Abstract
Power grids, road maps and river streams are examples of infrastructural networks which are highly vulnerable to external perturbations. An abrupt local change of load (voltage, traffic density, or water level) might propagate in a cascading way and affect a significant fraction of the network. Almost discontinuous perturbations can be modeled by shock waves which can eventually interfere constructively and endanger the normal functionality of the infrastructure. We study their dynamics by solving the Burgers equation under random perturbations on several real and artificial directed graphs. Even for graphs with a narrow distribution of node properties (e.g., degree or betweenness), a steady state is reached exhibiting a heterogeneous load distribution, having a difference of one order of magnitude between the highest and average loads. Unexpectedly we find for the European power grid and for finite Watts-Strogatz networks a broad pronounced bimodal distribution for the loads. To identify the most vulnerable nodes, we introduce the concept of node-basin size, a purely topological property which we show to be strongly correlated to the average load of a node.
Similar content being viewed by others
Introduction
Blackouts, traffic gridlocks and floods are all malfunctions of infrastructures which drastically affect their performance1,2,3,4,5. In many situations, they occur abruptly and might propagate through the network as shock waves6,7,8,9. These waves can either weaken by shedding their impact among branches or interfere constructively when two or more branches meet at the same node. The global consequences of these perturbations will strongly depend on the propagation dynamics and the capacity of each network element to bear abrupt changes10,11,12. The identification of vulnerable spots is a challenging scientific and technological question and this is precisely what we address here.
Propagation of failures and cascading in complex networks have been subject of much scientific interest13,14,15. Examples are the use of the theory of self-organized criticality to study the propagation of failures in power grids and water transport on reservoir networks1,3,16,17,18,19,20, the Olami–Feder–Christensen model for earthquakes21,22, traffic2,23,24 and financial networks25. Typically, the focus is on the cascading of failures resulting from an initial triggering event. However, it is also crucial to understand the dynamics preceeding these failures and identify the vulnerable spots where they can possibly be triggered.
To describe the propagation of shock waves on directed networks we use the Burgers equation26. This equation describes flow when the flux depends quadratically on the load (e.g., voltage, traffic density and water level). The range of applications of the Burgers equation goes beyond fluid dynamics as it is applied in many propagation processes, such as traffic jams, glacier avalanches or chemical processes27,28. Here we show that, in the case of perturbations randomly distributed in space, the dynamics of the solutions of the dissipative Burgers equation converges to a steady state in which the load distribution is strongly heterogeneous. Surprisingly, we find that the load of some nodes can exceed the average load by one order of magnitude. One might expect that the location of such nodes mainly depends on the propagation dynamics. Yet, we show that their fate is deeply imprinted in the network topology. We propose a new topological measure which allows to identify the most vulnerable nodes without solving the dynamics.
Model
Dynamics
To describe the propagation of load (e.g., traffic density or water level) on a directed network, we consider on each link the one-dimensional Burgers equation27
which we solve using Godunov's scheme. The details of the discretization and numerical solution are presented in the section Methods.
Perturbation
Initially, the load on all directed edges and nodes is set to zero. Perturbations are described as local changes in the load according to the following procedure. First, we choose a node i at random and set ρi to a fixed value ρ0 (ρ0 > ρi) during a time interval Tp. The load on the corresponding edges and on the other nodes is determined by solving the Burgers equation as described in the section Methods. After Tp, the constraint on the load of node i is released and its load is determined by the dynamics. A new node is selected and perturbed and the procedure is iterated. In addition to the perturbations, at each iteration step, 0.1% of every node load is dissipated. This dissipation would correspond, for example, to the evaporation of water from a river network, cars leaving the streets, or a potential drop due to Joule heating.
Directed networks
The dynamics is investigated on the European high-voltage power grid29 and two network models: the configuration model with power-law degree distribution30,31,32,33 and the Watts-Strogatz model, with small-world features34. In the case of the model networks, the length of the edges are random variables chosen uniformly from the interval [3:20]. Initially, the power grid and the model networks are undirected. Inspired by the fact that in power grids the direction of the current depends on the node voltages, we use the following method to define the direction of the link. To each node i, a random value ϕi (the node voltage) is assigned uniformly from the interval [0:1] and the edge between two nodes is directed from the node with higher voltage to the one with lower voltage (i.e., ϕsource > ϕtarget). This method for generating directed edges automatically prevents the presence of loops. Since fluctuations are always present in the network, the direction of the current can vary in time. Our results are averaged over different voltage distributions as well.
Results
Steady state
At each time step, we measure the temporal load correlation, defined as:
where is the load averaged over all nodes at time t. The brackets represent an average over the last ten consecutive time intervals of length 100Tp, i.e., t′ = t − n100Tp with n = 0, 1, …, 10.
Starting with all loads equal to zero, we observe that decays in time towards a steady state in which the dissipation balances the total incoming load. When drops below 1% of the relative standard deviation of the loads within the network, we assume that the steady state is reached. In the steady state, the load at each node has a well-defined average value with small fluctuations. The spatial distribution for a given realization of voltages in the European power grid is shown in Fig. 1. The size of the dots represents the average load over a time window of 1000Tp measured in the steady state. Most nodes accumulate negligible load (ρ ≈ 0), while surprisingly a small fraction of the nodes are overloaded (ρ > 10ρ0, where ρ0 is the magnitude of each perturbation).
The observed load exemplarily shown in Fig. 1 corresponds to one realization of the voltage distribution and thus for one configuration of the direction of the edges. Assuming small temporal changes in the network (e.g., fluctuations of voltage in the power grid or number of cars entering a road junction), the direction of the edges changes in time. Thus, we also consider different realizations of the voltage distribution and, for each realization, we determine the steady state load distribution. Figure 2 shows the relative load distribution averaged over 5000 realizations. In order to compare the load distribution of different networks (power grid, Watts–Strogatz and scale-free networks), loads in each curve are rescaled by the magnitude of each perturbation (ρ0). The strongly inhomogeneous behavior of the steady-state load seen in Fig. 1 is also visible in the load distribution. The distributions are bimodal defining two different types of nodes: those with a negligible load compared to the perturbation (ρ < ρ0) and those with a larger load (ρ > ρ0). The latter ones are typically overloaded in the steady state, suggesting that the incoming perturbations interfere constructively at them.
The plots for the two network models (Watts–Strogatz and scale-free) in Fig. 2 are obtained for networks with the same number of nodes as the power grid. The average degrees are also kept close to the power grid, with the same number of edges in the scale-free network and 〈kout〉 = 2 in the Watts–Strogatz graph. In both cases, a bimodal distribution is also observed. The power-grid network is constructed from real data and its size corresponds to the real network size. Thus, a finite-size study is not possible. Yet, in the case of the model networks one can systematically study the effect of the network size on the load distribution. Figure 3A shows the load distribution for Watts–Strogatz networks of different network sizes. The majority of the nodes (more than 90%) has always a negligible load, while the load of the remaining nodes follows a broad distribution, characterized by a decay in the relative frequency with increasing load and a cut-off for values of load close to ρ0. The bimodal distribution smoothens out for larger network sizes. For scale-free networks the qualitative picture is slightly different. As shown in Fig. 3B, for all network sizes, one observes two power-law regimes, with a crossover at ρ0. Nevertheless, note that for both network models, there is always a significant fraction of nodes (around 10%) with a non-negligible load. The load value of the cutoff suggests that, at large system sizes, consecutive shock waves that enter the network are separated so that they attenuate their amplitude before being able to interfere.
The specific nodes that exhibit these high load values typically change from realization to realization. However, after averaging over different voltage distributions, we still find some nodes which are consistently overloaded. For each distribution of voltages, we classify as “overloaded nodes” the ones with a load at least ten times larger than the average. We define vulnerability of a node as the probability that it is an overloaded node. Figure 4A shows the spatial distribution of vulnerability in the European power grid where the color and size of the nodes denotes their vulnerability. The vulnerability of white nodes is lower than 0.1%, while the one of the black nodes is larger than 5%. All the other nodes (about 30% of the nodes, in gray color) have a vulnerability between 0.1% and 5%. In comparison, the highly vulnerable nodes are at least 50 times more frequently exposed to large incoming fluxes. In the case of random perturbations, vulnerable nodes are more likely to fail or be congested. It is therefore crucial to identify these nodes to improve their capacity and to mitigate the risk of failure. Figure 5 shows the vulnerability distribution corresponding to the map in Fig. 4A and to other network topologies. In the case of the Watts–Strogatz and scale-free networks, a vulnerability distribution for networks of size N = 105 are presented.
Identifying vulnerable nodes
Next we will introduce a simple topological property of the nodes to identify the vulnerable spots without solving the dynamics of the Burgers equation. According to the Burgers equation, each node sheds the incoming shock wave among its out-edges and the total load agregated at the node at a time t is the sum of incoming loads. Hence, if we track the path of a given shock wave, it is fragmented at each node with multiple out-edges and will stop at any node that does not have any out-edges. Assuming that the time average of the load at a node is proportional to the number of incoming shock waves, we determine the basin corresponding to that node. For this purpose, let us consider one realization of the edge directions (see Fig. 6). For a given node (the one in red in Fig. 6), the corresponding basin is defined as the smallest subgraph of the network containing this node (as the sink), which is connected to the rest of the network by outgoing edges. Following the procedure as illustrated in Fig. 6, we go through the nodes following the opposite direction of the in-edges, starting from the red node (Fig. 6A) and add nodes to the basin that has only out-edges at the end of the process (marked by the blue region in Fig. 6B). The resulting subgraph is the basin of the red node and the contribution of the load of the nodes in the basin is simply the inverse of their out-degree (Fig. 6C), except for the initial (red) node, that contributes to the load with unity. This choice of the contribution of the nodes in the basin is based on the fact that Eq. (7) conserves the flux at each node. For simplicity, we assume here that the amplitude of the shock waves leaving a node is on average the same for each out-edge.
We calculated the size of the basins for each node, defined as the sum of contributions from all nodes inside the basin of the corresponding node. This basin size (which is determined for one voltage distribution) is then averaged over different voltage configurations. The resulting basin size distribution is depicted in Fig. 4B for the power-grid network. One sees that for this network, the distribution of the node-basin size is very similar to the distribution of the vulnerability. A quantitative comparison of the two properties can be given by their correlation. Thus, we plot the rank-rank scatter plots in Fig. 7 of the indices of the nodes after being sorted in ascending order by vulnerability and node-basin size. The plots are the average over 5000 voltage distributions and over 100 different topological realizations of model networks.
The corresponding product-moment correlations ρSp of the ranks are given above the plots, showing strong correspondence between the ranked vulnerability and node-basin size for the power grid and scale-free networks. The product-moment correlation is,
where μx and μy are the mean and σx and σy are the corresponding standard deviation of the two quantities x and y. The crucial nodes are the ones with large vulnerability since they are more exposed to large loads. The basin size shows a strong correlation with the vulnerability for these large values (top right corner of the scatter plots), meaning that it is a good estimator of vulnerability. Watts–Strogatz network exhibits much less correlation because the degree distribution is extremely narrow, that is, deviations from the average degree are negligible. Thus, for each realization, the differences in the loads from node to node are very small. This conclusion is also supported by Fig. 5 showing a narrow vulnerability distribution for Watts–Strogatz networks. In order to describe the nodes that are overloaded more frequently than the average in the small-world network, we measured the average length of the in-edges of the nodes, i.e., the average number of mesh points on the in-edges. Also, to obtain a more realistic distribution of the edge lengths, the graphs were constructed by first considering a two-dimensional lattice and then rewiring each edge with probability p = 0.01, finally we applied a deviation of 50% to each length, distributed uniformly around the original values. Simulations on 50 network realizations with N = 32 × 32 nodes and 1000 voltage realizations for each network resulted in a Pearson-correlation of -0.51 between the vulnerability of the nodes and the average length of their in-edges (with Pearson-correlation of 0.1 between vulnerability and basin size), meaning that nodes with short in-edges are more frequently overloaded. On short edges, decrease in the magnitude of the shock waves is lower, compared to the attenuation of the waves on longer ones. This suggests that in the case of small-world networks, structural homogeneity is very strong (differences among nodes are less pronounced, compared to the scale-free networks) and the physical length of the edges through which load is transmitted have to be considered. See Supplementary Material for snapshots and the scatter plot of the average length and vulnerability in this small-world network model.
Discussion
We study the propagation of shock waves on directed networks using the Burgers equation. Under sequentially applied perturbations and constant dissipation, the dynamics approaches a steady state. In this steady state, most of the nodes have negligible average load and a significant fraction of the total load is localized on a few nodes. We found that some nodes are more likely to accumulate load even after averaging over many edge direction configurations. These nodes (the vulnerable nodes) are more likely to fail, when there is a finite capacity of the load they can bear. Unexpectedly we find for the European power grid a broad pronounced bimodal distribution for the loads, while for scale-free network the distribution resembles more a power law.
The steady state and thus the probability distribution of vulnerability among the network is determined by solving numerically the partial differential equations of Eq. (1) on each edge. The propagation velocity of the shock waves depends on their amplitude, which can vary rapidly throughout the network. We propose a simpler alternative based on the node-basin size to estimate the vulnerability of the nodes and identify the most vulnerable ones. Simulations on a real network (European high-voltage power grid) and on scale-free networks show that the node-basin size can predict very accurately the location of vulnerable nodes while it performs worse for the Watt-Strogatz network due to its narrow degree distribution. Investigation of the edge lengths suggests that in the Watts-Strogatz network, vulnerable nodes are related to those having very short in-edges.
Our results suggest that it is possible to establish a remarkable connection between dynamics and network structure. Although for many networks the node-basin size seems to be an accurate tool in predicting the distributions and detecting vulnerability, it is only the first step towards a complete description of the steady state. More might be understood by studying the relation between the most vulnerable nodes: under what circumstances are they separated or forming connected subgraphs? Is any local property of the network responsible for a node being highly vulnerable? This information would provide the tools to mitigate the risk of systemic failure. Further investigation may involve the removal of nodes that reach their capacity. In this case, the study of the time evolution of the network structure or optimal strategies of dynamical node/edge addition or deletion can be of relevance.
Methods
Dynamics
In this section, we describe the generalization of Eq. (1) on a directed network. The numerical solution of the one-dimensional Burgers equation can be discretized using Godunov's scheme35,36
where is the load at the mesh point i at time t, Δx and Δt are the spatial and temporal discretizations and is the flux. The value of is given as follows35: If ρ ≥ η then
otherwise,
To solve this equation on a network, one needs to fix the direction of each link in order to have a precise definition of the in- and out-flux of a mesh point. For practical purposes, this is a realistic approach as water always flows downhill and the current follows a decreasing gradient in electric potential. Our discretization model for the edges and nodes is illustrated in Fig. 8. The edges of a network are one dimensional and thereby Eq. (4) holds. The number of mesh points in each edge is proportional to its length and the direction is defined by the direction of the edge. In the case of model networks, the length of the links is a uniformly distributed random value. Furthermore, a value of ρk is assigned to each node k. Nodes interact with the nearest mesh points of their incident edges according to the following equation,
denotes the set of in- (out-) edges of node i and is the load at the last (first) mesh point of the corresponding edge. The resulting dynamics conserves the total mass and at each node, the total incoming flux is equal to the outgoing one.
Also, we should add an important remark on the various constraints of the investigated model. First, in the numerical solution of a nonlinear PDE on a network, the degree of a node corresponds to the local dimension of the space in which one solves the equations. As the size of the scale-free network increases, the frequency of nodes with very large degrees also grow. Considering numerical stability, the appearance of larger degrees sets an upper limit on the magnitude of the applied perturbations. However, if the perturbations are small (which is required by the numerical treatment), shock waves tend to vanish by travelling on the edges and they are not able to interfere constructively. Therefore, in the finite-size study, we considered only networks below the size of N = 104.
Networks
We consider three network models: the European power grid (with N = 1254 nodes and M = 1811 edges, i.e., 〈kout〉 = 1.44), the Watts–Strogatz small-world network (〈kout〉 = 2) and scale-free network models (〈kout〉 = 1.44 for N = 1254 and 〈kout〉 = 2 in the case of large network sizes). The Watts–Strogatz network is constructed by considering first a one-dimensional chain with first and second neighborhood connections and periodic boundary conditions and then rewiring each edge with probability p = 0.01 (with undirected edges, this corresponds to an undirected average degree 〈k〉 = 4). After the voltages are set and edge directions are introduced, the resulting network has a directed average degree of 〈kout〉 = 2. The scale-free network is constructed by the configuration model: first we assign the degrees for each node according to a power-law with exponent γ = 2.5 and then connect randomly chosen nodes. Finally, further rewiring of the edges is carried out in order to eliminate degree-correlations. Note that the number of edges in the Watts–Strogatz network is different from that in the power grid and the scale-free network.
References
Brummitt, C. D., D'Souza, R. M. & Leicht, E. A. Suppressing cascades of load in interdependent networks. Proc. Natl. Acad. Sci. 109, E680–E689 (2012).
Helbing, D. Traffic and related self-driven many-particle systems. Rev. Mod. Phys. 73, 1067–1141 (2001).
Mamede, G. L., Araújo, N. A. M., Schneider, C. M., de Araújo, J. C. & Herrmann, H. J. Overspill avalanching in a dense reservoir network. Proc. Natl. Acad. Sci. 109, 7191–7195 (2012).
Lerner, E. J. What's wrong with the electric grid. Ind. Phys. 9, 8–13 (2003).
Anand, K., Gai, P. & Marsili, M. Rollover risk, network structure and systemic financial crises. J. Econ. Dyn. Control 36, 1088–1100 (2012).
Zel'dovich, Y. B. & Raizer, Y. P. Physics of shock waves and high-temperature hydrodynamic phenomena (Courier Dover Publications, 2002).
Rüdenberg, R. Electrical shock waves in power systems: travelling waves in lumped and distributed circuit elements (Harvard University Press, 1968).
Calvert, S. C., Van den Broek, T. H. A. & Van Noort, M. Modeling cooperative driving in congestion shockwaves on a freeway network. In: 2011 14th International IEEE Conf. on Intell. Transp. Sys. 614–619 (2011).
Gai, P. & Kapadia, S. Contagion in financial networks. P. Roy. Soc. A 466, 2401–2423 (2010).
Moreira, A. A., Andrade, J. S., Herrmann, H. J. & Indekeu, J. O. How to make a fragile network robust and vice versa. Phys. Rev. Lett. 102, 018701 (2009).
Allen, F. & Babus, A. Networks in Finance (Prentice Hall, 2010).
Schneider, C. M., Moreira, A. A., Andrade, J. S., Havlin, S. & Herrmann, H. J. Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108, 3838–3841 (2011).
Watts, D. J. A simple model of global cascades on random networks. Proc. Natl. Acad. Sci. 99, 5766–5771 (2002).
Sachtjen, M. L., Carreras, B. A. & Lynch, V. E. Disturbances in a power transmission system. Phys. Rev. E 61, 4877–4882 (2000).
Kosterev, D. N., Taylor, C. & Mittelstadt, W. Model validation for the august 10, 1996 WSCC system outage. IEEE T. Power Syst. 14, 967–979 (1999).
Bak, P., Tang, C. & Wiesenfeld, K. Self-organized criticality: An explanation of the 1/f noise. Phys. Rev. Lett. 59, 381–384 (1987).
Bonabeau, E. Sandpile dynamics on random graphs. J. Phys. Soc. Jpn. 64, 327–328 (1995).
Goh, K.-I., Lee, D.-S., Kahng, B. & Kim, D. Sandpile on scale-free networks. Phys. Rev. Lett. 91, 148701 (2003).
Araújo, N. A. M. Getting out of control. Physics 6, 90 (2013).
Noël, P.-A., Brummitt, C. D. & D'Souza, R. M. Controlling self-organizing dynamics on networks using models that self-organize. Phys. Rev. Lett. 111, 078701 (2013).
Olami, Z., Feder, H. J. S. & Christensen, K. Self-organized criticality in a continuous, nonconservative cellular automaton modeling earthquakes. Phys. Rev. Lett. 68, 1244–1247 (1992).
Lise, S. & Paczuski, M. Nonconservative earthquake model of self-organized criticality on a random graph. Phys. Rev. Lett. 88, 228301 (2002).
Chowdhury, D., Santen, L. & Schadschneider, A. Statistical physics of vehicular traffic and some related systems. Phys. Rep. 329, 199–329 (2000).
Mendes, G. A., da Silva, L. R. & Herrmann, H. J. Traffic gridlock on complex networks. Physica A 391, 362–370 (2012).
Battiston, S., Gatti, D. D., Gallegati, M., Greenwald, B. & Stiglitz, J. E. Liaisons dangereuses: Increasing connectivity, risk sharing and systemic risk. J. Econ. Dyn. Control 36, 1121–1141 (2012).
Burgers, J. M. The Nonlinear Diffusion equation (D. Reidel Publishing Company, Dodrecht-Boston, 1974).
Whitham, G. B. Linear and nonlinear waves (New York: Wiley, 1974).
Tas, K., Machado, J. A. T. & Baleanu, D. Mathematical methods in Engineering (Springer, 2007).
Zhou, Q. & Bialek, J. Approximate model of european interconnected system as a benchmark system to study effects of cross-border trades. IEEE T. Power Syst. 20, 782–788 (2005).
Albert, R. & Barabási, A.-L. Statistical mechanics of complex networks. Rev. Mod. Phys. 74, 47–97 (2002).
Newman, M. Networks: An Introduction (Oxford University Press, Inc., New York, NY, USA, 2010).
Bender, E. A. & Canfield, E. R. The asymptotic number of labelled graphs with given degree sequences. J. Comb. Theory A 24, 296–307 (1978).
Molloy, M. & Reed, B. A critical point for random graphs with a given degree serquence. Random Struct. Algor. 6, 161–180 (1995).
Watts, D. J. & Strogatz, S. H. Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998).
Godunov, S. K. A difference scheme for numerical solution of discontinuous solution of hydrodynamic equations. Math. Sbornik 47, 271–306 (1959).
LeVeque, R. J. Numerical methods for conservation laws (Birkhauser, 1990).
Acknowledgements
Authors would like to thank the Swiss National Science Foundation under contract 200021 126853, the ETH Zürich Risk Center for financial support. This work was also supported by the European Research Council (ERC) Advanced Grant 319968-FlowCCS and the EU ERC FP7 COLLMOT Grant No: 227878.
Author information
Authors and Affiliations
Contributions
E.M., N.A., T.V. and H.H. contributed equally to this research.
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Electronic supplementary material
Supplementary Information
Supplementary Material
Rights and permissions
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. The images in this article are included in the article's Creative Commons license, unless indicated otherwise in the image credit; if the image is not included under the Creative Commons license, users will need to obtain permission from the license holder in order to reproduce the image. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/
About this article
Cite this article
Mones, E., Araújo, N., Vicsek, T. et al. Shock waves on complex networks. Sci Rep 4, 4949 (2014). https://doi.org/10.1038/srep04949
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/srep04949
This article is cited by
-
First-order reliability method to problems involving multimodal distributions
Structural and Multidisciplinary Optimization (2023)
-
Sequential approximate reliability-based design optimization for structures with multimodal random variables
Structural and Multidisciplinary Optimization (2020)
-
A new uncertainty propagation method considering multimodal probability density functions
Structural and Multidisciplinary Optimization (2019)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.