30.12.2013 Views

Projects - Cengage Learning

Projects - Cengage Learning

Projects - Cengage Learning

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix C C-95<br />

him/herself through an intermediary would be to test the integrity of that intermediary.)As<br />

a final example in interpreting the matrix in Figure 3, consider the<br />

0 in the bottom row. This says that there is no way for D to send a message to<br />

C using exactly one intermediary. (Check this in Figure 1.)<br />

There is a surprising connection between the communication matrix M in<br />

Figure 2 and the one-intermediary matrix in Figure 3. If you compute the<br />

matrix product of M with itself (this is abbreviated M 2 ), you get the oneintermediary<br />

matrix in Figure 3.You should verify this now for yourself. That is,<br />

either by hand or with a graphing utility, compute M 2 and check that the product<br />

is the same as the matrix in Figure 3. It can be shown that this situation<br />

holds in general.<br />

F<br />

Figure 4<br />

H<br />

E<br />

To<br />

d<br />

G<br />

A B C D<br />

A 2 ? ? ?<br />

B ? ? ? ?<br />

From d §<br />

¥<br />

C ? ? ? ?<br />

D ? 1 3 ?<br />

Figure 5<br />

Two-intermediary matrix for the<br />

spy network in Figure 1.<br />

A<br />

B<br />

C<br />

D<br />

E<br />

A B C D E<br />

0 1 1 1 1<br />

1 0 1 0 0<br />

• 1 1 0 1 0μ<br />

1 0 1 0 1<br />

1 0 0 1 0<br />

Figure 6<br />

Communication matrix M for a<br />

network with five spies.<br />

Exercises<br />

1. Consider the communication links shown in Figure 4.<br />

(a) Specify the communication matrix M for this system.<br />

(b) By referring to Figure 4, work out the one-intermediary matrix for this<br />

system. Then check your answer by computing M 2 and comparing<br />

the results.<br />

2. Return to the spy network that we considered in Figure 1.<br />

(a) Work out the entries for the following two-intermediary matrix in<br />

Figure 5. As examples, three entries are already filled in. The 2 in the<br />

first row, first column indicates that there are two ways to send a<br />

message from A to A using two intermediaries. The routes are<br />

A S B S C S A and A S C S B S A. As another example, the 1 in<br />

the fourth row, second column indicates that there is only one way to<br />

send a message from D to B using two intermediaries. As you can verify<br />

in Figure 1, the route is D S C S A S B. Finally, consider the 3<br />

in the fourth row, third column. This indicates that there are three<br />

ways to send a message from D to C using two intermediaries. The<br />

three routes are D S C S AS C, D S C S B S C, and<br />

D S C S D S C. In these routes from D to C, note that D and C<br />

themselves can be used as intermediaries.<br />

(b) Let M be the communication matrix given in Figure 2. It can be<br />

shown that the matrix M 3 [M(M 2 )] equals the two-intermediary<br />

matrix for this system. Compute M 3 , either by hand or with a graphing<br />

utility, and then use the result to check the entries in your answer<br />

for part (a).<br />

3. Consider a network of five spies, A, B, C, D, and E with the communication<br />

matrix M shown in Figure 6.<br />

(a) Draw a diagram, of the type shown in Figure 1, showing the communication<br />

links.<br />

(b) Using the diagram from part (a): How many one-intermediary routes<br />

can you find for sending a message from D to A? How many twointermediary<br />

routes can you find for sending a message from D to A?<br />

(c) Use a graphing utility to compute M 2 and M 3 , and thereby check to<br />

see whether you missed any routes in part (b).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!