This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Emergence of Robust and Efficient Networks
in a Family of Attachment Models

Fuxuan Liao Yukio Hayashi Japan Advanced Institute of Science and Technology , Nomi, Ishikawa, Japan
Abstract

Self-organization of robust and efficient networks is important for the future designs of communication or transportation systems, because both characteristics are not coexisting in many real networks. As one of the candidates for the coexisting, the optimal robustness of onion-like structure with positive degree-degree correlations has recently been found, and it can be generated by incrementally growing methods based on a pair of random and intermediation attachments with the minimum degree selection. In this paper, we introduce a continuous interpolation by a parameter β0\beta\geq 0 between random and the minimum degree attachments to investigate the reason why the minimum degree selection is important. However, we find that the special case of the minimum degree attachment can generate highly robust networks but with low efficiency as a chain structure. Furthermore, we consider two intermediation models modified with the inverse preferential attachment for investigating the effect of distance on the emergence of robust onion-like structure. The inverse preferential attachments in a class of mixed attachment and two intermediation models are effective for the emergence of robust onion-like structure. However, a small amount of random attachment is necessary for the network efficiency, when β\beta is large enough. Such attachment models indicate a prospective direction to the future growth of our network infrastructures.

keywords:
Network science, Self-organization, Robust structure , Network efficiency , Minimum degree attachment
MSC:
[2010] 00-01, 99-00
journal: Journal of  Templatesmytitlenotemytitlenotefootnotetext: Japan Advanced Institute of Science and Technology .

1 Introduction

Unfortunately, a common topological structure called scale-free (SF) in many social, technological, and biological networks [1] is extremely vulnerable against intentional attacks to nodes of hubs with huge degrees [2], while it has efficient short paths between two nodes. The combination of efficient paths and extreme vulnerability makes a double-edged sword. Moreover, the SF network can be generated by a selfish rule of the preferential attachment, such as in Barabási and Albert (BA) model [3], whose linked node from a new node is chosen with probability proportional to its degree. However, we aim to find unselfish better attachments for equipping both important properties of strong robustness of connectivity and high network efficiency than the conventional ones [1, 2, 3] in growing networks.

Over the past few decades, there is a variety of attachments in growing networks. For instance, a mixed attachment between random and preferential attachments has been discussed [4, 5]. Other mixed attachment between preferential attachment and triad formation for tunable clustering [6] has also been studied. In a growing network model [7, 8, 9], a node with degree kk is selected as the link destination with probability proportional to kυk^{\upsilon}, υ0\upsilon\geq 0. The weak and strong preferential attachments continuously change degree distributions from exponential, power-law with an exponential cut-off, power-law as SF, and to the exclusive star-like network according to the parameter value: υ=0\upsilon=0, 0<υ<10<\upsilon<1, υ=1\upsilon=1, and υ>1\upsilon>1, respectively. Moreover, duplication [10] or copying [11] by attachment to the nearest neighbors of a randomly chosen node generates a power-law distribution derived in approximate analyses. However, the inverse preferential attachment has been hardly considered except for a special case of β=1\beta=1 [12, 13]. In particular, beyond the analysis of degree distributions [14], the properties of network efficiency and robustness of connectivity have not been discussed for the inverse preferential attachment. This paper reveals these important properties for the kβk^{-\beta}-attachment in varying β\beta values.

On the other hand, it has been found that the onion-like topological structures with positive degree-degree correlations gives the optimal robustness against intentional attacks under a given degree distribution [15, 16]. Such structure is visualized, when similar degree nodes locate on concentric circles in decreasing order of degrees from core to peripheral. Some rewiring methods have been proposed to generate onion-like networks [15, 17]. However, these methods discard already existing links. Therefore, they are difficult to be applied for improving the robustness in real networks. While incremental growing methods have also been proposed by applying cooperative partial copying with adding shortcuts [18] or intermediation [19, 20]. Moreover, in the onion-like networks, both robustness and efficiency coexist [19]. The connection between randomly chosen and a distant node through intermediation [19, 20] has been inspired from long-distance relations in case studies in organization theory: long-distance relations contribute to overcoming the crisis of Toyota group’s supply chain damaged by a large fire accident to their subcontract plants [21, 22, 23], and to rapidly organizing world-wide economic networks with expanding business chances by Wenzhou people in China [23]. However, it has not been comprehensively understood which of random, intermediation, and inverse preference attachments are dominant for the emergence of onion-like networks.

The organization of this paper is as follows. In Section 2, we introduce the parametric interpolation as the kβk^{-\beta}-attachment between the random attachment and the minimum degree attachment at β=0\beta=0 and β\beta\to\infty. In Subsection 2.2, we numerically investigate a condition of the network efficiency whose average length is logarithmic order of the node size NN in a growinhttps://arxiv.org/userg network by the mixed attachment between the random attachment and the kβk^{-\beta}-attachment. In Section 3, to investigate the effects of distance and the minimum degree selection, we slightly modify similar models of propinquity [24] and intermediation [19, 20] with the kβk^{-\beta}-attachment, and show that the kβk^{-\beta}-attachment is dominant for the emergence of onion-like networks. We summarize these results in Section 4. The numerical results are given by the average values over 100 realizations of randomly generated networks.

2 Emergence of Onion-like Networks with Efficient Paths

The following processes are common in growing networks by attachments of links. At each time step, a new node is added and connects to existing mm nodes by attachments in prohibiting self-loops and multi-links, as similar to BA model [3]. However, the selections of linked nodes are different in a family of attachment models introduced in the next subsection.

2.1 Dominance of the Minimum Degree Attachment for Onion-like Networks

We focus on random and the minimum degree selections of nodes, because they are necessary for generating a strongly robust onion-like networks as follows. In order to make onion-like networks with positive assortativity as degree-degree correlations [16], incrementally growing methods based on a pair of random and intermediation (MED) attachments have been proposed [19, 20]. With either the minimum degree or random selection, the type in MED model is called MED-kmin or MED-rand [20], respectively. In each pair of MED-kmin, one of link destination is chosen uniformly at random (u.a.r), and the other link destination is a node with the minimum degree for intermediation in μ\mu hops from the randomly chosen pair node. Intermediation in μ\mu hops means an attachment to a node in the μ+1\mu+1-th neighbors. Moreover, through numerical simulations, by the iterative attachments to a node at μ3,4\mu\geq 3,4 hops, relatively long loops are formed and enhance the robustness [24]. If the network has a small amount of loops, it can become a tree by removing nodes. Therefore, it is easily fragmented by further attacks to the articular nodes. This phenomenon is supported by the equivalence of dismantling and decycling problems[20]. Similarly in MED-rand, instead of the nodes with the minimum degree, a node is chosen u.a.r in the μ+1\mu+1-th neighbors from the randomly chosen pair node. Since older nodes with large degrees tend to be selected in the random attachment, this first attachment contributes to enhancing positive correlations among large degree nodes. The other attachment to the nodes with the minimum degree contributes to enhancing positive correlations among small degree nodes. In other words, the second attachment establishes a connection between the minimum degree node in the μ+1\mu+1-th neighbors and a new node of the minimum degree mm in the whole network, therefore it enhances positive correlations among small degree nodes. Note that onion-like networks emerge by MED-kmin, but not by MED-rand [20] because of a weak effect of the second attachment. A modification of MED-kmin will be discussed including the effect of distance regulated by a parameter μ\mu in Section 3.

In the remaining of this subsection, we show that onion-like networks can also emerge by kβk^{-\beta}-attachment, 0<β<0<\beta<\infty, as an interpolation of random and minimum degree attachments at β=0\beta=0 and β\beta\to\infty. Here, no effect of distance is included in the attachments until the related discussion to MED in Section 3. First, we derive a degree distribution, in which the maximum degree is bounded as β\beta becomes larger. Second, for the minimum degree attachment at β\beta\to\infty, we find that a special chain structure is obtained, the network efficiency is low because of the long distance paths. Third, we numerically investigate three measures: assortativity as degree-degree correlations, robustness of connectivity, and network efficiency in order to reveal which values of β\beta contribute to generating both efficient and robust onion-like networks by the kβk^{-\beta}-attachment.

First, as a parametric interpolation between random and minimum degree attachments (at β=0,\beta=0,\infty), we consider the kβk^{-\beta}-attachment to an existing node ii chosen with probability kiβjkjβ\frac{k_{i}^{-\beta}}{\sum_{j}k_{j}^{-\beta}}, 0<β<0<\beta<\infty, for adding mm links from a new node at each time step. In general, for a nonlinear attachment to a node ii chosen with probability function f(ki)f(k_{i}) of its degree kik_{i}, the degree distribution P(k)P(k) is derived from Eq.(9) in Ref.[14] as follows.

P(k)\displaystyle P(k) =\displaystyle= ff+m×f(Kmin)κ=Kmin+1km×f(κ1)f+m×f(κ),\displaystyle\frac{\langle f\rangle}{\langle f\rangle+m\times f(K_{\rm min})}\prod_{\kappa=K_{\rm min}+1}^{k}\frac{m\times f(\kappa-1)}{\langle f\rangle+m\times f(\kappa)},
f\displaystyle\langle f\rangle =def\displaystyle\overset{def}{=} k=KminKmaxf(k)×P(k),(2.1)\displaystyle\sum_{k=K_{\rm min}}^{K_{\rm max}}f(k)\times P(k),\qquad(2.1)

where KminK_{\rm min} and KmaxK_{\rm max} denote the minimum and maximum degrees in a network. In the case of f(k)=kβf(k)=k^{-\beta} for m=KminkKmax<m=K_{\rm min}\leq k\leq K_{\rm max}<\infty, it is rewritten as,

P(k)\displaystyle P(k) =\displaystyle= exp[log{ff+m×f(Kmin)κ=Kmin+1km×f(κ1)f+m×f(κ)}],\displaystyle\mathrm{exp}\left[\mathrm{log}\left\{\frac{\langle f\rangle}{\langle f\rangle+m\times f(K_{\rm min})}\prod_{\kappa=K_{\rm min}+1}^{k}\frac{m\times f(\kappa-1)}{\langle f\rangle+m\times f(\kappa)}\right\}\right],
=\displaystyle= exp[κ=Kmin+1k{log(m)+log((κ1)β)log(f+m×κβ)}+C],(2.2)\displaystyle\mathrm{exp}\left[\sum_{\kappa=K_{\rm min}+1}^{k}\left\{\mathrm{log}(m)+\mathrm{log}((\kappa-1)^{-\beta})-\mathrm{log}(\langle f\rangle+m\times\kappa^{-\beta})\right\}+C\right],\qquad(2.2)

where C=logff+m×f(Kmin)C=\mathrm{log}\frac{\langle f\rangle}{\langle f\rangle+m\times f(K_{\rm min})} is a constant. In the right-hand side of Eq.(2.2), the constant terms CC, log(m)\mathrm{log}(m), and log(f+m×Kminβ)>log(f+m×κβ)\mathrm{log}(\langle f\rangle+m\times K_{\rm min}^{-\beta})>\mathrm{log}(\langle f\rangle+m\times\kappa^{-\beta}), Kmin+1κkK_{\rm min}+1\leq\kappa\leq k, are not dominant and ignored. Thus, it is approximated as the order of exp[βlog(κ)dκ]eβklogk\mathrm{exp}\left[\int-\beta\mathrm{log}(\kappa)d\kappa\right]\sim e^{-\beta k\mathrm{log}k} without the constant factors. Fig. 1 shows a good fitting for the above estimation at m=2,4m=2,4 and β=1,4,10\beta=1,4,10 by the least squares method for log(N×P(k))\mathrm{log}(N\times P(k)) and klogkk\mathrm{log}k. We remark that the maximum degree is decreasing as larger β\beta in Fig. 1 and bounded by 2m2m for β\beta\to\infty as mentioned later. Note that there is a monotonic increasing relation between kk and klogkk\mathrm{log}k, k1k\geq 1.

Refer to caption
(a) (a) m=2m=2, β=1\beta=1
Refer to caption
(b) (d) m=4m=4, β=1\beta=1
Refer to caption
(c) (b) m=2m=2, β=4\beta=4
Refer to caption
(d) (e) m=4m=4, β=4\beta=4
Refer to caption
(e) (c) m=2m=2, β=10\beta=10
Refer to caption
(f) (f) m=4m=4, β=10\beta=10
Figure 1: Fitting the tail to the estimated eβklogke^{-\beta klogk} as a green line. Purple points and green lines denote the degree distribution and the estimated one in the growing networks by the kβk^{-\beta}-attachment. The number of adding links per time step is m=2m=2 (left) and m=4m=4 (right). As the parameter value of β\beta is changed from small to large in (a) (d) β=1\beta=1, (b) (e) β=4\beta=4, and (c) (f) β=10\beta=10, the slope becomes steeper. Note that each range of the horizontal axis is different in (a)\sim(f).

Refer to caption

Figure 2: Link destinations by the minimum degree attachment at β\beta\to\infty. black lines show the attachment from a new node to existing mm nodes by the minimum degree attachment. There are three parts from right to left. In the first part (right) of m1m-1 nodes, a new node connects to the existing m1m-1 nodes whose degree are the smallest m,m+1,2m2m,m+1...,2m-2, because of the minimum degree attachment. In the second part (middle) of Δt(m1)\Delta t-(m-1) nodes, the remaining one link connects to a node with degree 2m12m-1. Since there are Δt\Delta t nodes whose degree is less than 2m2m, the added time of the oldest node with 2m12m-1 degree is tΔtt-\Delta t. In the third part (left) of t1Δtt-1-\Delta t nodes, there are t1Δtt-1-\Delta t nodes with degree 2m2m. The relation of the added ordering of these nodes and their degrees at time t is shown as first and second rows from the bottom.

Second, we reveal a special chain structure in the case of β\beta\to\infty as the minimum degree attachment. By the attachment at time step tt, a new node connects to the existing nodes added at t1t-1, t2t-2, …, t(m1)t-(m-1), whose degree are the smallest m,,2m2m,...,2m-2. Because the increase of degree is only one at each time step in prohibiting multi-links. In the total mm links, the remaining one link connects to a node with degree 2m12m-1 as the next smaller than 2m22m-2 because of the minimum degree attachment. Fig. 2 shows a special case of selection to the oldest node with degree 2m12m-1 in order to simplify the discussion. While nodes with degree 2m2m do not get a link anymore, since there exists more than one node with degree 2m12m-1. We confirm it from the above discussion and Fig. 2 as follows. For the sum MtM_{t} of degrees at time step tt, the following equation holds.

Mt\displaystyle M_{t} =\displaystyle= 2M0+2mt,\displaystyle 2M_{0}+2mt,
=\displaystyle= 2m(N0+tΔt)+(2m1)(Δtm)\displaystyle 2m(N_{0}+t-\Delta t)+(2m-1)(\Delta t-m)
+((m+1)+(2m2+1))(m1)2+m,(2.3)\displaystyle+\frac{((m+1)+(2m-2+1))(m-1)}{2}+m,\qquad(2.3)

where M0M_{0} and N0N_{0} are the total numbers of links and nodes in the initial network at t=0t=0. Δt\Delta t represents the difference of node IDs defined by the current and the insert time of the oldest node whose degree is less than 2m2m. Therefore, Δt\Delta t is not the time duration but the number of nodes. In the right-hand side of Eq.(2.3), 2m(N0+tΔt)2m(N_{0}+t-\Delta t) and (2m1)(Δtm)(2m-1)(\Delta t-m) denote the sums of degrees of 2m2m and 2m12m-1. The third term ((m+1)+(2m2+1))(m1)2\frac{((m+1)+(2m-2+1))(m-1)}{2} is the sum of arithmetic sequence from m+1m+1 to 2m2+12m-2+1. The last term is the degree mm of a new node. We solve Eq.(2.3),

Δt\displaystyle\Delta t =\displaystyle= 2mN02M0m(m1)2.(2.4)\displaystyle 2mN_{0}-2M_{0}-\frac{m(m-1)}{2}.\qquad(2.4)

For the initial complete graph, N0=m+1N_{0}=m+1 and M0=m(m+1)2M_{0}=\frac{m(m+1)}{2} are substituted into Eq.(2.4). Then, we obtain the constant number

Δt=m(m+3)2>m.(2.5)\displaystyle\Delta t=\frac{m(m+3)}{2}>m.\qquad(2.5)

From Eq.(2.5), the number of nodes with 2m12m-1 is Δt(m1)>1\Delta t-(m-1)>1, therefore more than one node with degree 2m12m-1 exists.

We remark that the network generated by the minimum degree attachment is an almost regular graph, since many t1Δtt-1-\Delta t nodes have degree 2m2m after a long time. Moreover, we emphasize that the network has a chain structure with interval of Δt\Delta t. In the chain, the longest length of all the shortest paths (the diameter of network) is estimated as N/ΔtN/\Delta t. Tables 1 and 2 show that the practical measurement is very close to the estimated value N/ΔtN/\Delta t. The slight differences are due to that a node with degree 2m12m-1 is randomly selected in the measurement instead of the oldest one in the estimation for a special case of Fig. 2. For 0<β<0<\beta<\infty, the length is longer as β\beta increases. Note that the case of β\beta=0 is random attachment.

m Practical Estimated N/ΔtN/\Delta t Δt\Delta t
2 1001 1000 5
4 365 357 14
Table 1: Practical measurement of the diameter and the estimated N/ΔtN/\Delta t for N=5000N=5000 generated by the minimum degree attachment with β\beta\to\infty from the initial complete graph with m+1m+1 nodes for m=2,4m=2,4.
m β\beta 0 1 10 50 100
2 10 11 12 285.8 727.5
4 7 7 7 13.5 103
Table 2: Practical measurement of the diameter generated by the kβk^{-\beta}-attachment with several values of β\beta from the initial complete graph with m+1m+1 nodes. The cases of m=4m=4 at the bottom are shorter than ones of m=2m=2 at the top. In addition, the path length also increases as β\beta increases.
Refer to caption
(a) (a) Assortativity
Refer to caption
(b) (d) Assortativity
Refer to caption
(c) (b) Robustness
Refer to caption
(d) (e) Robustness
Refer to caption
(e) (c) Efficiency
Refer to caption
(f) (f) Efficiency
Figure 3: Three measures at Top:rr, Medium:RR, Bottom:EE versus node size NN in the network by the kβk^{-\beta}-attachment with mm=2 (left) and 4 (right) links per time step. Purple (cross mark), green (square mark), cyan (circle mark), black (triangle mark), and orange (inverse triangle mark) lines correspond to β\beta = 0, 1, 10, 50, and 100. Red line (diamond mark) indicates stronger assortativity than other color lines in (a) (d). The robustness for m=4m=4 in (e) are higher than that in (b) for m=2m=2. The case of red line (diamond mark) for m=4m=4 shows that the network has both high assortativity and robustness as onion-like networks. The efficiency for β\beta\to\infty becomes lower than ones for β\beta = 0, 1, 10, 50, and 100 colored by purple, green, cyan, black and orange in (c) (f), because of a chain structure as mentioned in Fig. 2 and Tables 1 and 2. Thus, the networks generated by the kβk^{-\beta}-attachment with large β\beta have stronger assortativity and robustness but weak efficiency.

To reveal which values of β\beta are contributing for generating both efficient and robust onion-like networks by the kβk^{-\beta}-attachment, we investigate the following three measures: assortativity as degree-degree correlations [25, 26], robustness of connectivity [15], and network efficiency [27]. Because the onion-like networks have high assortativity and robustness.

Assortativity:r=S1SeS22S1S3S22,(2.6)\displaystyle\mbox{Assortativity:}\quad r=\frac{S_{1}S_{e}-S_{2}^{2}}{S_{1}S_{3}-S_{2}^{2}},\qquad(2.6)
Robustness index:R=Nq=1NS(Nq)N,(2.7)\displaystyle\mbox{Robustness index:}\quad R=\sum_{Nq=1}^{N}\frac{S(Nq)}{N},\qquad(2.7)
Efficiency:E=1N(N1)ij1Lij,(2.8)\displaystyle\mbox{Efficiency:}\quad E=\frac{1}{N(N-1)}\sum_{i\neq j}\frac{1}{L_{ij}},\qquad(2.8)

where S1=ikiS_{1}=\sum_{i}k_{i}, S2=iki2S_{2}=\sum_{i}k_{i}^{2}, S3=iki3S_{3}=\sum_{i}k_{i}^{3}, Se=ijAijkikjS_{e}=\sum_{ij}A_{ij}k_{i}k_{j}, and AijA_{ij} denotes the ijij element of the adjacency matrix. kik_{i} and kjk_{j} denote degrees at end-nodes of (i,j)(i,j) link. The positive or negative assortativity is distinguished by the sign r>0r>0 or r<0r<0. S(Nq)S(Nq) denotes the number of nodes included in the giant component (GC as the largest connected cluster) after removing NqNq nodes, where NqNq is the number of removed nodes by attacks with recalculation of the highest degree node as the target. 1/E1/E is the harmonic mean of the shortest path length LijL_{ij}. LijL_{ij} is counted by the number of hops between nodes ii and jj.

Fig. 3 (a) and (d) show the assortativity for β=0,1,10,50,100\beta=0,1,10,50,100, and β\beta\to\infty in the growing networks by the kβk^{-\beta}-attachment. Red line with diamond mark (β\beta\to\infty) indicates stronger assortativity than purple with cross mark (β=0\beta=0), green with square mark (β=1\beta=1), cyan with circle mark (β=10\beta=10), black with triangle mark (β=50\beta=50), and orange with inverse triangle mark (β=100\beta=100) lines in Fig. 3 (a) (d). Therefore, the case of larger β\beta has higher assortativity. In comparison with the same color lines or marks, the assortativity in Fig. 3 (d) for m=4m=4 are higher than that in Fig. 3 (a) for m=2m=2. Moreover, as shown in Fig. 3 (b) (e), the robustness in Fig. 3 (e) for m=4m=4 are higher than that in Fig. 3 (b) for m=2m=2 in comparison with the same color lines or marks. In addition, the lines of assortativity rr increase monotonically for varying β\beta from 0 to \infty in Fig. 3 (a), while they increase for varying β\beta from 0 to 10 in Fig. 3 (b), decrease for varying β\beta from 10 to 50, and increase again for varying β\beta from 50 to \infty. Moreover, the lines of robustness RR increase for varying β\beta from 0 to 10, decrease for varying β\beta from 10 to 50, and increase again for varying β\beta from 50 to 100 in Fig. 3 (b) (e). After β\beta is greater than 100, the robustness approach to a constant RR value. The lines of efficiency EE decrease monotonically for varying β\beta from 0 to \infty in Fig. 3 (c) (f). The reason why assortativity rr and robustness RR change in this way is unknown exactly. However, a chain structure may affect them as discussed previously. In particular, red lines at β\beta\to\infty in Fig. 3 (d) (e) for m=4m=4 show that the network has both high assortativity (r>0.2r>0.2) and robustness (R>0.3R>0.3) as onion-like networks. Note that too strong assortativity lead to rather weaken the robustness with decreasing the value of RR [16]. Remember that there are no exact conditions for the values of rr and RR to be an onion-like network, we consider them as r>0.2r>0.2 and R>0.3R>0.3, because BA model is not an onion-like, which is r0r\approx 0 and R<0.23R<0.23 for the same NN and mm [19, 20]. Fig. 3 (c) (f) show that the efficiency for β\beta\to\infty (red line) becomes lower than ones for β\beta = 0, 1, 10, 50, and 100 (purple, green, cyan, black, and orange lines). The reason of low efficiency is due to a chain structure as mentioned in Fig. 2 and Tables 1 and 2.

2.2 Necessary Small Amount of Random Attachment for Efficient Paths

We investigate the effect of random attachment on the network efficiency whose average lengths are O(logN)O(\mathrm{log}N) in the mixed attachment of the random attachment and the kβk^{-\beta}-attachment. It is worth to mention that the effect is nontrivial in growing networks, especially by the inverse preferential attachments for a large β\beta. For example, the diameters are similar as 725.5 and 1000 (365 and 103) obtained by the practice at β=100\beta=100 and the estimation for m=2m=2 (m=4m=4). When β\beta is large enough, the diameter becomes O(N)O(N) because of approaching to the chain structure. In the following mixed attachment, it is the same that a new node is added at each time step, but the link destinations are chosen by random attachment with probability pp and by the kβk^{-\beta}-attachment with probability 1p1-p. Note that the case of β=0\beta=0 is pure random attachment.

Refer to caption
(a) (a) m=2m=2
Refer to caption
(b) (b) m=4m=4
Figure 4: Efficiency versus the mixing probability pp in the network by the mixed attachment of random and the kβk^{-\beta}-attachments with mm=2 (left) and 4 (right) at node size N=5000N=5000. Here pp indicates the ratio of random attachment. Purple (cross mark), green (square mark), brown (pentagon mark), cyan (circle mark), black (triangle mark), orange (inverse triangle mark), and red (diamond mark) lines correspond to β=0,1,4,10,50,100\beta=0,1,4,10,50,100, and β\beta\to\infty. Green (square mark), brown (pentagon mark), and cyan (circle mark) lines show that the efficiency trends to slightly increase as the ratio pp is larger, and the efficiency rapidly increases for the horizontal axis as shown by the black (triangle mark), orange (inverse triangle mark), and red (diamond mark) lines. In comparison with the same color lines or marks, the efficiency in (b) for m=4m=4 is higher than that in (a) for m=2m=2 by using more adding links in the emergence of onion-like networks.
Refer to caption
(a) (a) p=0p=0, m=2m=2
Refer to caption
(b) (b) p=0p=0, m=4m=4
Refer to caption
(c) (c) p>0p>0, m=2m=2
Refer to caption
(d) (d) p>0p>0, m=4m=4
Figure 5: Average path length L\langle L\rangle versus node size NN at kk^{-\infty}-attachment. Note that the scale of vertical axis is different in (a)\sim(d). Here, pp indicates the ratio of random attachment with m=2m=2 (right) and 44 (left). The average path length L\langle L\rangle decreases in the cases from p=0p=0 to p=0.05,0.001,0.0025,0.005,0.25p=0.05,0.001,0.0025,0.005,0.25,and 0.50.5. When pp is larger than a value between 0.00250.0025 and 0.0050.005, L\langle L\rangle becomes shorter as almost straight lines of O(logN)O(\mathrm{log}N) in (c) (d). Thus, a small amount of random attachment is necessary for the emergence of the efficient paths: LO(logN)\langle L\rangle\sim O(\mathrm{log}N) in the mixed attachment.

In Fig. 4, green (square mark), brown (pentagon mark), and cyan (circle mark) lines (β=1,4,10\beta=1,4,10) show that the efficiency trends to increase as the ratio pp is larger. We remark that the efficiency rapidly increases for the horizontal axis as shown by black (triangle mark), orange (inverse triangle mark), and red (diamond mark) lines (β=50,100\beta=50,100, and β\beta\to\infty). This phenomenon corresponds to appearing of chain structures. In comparison with the same color lines or marks, the efficiency in Fig. 4 (b) for m=4m=4 are higher than that in Fig. 4 (a) for m=2m=2 by using more links in the emergence of onion-like networks. The average length of the shortest paths is given by L1/E\langle L\rangle\approx 1/E in a relation of the arithmetic and the harmonic means. For example, the efficiency EE = 0.1, 0.2, and 0.25 correspond to the average path lengths of 10, 5, and 4 hops, respectively. Thus, decreasing efficiency EE leads to increasing average path length L\langle L\rangle. As shown in Fig. 5 (a) (c) or (b) (d), the average path length L\langle L\rangle decreases in the cases from p=0p=0 (top) to pp = 0.001, 0.0025, 0.005, 0.05, 0.25, and 0.5 (bottom) denoted by red (asterisk mark), purple (cross mark), green (square mark), cyan (circle mark), orange (triangle mark), black (inverse triangle mark), and blue (diamond mark) lines, respectively. In particular, rapidly increasing (red) curves are obtained for p=0p=0 as the pure kk^{-\infty}-attachment, therefore these results are not proportional to logN\mathrm{log}N because of the chain structure as mentioned in the previous subsection. However, the exact critical pcp_{c} is unknown because of a continuous transition of the average path lengths between O(N)O(N) and O(logN)O(\mathrm{log}N). We estimate that it may be between 0.0025 and 0.005 as shown in Fig. 5 (c) (d), in which the average path length becomes longer as almost straight lines of O(logN)O(\mathrm{log}N) than ones in Fig. 5 (a) (b). In addition, the average path length in Fig. 5 (d) for m=4m=4 is shorter than that in Fig. 5 (c) for m=2m=2 by using more adding links in comparison with the same color lines or marks. For not only β\beta\to\infty but also other values (β=100\beta=100), similar results in Fig. 5 are obtained including the critical value: 0.0025pc0.0050.0025\leq p_{c}\leq 0.005. Thus, a small amount of random attachment is necessary for the emergence of the efficient paths in the mixed attachment.

3 Modified p-models with the kβk^{-\beta}-attachment

In this section, we consider the modified propinquity model (abbreviation as p-model) with the kβk^{-\beta}-attachment. Because the p-model [24] is similar to the MED model [19, 20], a node at the distance dd or μ+1\mu+1 hops from a randomly chosen node is selected as the link destination in both models. We call it distance attachment. The essential difference between MED model and p-model is that the distance attachment is deterministic in MED model but probabilistic in p-model. If there are some nodes in the candidate set of nodes at dd or μ+1\mu+1 hops from a randomly chosen node in the existing nodes, one of them is chosen u.a.r in the original p-model and MED-rand. In spite of the similarity, it is not clear whether p-model can generate onion-like networks. Thus, we modify the random selection to the selection with probability kβk^{-\beta} in the candidate set in order to investigate the emergence of onion-like networks.

In the modification of p-model, the attached node ii is chosen with double probabilities according to its degree kik_{i} and a distance dd. We consider only the case of m=4m=4 links per time step, because an onion-like network emerges for m=4m=4 as shown previously. Fig. 6 illustrates the growing process in p-model0, p-model1, p-model2 and M-MED model. Here, the suffix numbers 0, 1, and 2 mean no random attachment but virtual selection, one random attachment, and pair of random and distance (or intermediation) attachments, respectively. M-MED model is introduced as a modification of MED model with the kβk^{-\beta}-attachment in order to compare with p-model2 based on similar m/2m/2 pairs of attachments. α>0\alpha>0, β>0\beta>0, and d=μ+11d=\mu+1\geq 1 are given parameters.

Refer to caption
(a) (a) p-model0
Refer to caption
(b) (b) p-model1
Refer to caption
(c) (c) p-model2
Refer to caption
(d) (d) M-MED model
Figure 6: Growing process in p-models and M-MED model. As shown in (a)\sim(c), modified p-models with different number of random attachments [24]. As shown in (d), M-MED model is modified with the kβk^{-\beta}-attachment from MED model [19, 20] instead of the minimum degree selections. Distances dd and μ+1\mu+1 are measured by the number of hops from a randomly chosen node in p-models and MED model.
p-model0

A node is selected u.a.r in the existing nodes. For each of mm links from a new node, there are two step selections as follows. A candidate set of nodes at a distance dd from the virtually selected node is chosen with probability proportional to dαd^{-\alpha}. Then a node ii is chosen with probability proportional to kiβk_{i}^{-\beta} in the candidate set. Of course, when there is only one node in the candidate set, it is chosen.

p-model1

The first attached node is chosen u.a.r in the existing nodes. For each of other m1m-1 links, the above process except virtual selection in p-model0 is repeated as similar to the original p-model [24], but with the modification by the kβk^{-\beta}-attachment in the candidate set.

p-model2

In each of m/2m/2 pairs of random and intermediation attachments, one of link destination is chosen u.a.r in the existing nodes. A candidate set of nodes at a distance dd from the randomly chosen pair node is chosen with probability proportional to dαd^{-\alpha}. Another node ii is chosen with probability proportional to kiβk_{i}^{-\beta} in the candidate set for each pair.

M-MED model

As similar to p-model2, m/2m/2 pair nodes are chosen, but the candidate set of nodes at a constant distance μ+1\mu+1 is determined for each randomly chosen pair node. The modification denoted by M- means applying of the kβk^{-\beta}-attachment instead of random selection in the candidate set.

In the following discussions, we compare with the p-model0 and p-model1 to investigate the effect of different number of random attachments on the emergence of onion-like networks. Then, we similarly compare with the p-model2 and M-MED to investigate the effect of distance d=μ+1d=\mu+1 on the emergence of onion-like networks. Fig. 7 (a) shows that the assortativity increase rapidly in p-model0 for α\alpha = 0.1 and 1 (purple and green lines with cross and triangle marks) as β\beta grows from 0 to 1010, and becomes steady after β>10\beta>10. While the case of α=3\alpha=3 (cyan line with inverse triangle marks) as almost connecting to the nearest neighbors of a randomly chosen node have weak assortativity. This case corresponds to the Duplication model [10] which generates a SF network [28] by slightly different rules: always connecting to the nearest neighbors of a virtually random selection node for a varying number (not constant mm) of links. Moreover, the assortativity for α\alpha = 0.1 and 1 (purple and green lines with cross and triangle marks) in p-model1 are lower than ones in p-model0 as shown in Fig. 7 (a) (d). There is no significant difference between α=3\alpha=3 (cyan line with inverse triangle marks) and α\alpha = 0.1 and 1 (purple and green lines with cross and triangle marks) in Fig. 7 (d). Therefore, the effect of distance dd is not dominant for increasing the assortativity. Furthermore, robustness increases rapidly with β\beta for the case of α\alpha = 0.1 and 1 (purple and green lines with cross and triangle marks) in β<10\beta<10 as shown in Fig. 7 (b), while the case of α=3\alpha=3 (cyan line with inverse triangle marks) have slightly weak robustness. These networks have high assortativity and robustness as onion-like structure.

Next, we discuss the properties for the assortativity as degree-degree correlations rr, the robustness index RR, and the efficiency EE in both p-model2 and M-MED model. Here, α=3\alpha=3 or μ=0\mu=0, α=1\alpha=1 or μ=2\mu=2, and α=0.1\alpha=0.1 or μ=5\mu=5 correspond to local, middle, and far intermediation, respectively. Fig. 8 (a) (d) for p-model2 and M-MED model show that the assortativity for local , middle, and far intermediation are similarly high in comparison with the same color lines or marks. Moreover, there is no significant difference between p-model2 and M-MED model. We should notice that the distance d=μ+1d=\mu+1 does not so much affect assortativity, robustness, and efficiency. Table 3 summarizes the emergence of onion-like networks for β\beta value in modified p-models and MED model. When β>0\beta>0, all modified models become onion-like structure.

In addition, Fig. 9 (a), (b), (c), and (d) show the degree distribution in p-model0, p-model1, p-model2, and M-MED model. The tails of distributions are linear in a semi-logarithmic plot as exponential distributions. The slopes of green (triangle mark) and orange (inverse triangle mark) lines for β\beta\to\infty are steeper than ones of the purple (cross mark) and cyan (asterisk mark) lines for β=1\beta=1. Thus, large degrees are bounded as β\beta increases, it is considered to be strong robustness because of no huge hubs.

RA: β=0\beta=0 0<β<0<\beta<\infty kmin: β\beta\to\infty Ratio of RA
p-model0
Not onion-like
(D-D: SF at α\alpha\to\infty)
Onion-like Onion-like 0
p-model1 Not onion-like Onion-like Onion-like 1/m
p-model2 Not onion-like Onion-like Onion-like 0.5
M-MED model
Not onion-like
(MED-rand)
Onion-like
Onion-like
(MED-kmin)
0.5
Table 3: Emergence of onion-like networks for β\beta value in the modified p-models and MED model. MED-rand and MED-kmin are special cases at β=0\beta=0 and \infty [19, 20]. RA and D-D denote random attachment and duplication divergence models [10], respectively.
Refer to caption
(a) (a) Assortativity, p-model0
Refer to caption
(b) (d) Assortativity, p-model1
Refer to caption
(c) (b) Robustness, p-model0
Refer to caption
(d) (e) Robustness, p-model1
Refer to caption
(e) (c) Efficiency, p-model0
Refer to caption
(f) (f) Efficiency, p-model1
Figure 7: Three basic measures rr (top), RR (medium), EE (bottom) versus parameter β\beta in the p-model0 and p-model1 at size N=5000N=5000 with mm=4 links per time step. As shown in (a) (d), assortativity increase rapidly in p-model0 and p-model1 for α=0.1,1,3\alpha=0.1,1,3 (purple, green and cyan lines with cross, triangle, and inverse triangle marks) as β\beta is from 0 to 1010, and becomes steady after β>10\beta>10. As shown in (b) (e), robustness increases rapidly in β<10\beta<10. These networks have both high assortativity and robustness as onion-like structure. As shown in (c) (f), efficiency slightly decreases for α=0.1,1,3\alpha=0.1,1,3 as β\beta is larger from 0 to 1010, however, efficiency becomes steady after β>10\beta>10.
Refer to caption
(a) (a) Assortativity, p-model2
Refer to caption
(b) (d) Assortativity, M-MED
Refer to caption
(c) (b) Robustness, p-model2
Refer to caption
(d) (e) Robustness, M-MED
Refer to caption
(e) (c) Efficiency, p-model2
Refer to caption
(f) (f) Efficiency, M-MED
Figure 8: Three basic measures rr, RR, EE versus parameter β\beta in the p-model2 (top) and M-MED model (bottom) at size N=5000N=5000 with mm=4 links per time step. As shown in (a) (d), assortativity increase rapidly in p-model2 and M-MED model for α=0.1,1,3\alpha=0.1,1,3 and μ=0,2,5\mu=0,2,5 (purple, green and cyan lines with cross, triangle, and inverse triangle marks) as β\beta is from 0 to 1010, and becomes steady after β>10\beta>10. As shown in (b) (e), robustness increases rapidly in β<10\beta<10. As shown in (c) (f), the efficiency are similarly high in comparison with the same color lines or marks. Moreover, no significant difference between cyan (inverse triangle marks), purple (cross mark), and green (triangle mark) lines shows that the effect of distance d=μ+1d=\mu+1 is not dominant for increasing the assortativity, robustness, and efficiency.

In comparison with the same color lines or marks, the efficiency in (b) for m=4m=4 is higher than that in (a) for m=2m=2 by using more adding links in the emergence of onion-like networks.

Refer to caption
(a) (a) p-model0
Refer to caption
(b) (b) p-model1
Refer to caption
(c) (c) p-model2
Refer to caption
(d) (d) M-MED
Figure 9: The degree distribution in four modified models in growing networks with m=4m=4. For each of (a) (b) (c) (d), there are similar distributions in p-model0, p-model1, p-model2, and M-MED model. The tails of distributions are linear in a semi-logarithmic plot as exponential distributions. The slopes of green (triangle mark) and orange (inverse triangle marks) lines for β\beta\to\infty are steeper than ones of the purple (cross mark) and cyan (asterisk mark) lines for β=1\beta=1. Thus, large degrees are bounded as β\beta increases. In other words, no hubs exist.

4 Conclusion

In summary, to make a strongly robust onion-like network with positive assortativity, we have studied the kβk^{-\beta}-attachment which interpolates random and the minimum degree attachments by a parameter β0\beta\geq 0. In particular, we show that the kβk^{-\beta}-attachment generates onion-like networks with both high assortativity and robustness for a large β>0\beta>0. However, a chain structure is obtained with the inefficient O(N)O(N) longest paths (as the diameter) at β\beta\to\infty. Thus, we have considered a mixed attachment of random and the kβk^{-\beta} attachments to get the efficient paths as the average path length of O(logN)O(\mathrm{log}N). We have found that a small amount of random attachment is necessary for the emergence of the efficient paths in the mixed attachment. In addition, we modify p-model [24] and MED model [19, 20] with the kβk^{-\beta}-attachment in order to investigate the effects of the kβk^{-\beta}-attachment and distance d=μ+1d=\mu+1 on the emergence of onion-like networks. The obtained results for assortativity as the degree degree correlations, robustness, and efficiency show that the onion-like network can be generated by the kβk^{-\beta}-attachment in a wide range of β>0\beta>0, and that the distance from a randomly chosen node does not so much affect the emergence. These results will contribute to a better understanding of generating onion-like networks. Instead of rich get richer rule in selfish preferential attachment, a small amount of random attachment gives an encountering link to a node equally. While the minimum degree attachment gives a helpful chance of linking to a poor and unlikely useful node with a small degree, it leads to increasing the tolerance of connectivity against attacks in the network. Such explanations may be useful for realizing a better network with both strong robustness and high efficiency in future systems.

Acknowledgements

We would like to express our thanks to anonymous reviewers for their valuable comments in improving the readability of this manuscript. This research is supported in part by JSPS KAKENHI Grant Number JP.21H03425.

References

  • [1] A.-L. Barabási, R. Albert, Emergence of scaling in random networks, Science 286 (5439) (1999) 509–512. doi:https://doi.org/10.1126/science.286.5439.509.
  • [2] R. Albert, H. Jeong, A.-L. Barabási, Error and attack tolerance of complex networks, Nature 406 (6794) (2000) 378–382. doi:https://doi.org/10.1038/35019019.
  • [3] A.-L. Barabási, R. Albert, H. Jeong, Mean-field theory for scale-free random networks, Physica A: Statistical Mechanics and its Applications 272 (1-2) (1999) 173–187. doi:https://doi.org/10.1103/PhysRevE.66.055101.
  • [4] Z.-G. Shao, X.-W. Zou, Z.-J. Tan, Z.-Z. Jin, Growing networks with mixed attachment mechanisms, Journal of Physics A: Mathematical and General 39 (9) (2006) 2035–2042. doi:https://doi.org/10.1088/0305-4470/39/9/004.
  • [5] L. Min, Z. Qinggui, Degree distribution of a mixed attachments model for evolving networks, in: Y. Wu (Ed.), Advanced Technology in Teaching - Proceedings of the 2009 3rd International Conference on Teaching and Computational Science (WTCS 2009), Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 815–822. doi:https://doi.org/10.1007/978-3-642-25437-6_110.
  • [6] P. Holme, B. J. Kim, Growing scale-free networks with tunable clustering, Physical review E 65 (2) (2002) 026107. doi:https://doi.org/10.1103/PhysRevE.65.026107.
  • [7] P. L. Krapivsky, S. Redner, F. Leyvraz, Connectivity of growing random networks, Physical Review Letters 85 (21) (2000) 4629. doi:https://doi.org/10.1103/PhysRevLett.85.4629.
  • [8] P. L. Krapivsky, S. Redner, Organization of growing random networks, Physical Review E 63 (6) (2001) 066123. doi:https://doi.org/10.1103/PhysRevE.63.066123.
  • [9] P. L. Krapivsky, S. Redner, A statistical physics perspective on web growth, Computer Networks 39 (3) (2002) 261–276. doi:https://doi.org/10.1103/PhysRevE.63.066123.
  • [10] R. Pastor-Satorras, E. Smith, R. V. Solé, Evolving protein interaction networks through gene duplication, Journal of Theoretical Biology 222 (2) (2003) 199–210. doi:https://doi.org/10.1016/s0022-5193(03)00028-6.
  • [11] P. L. Krapivsky, S. Redner, Network growth by copying, Physical Review E 71 (2005) 036118. doi:https://doi.org/10.1103/PhysRevE.71.036118.
  • [12] C. S. Q. Siew, M. S. Vitevitch, Investigating the influence of inverse preferential attachment on network development, Entropy 22 (9). doi:10.3390/e22091029.
  • [13] C. S. Q. Siew, M. S. Vitevitch, An investigation of network growth principles in the phonological language network, Journal of Experimental Psychology: General 149 (12). doi:10.1037/xge0000876.
  • [14] V. Zadorozhnyi, E. Yudin, Growing network: models following nonlinear preferential attachment rule, Physica A: Statistical Mechanics and its Applications 428 (2015) 111–132. doi:https://doi.org/10.1016/j.physa.2015.01.052.
  • [15] C. M. Schneider, A. A. Moreira, J. S. Andrade, S. Havlin, H. J. Herrmann, Mitigation of malicious attacks on networks, Proceedings of the National Academy of Sciences 108 (10) (2011) 3838–3841. doi:https://doi.org/10.1073/pnas.1009440108.
  • [16] T. Tanizawa, S. Havlin, H. E. Stanley, Robustness of onionlike correlated networks against targeted attacks, Physical. Review. E 85 (2012) 046109. doi:https://doi.org/10.1103/PhysRevE.85.046109.
  • [17] Z.-X. Wu, P. Holme, Onion structure and network robustness, Physical Review E 84 (2011) 026106. doi:https://10.1103/PhysRevE.84.026106.
  • [18] Y. Hayashi, Growing self-organized design of efficient and robust complex networks, in: 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems, IEEE,Xplore, 2014. doi:https://doi.org/10.1109/SASO.2014.17.
  • [19] Y. Hayashi, A new design principle of robust onion-like networks self-organized in growth, Network Science 6 (1) (2018) 54–70. doi:https://doi.org/10.1017/nws.2017.25.
  • [20] Y. Hayashi, N. Uchiyama, Onion-like networks are both robust and resilient, Scientific Reports 8 (1) (2018) 1–13. doi:https://doi.org/10.1038/s41598-018-29626-w.
  • [21] T. Nishiguchi, A. Beaudet, The toyota group and the aisin fire, Sloan Management Review 40 (1) (1998) 49.
  • [22] T. Nishiguchi, A. Beaudet, Fractal design: Self-organizing links in supply chain management, in: Knowledge creation, Springer, 2000, pp. 199–230.
  • [23] T. Nishiguchi, Global neighborhoods-strategies of successful organizational networks-(in japanese), NTT Publishing, 2007.
  • [24] L. K. Gallos, S. Havlin, H. E. Stanley, N. H. Fefferman, Propinquity drives the emergence of network structure and density, Proceedings of the National Academy of Sciences USA 116 (41) (2019) 20360–20365. doi:https://doi.org/10.1073/pnas.1900219116.
  • [25] M. E. Newman, Assortative mixing in networks, Physical Review Letters 89 (20) (2002) 208701. doi:https://doi.org/10.1103/PhysRevLett.89.208701.
  • [26] M. Newman, 8.7 Assortative mixing, in: Networks, Oxford University Press, 2010, pp. 266–268.
  • [27] V. Latora, M. Marchiori, Efficient behavior of small-world networks, Physical Review Letters 87 (19) (2001) 198701. doi:https://doi.org/10.1103/PhysRevLett.87.198701.
  • [28] X.-H. Yang, S.-L. Lou, G. Chen, S.-Y. Chen, W. Huang, Scale-free networks via attaching to random neighbors, Physica A: Statistical Mechanics and its Applications 392 (17) (2013) 3531–3536. doi:https://doi.org/10.1016/j.physa.2013.03.043.