment flows”. Physica A: Statistical Mechanics and Its Applications.
Fratini, Michela; Poccia, Nicola; Ricci, Alessandro; Campi, Gaetano; Burghammer, Manfred; Aeppli, Gabriel; Bianconi, Antonio (2020A scale-free network is a type of network that is distinguished by the presence of large hubs and has a power-law degree distribution. The power law means that the vast majority of nodes have fewer connections and a few important hubs have a very large number of connections. On the other hand, a small-world network is a graph-like structure in which most nodes are not neighbours or close to one another but the neighbours of these nodes are most likely to be neighbors of each other and with very few steps, they can easily be reached.
My selection of network is the scale-free network and an example of this is online social networks. This is because the fraction of nodes with degree k follows a power law. Although they may be identified as weakly scale-free. They are seen as scale-free because they appear to have a degree distribution with a power-law tail. The nodes are the people within the networks and the edges or links are what connect them. They can be identified as a cascading network as this type of network influences each others behaviors and decisions.
Understanding the difference between scale-free and small-world networks helps to plan protective measures more successfully because you learn exactly what type of network you are dealing with and the type of protective measures to put forward in order to have it protected from any kind of cyber-attacks. The measures that are put on scale-free networks differ from those in small-world networks as they have interlinked connections and could be brought down by an attack on a single or few nodes which may lead to a failure. Online social networks are very vulnerable and the Barabasi Albert scale-free model is used to measure their vulnerability.
Examples that may be seen from this are electric power networks between the Western States and the Nordic transmission grid. Because the network that is being dealt with is known, the topological characteristics of these networks are calculated and then compared to their error and attack tolerance. Another example is how some vertices can easily spread faults leading to a high probability of network failure and some are affected by propagated faults. Therefore, the right measures are put forward to avoid this.