Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Appendix C C-95<br />
him/herself through an intermediary would be to test the integrity of that intermediary.)As<br />
a final example in interpreting the matrix in Figure 3, consider the<br />
0 in the bottom row. This says that there is no way for D to send a message to<br />
C using exactly one intermediary. (Check this in Figure 1.)<br />
There is a surprising connection between the communication matrix M in<br />
Figure 2 and the one-intermediary matrix in Figure 3. If you compute the<br />
matrix product of M with itself (this is abbreviated M 2 ), you get the oneintermediary<br />
matrix in Figure 3.You should verify this now for yourself. That is,<br />
either by hand or with a graphing utility, compute M 2 and check that the product<br />
is the same as the matrix in Figure 3. It can be shown that this situation<br />
holds in general.<br />
F<br />
Figure 4<br />
H<br />
E<br />
To<br />
d<br />
G<br />
A B C D<br />
A 2 ? ? ?<br />
B ? ? ? ?<br />
From d §<br />
¥<br />
C ? ? ? ?<br />
D ? 1 3 ?<br />
Figure 5<br />
Two-intermediary matrix for the<br />
spy network in Figure 1.<br />
A<br />
B<br />
C<br />
D<br />
E<br />
A B C D E<br />
0 1 1 1 1<br />
1 0 1 0 0<br />
• 1 1 0 1 0μ<br />
1 0 1 0 1<br />
1 0 0 1 0<br />
Figure 6<br />
Communication matrix M for a<br />
network with five spies.<br />
Exercises<br />
1. Consider the communication links shown in Figure 4.<br />
(a) Specify the communication matrix M for this system.<br />
(b) By referring to Figure 4, work out the one-intermediary matrix for this<br />
system. Then check your answer by computing M 2 and comparing<br />
the results.<br />
2. Return to the spy network that we considered in Figure 1.<br />
(a) Work out the entries for the following two-intermediary matrix in<br />
Figure 5. As examples, three entries are already filled in. The 2 in the<br />
first row, first column indicates that there are two ways to send a<br />
message from A to A using two intermediaries. The routes are<br />
A S B S C S A and A S C S B S A. As another example, the 1 in<br />
the fourth row, second column indicates that there is only one way to<br />
send a message from D to B using two intermediaries. As you can verify<br />
in Figure 1, the route is D S C S A S B. Finally, consider the 3<br />
in the fourth row, third column. This indicates that there are three<br />
ways to send a message from D to C using two intermediaries. The<br />
three routes are D S C S AS C, D S C S B S C, and<br />
D S C S D S C. In these routes from D to C, note that D and C<br />
themselves can be used as intermediaries.<br />
(b) Let M be the communication matrix given in Figure 2. It can be<br />
shown that the matrix M 3 [M(M 2 )] equals the two-intermediary<br />
matrix for this system. Compute M 3 , either by hand or with a graphing<br />
utility, and then use the result to check the entries in your answer<br />
for part (a).<br />
3. Consider a network of five spies, A, B, C, D, and E with the communication<br />
matrix M shown in Figure 6.<br />
(a) Draw a diagram, of the type shown in Figure 1, showing the communication<br />
links.<br />
(b) Using the diagram from part (a): How many one-intermediary routes<br />
can you find for sending a message from D to A? How many twointermediary<br />
routes can you find for sending a message from D to A?<br />
(c) Use a graphing utility to compute M 2 and M 3 , and thereby check to<br />
see whether you missed any routes in part (b).