Next Article in Journal
Particle Filtering: A Priori Estimation of Observational Errors of a State-Space Model with Linear Observation Equation
Next Article in Special Issue
Non-Statistical Method for Validation the Time Characteristics of Digital Control Systems with a Cyclic Processing Algorithm
Previous Article in Journal
The Superiority of Quantum Strategy in 3-Player Prisoner’s Dilemma
Previous Article in Special Issue
Estimation of the Optimal Threshold Policy in a Queue with Heterogeneous Servers Using a Heuristic Solution and Artificial Neural Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Single-Threshold Model Resource Network and Its Double-Threshold Modifications

by
Liudmila Zhilyakova
V. A. Trapeznikov Institute of Control Sciences, Russian Academy of Sciences, 65, Profsoyuznaya Street, 117997 Moscow, Russia
Mathematics 2021, 9(12), 1444; https://doi.org/10.3390/math9121444
Submission received: 30 April 2021 / Revised: 8 June 2021 / Accepted: 17 June 2021 / Published: 21 June 2021
(This article belongs to the Special Issue Distributed Computer and Communication Networks)

Abstract

:
A resource network is a non-classical flow model where the infinitely divisible resource is iteratively distributed among the vertices of a weighted digraph. The model operates in discrete time. The weights of the edges denote their throughputs. The basic model, a standard resource network, has one general characteristic of resource amount—the network threshold value. This value depends on graph topology and weights of edges. This paper briefly outlines the main characteristics of standard resource networks and describes two its modifications. In both non-standard models, the changes concern the rules of receiving the resource by the vertices. The first modification imposes restrictions on the selected vertices’ capacity, preventing them from accumulating resource surpluses. In the second modification, a network with so-called greedy vertices, on the contrary, vertices first accumulate resource themselves and only then begin to give it away. It is noteworthy that completely different changes lead, in general, to the same consequences: the appearance of a second threshold value. At some intervals of resource values in networks, their functioning is described by a homogeneous Markov chain, at others by more complex rules. Transient processes and limit states in networks with different topologies and different operation rules are investigated and described.

Graphical Abstract

1. Introduction

A resource network is a dynamic flow model based on a directed weighted graph. Vertices exchange a homogeneous resource in infinite discrete time. The resource flows through the edges with limited throughputs indicated by their weights. Vertices, in general, can store an unlimited amount of resources. In the network, the conservation law is fulfilled: the total resource amount is constant. In this sense, there are no source and sink vertices in the network; the resource does not come from outside and is not consumed. The network states are described by the vector of the resource distribution over the vertices. The change of states occurs due to the resources reallocation. The resource contained in the edges between two consecutive time steps forms a flow in the network.
For the first time, the resource network was introduced in [1], where a simple special case was considered—a complete uniform network with loops. Since then, the mathematical properties of networks for all graph topologies have been investigated. Some results concerning this paper are presented in [2,3,4,5] (regular networks) and in [6] (Eulerian networks). The classification of resource networks and notions of “regular” and “Eulerian” networks will be given in Section 2.4. The present article summarizes and reinterprets some of the old results obtained for the standard model of a resource network, gives theorems with new proofs, and presents new results—both for the standard model and for two its modifications, as well as for their combination. The first modification is a network with limited vertex capacities introduced in [7]. The second model, a network with “greedy” vertices is defined in [8], where the simple special case, complete uniform networks were investigated.
The study of flows in networks has a long history. In 1962, L. Ford and D. Fulkerson proposed a static flow model and proved their famous “maximum-flow minimum-cut” theorem [9]. Since then, many modifications and extensions of this classical model have appeared; various methods and algorithms are developed to solve different network flow problems [10]. As a rule, these models and methods are devoted to studying homogeneous and heterogeneous flows directed from one or more sources to one or more sinks, possibly with some constraints.
Resource network is a non-linear threshold flow model. Each vertex can send resources to outgoing edges according to one of two rules with threshold switching. The choice of the rule depends on the resource amount at the vertex. If this amount is small (below the threshold value), then the entire resource is distributed in proportion to the throughputs of the edges if it is large (above the threshold value), then the vertex gives to the edges their throughputs and leaves the surplus for itself.
The network with such operation rules inherits the properties of two classes of models. The first one is random walks and diffusion on graphs. This mathematical tool is used to simulate and investigate a wide class of theoretical and applied problems [11,12,13,14,15].
The second class combines integer threshold models. The most studied of them is the model of the combinatorial problem on graphs chip-firing game. This model gave rise to many non-trivial mathematical results [16,17,18,19,20,21]. It is noteworthy that in both classes of models, a special place is occupied by the study of dynamics on regular graphs, in particular, lattices [14,19]. The chip-firing model on different regular directed lattices is proved to be an appropriate mathematical formalism for describing processes of self-organized criticality [22] and, in particular, of Abelian sandpile model [23,24,25]. In this way, the chip-firing game, which is a combinatorial model, and Abelian sandpile model, which is a probabilistic cellular automaton [26,27], are two equivalent forms of one model. In [28], an avalanche model is introduced where the regular lattice of sandpile is generalized to an arbitrary directed graph with multiple arcs. The diffusion game, a parallel variation of chip-firing game, is investigated in [29]. Special mention should be made of networks with different constraints on the flow distribution [30]. Mathematical properties of some of the above and a number of other models are described in a survey [31].
Resource network is both flow and diffusion model. It is completely deterministic, however with small amounts of resource, it is described by a homogeneous Markov chain, which makes it similar to random walks. On the other hand, with large amounts of resource, it becomes similar to a parallel chip-firing game. In this case, it is also deterministic, and its operation is described by a non-homogeneous Markov chain.
The structure of the article is as follows.
In the second section, we will give definitions regarding the basic (standard) model of the resource network and build a classification of networks.
In the third section, we describe the mathematical properties of a resource network.
The fourth section presents the main analytical results for a standard model.
The fifth section is devoted to studying a network with a constraint on the capacity of some selected vertices.
The sixth section describes a resource network with “greedy” vertices and its main features. This is a new model; its research began this year. So far, only complete uniform networks have been described.
The seventh section introduces a combination of two modifications.
Then, we discuss the main findings and research perspectives.

2. Resource Network, the Standard Model

2.1. Basic Definitions

A resource network is a dynamic flow model. It is represented by directed weighted graph G = ( V , E ) with vertices v i V and edges e i j = ( v i , v j ) E . Edges have the non-negative weights r i j constant in time. The weights specify throughputs of edges.
Matrix R = ( r i j ) n × n is the throughput matrix of a network, r i j { 0 } R + . Edge e i j has a throughput equal to r i j > 0 .
Definition 1.
Resources q i ( t ) are non-negative numbers assigned to vertices v i , i = 1 , n ¯ , and changing in discrete time t. In the standard model, vertices v i can store an unlimited resource amount.
Definition 2.
A state Q ( t ) of a network at time step t is a vector of resource values at each vertex
Q ( t ) = ( q 1 ( t ) , , q n ( t ) ) .
Definition 3.
A total resource in a network at time t is the value
W = i = 1 n q i ( t ) .
The network operation fulfills the conservation law: the resource does not flow in from the outside and does not flow out or dissipates:
t i = 1 n q i ( t ) = W = c o n s t .
Definition 4.
Between the two consecutive steps t and t + 1 , the resource moves along the edges. Such a resource in the edges is called a flow.
F ( t ) = ( f i j ( t ) ) n × n is a flow matrix at time t. By definition, t f i j ( t ) r i j .
Definition 5.
The total flow in the network at time step t is the value
f s u m ( t ) = i = 1 n j = 1 n f i j ( t ) .
Definition 6.
The total throughput of the network is the value
r s u m = i = 1 n j = 1 n r i j .
Obviously, W t f s u m ( t ) r s u m .
Remark 1.
Unlike the total resource in the network, the total flow is always limited by its throughput.
In addition, there is an essential difference between states and flows: f s u m ( t ) changes over time if the network is not in an equilibrium state; W is always constant, despite the fact that the values q i ( t ) change.

2.2. Rules of Resource Distribution

First, we introduce two characteristics of the network vertices.
Definition 7.
The values
r i i n = j = 1 n r j i a n d r i o u t = j = 1 n r i j
are total in- and out-throughputs of vertex v i , respectively. A loop’s throughput, if it exists, is included in both sums.
At time step t, the vertex v i sends to the edge e i k the resource amount f i k ( t ) equal to
f i k ( t ) = r i k , if q i ( t ) > r i o u t ( rule 1 ) ; r i k r i o u t q i ( t ) , if q i ( t ) r i o u t ( rule 2 ) .
Rule one is applied when a vertex contains more resource than it can send to all adjacent vertices through outgoing edges; in this case, each edge transmits the resource amount equal to its throughput: f i j ( t ) = r i j , and totally, the vertex gives away resource amount
j = 1 n f i j ( t ) = j = 1 n r i j = r i o u t ,
or its total output throughput.
According to rule two, a vertex sends out its entire resource. It distributes the resource to all outgoing edges in proportion to their throughputs.
Remark 2.
The value q i ( t ) = r i o u t is the local threshold value of a vertex that switches its functioning rules. This switching occurs without discontinuity: at the value q i ( t ) = r i o u t , applying both rules will give the same result.
Unlike the classic chip-firing game, in a resource network, all vertices “fire” in parallel. All non-empty vertices send resource into all outgoing edges at every time step according to rule 1 or 2; adjacent vertices receive the resource through incoming edges.

2.3. Network Operation

First, we introduce the concepts of the output and input total flow.
Definition 8.
For vertex v i , at time step t, the total output flow is
f i o u t ( t ) = j = 1 n f i j ( t ) = min { q i ( t ) , r i o u t } .
The total input flow at time step t + 1 is
f i i n ( t + 1 ) = j = 1 n f j i ( t ) .
We will assume that f i i n ( 0 ) = 0 .
Definition 9.
Vectors F o u t ( t ) = ( f 1 o u t ( t ) , , f n o u t ( t ) ) and F i n ( t ) = ( f 1 i n ( t ) , , f n i n ( t ) ) are called the output and input flow vectors, respectively.
The network operates in infinite discrete time. The initial state is determined by the vector of resource distribution over the vertices: Q ( 0 ) = ( q 1 ( 0 ) , , q n ( 0 ) ) .
At time step t, each vertex forms its output flow by one of the rules 1 or 2 (Formulae (1) and (2)). The new state is obtained as follows:
Q ( t + 1 ) = Q ( t ) F o u t ( t ) + F i n ( t + 1 ) .
The examples of network operation for the network represented by complete uniform graph are demonstrated in [32].
Definition 10.
The state Q ( t ) is called steady if Q ( t ) = Q ( t + 1 ) = .
Definition 11.
The state Q = ( q 1 , , q n ) is called asymptotically reachable if for some Q ( t ) = ( q 1 ( t ) , , q n ( t ) )
lim t q i ( t ) = q i , i = 1 , n ¯ .
Definition 12.
The state Q * = ( q 1 * , , q n * ) is called a limit state if it is either steady or asymptotically reachable.
If the state of a network Q * = ( q 1 * , , q n * ) is steady, then the flow is also steady.
Definition 13.
F * = ( f i j * ) n × n is a limit flow matrix. The values f i i n * and f i o u t * are determined similarly to Formulaes (2) and (3).
The study of the dynamics of network states and flows during its operation showed that networks with different properties function in different ways [1,2,3,4,5]. We introduce two classifications: by topology and by total in- and out-throughputs of vertices.

2.4. Classification of Networks by Topology

In this classification, the following classes are distinguished (Figure 1).
  • Ergodic networks
    • Regular networks;
    • Cyclic networks;
  • Non-ergodic networks
    • Absorbing networks;
    • Mixed networks.
Definition 14.
A resource network is ergodic if it is represented by a strongly connected graph.
In a random walk on such a graph, any vertex is recurrent. In terms of resource allocation, this means that all vertices both receive and send the resource.
The functioning of an ergodic network at a small resource value (see Section 3.1 for details) is described by an ergodic homogeneous Markov chain [2].
Definition 15.
An ergodic resource network is regular if the greatest common divisor (GCD) of the lengths of all cycles in its graph is equal to one.
Definition 16.
An ergodic resource network is cyclic if GCD of the lengths of all cycles in its graph is more than one.
Definition 17.
A resource network is non-ergodic if its graph is not strongly connected.
Definition 18.
A vertex is called irreversible if there is a path from it to a vertex from which it is unreachable.
Definition 19.
A subnetwork is called transient component if it contains only irreversible vertices.
Definition 20.
A non-ergodic resource network is mixed if it contains transient and ergodic components (Figure 1).
Definition 21.
A mixed resource network is absorbing if all ergodic components are represented by single vertices. Absorbing vertices are an analog of the sink vertices in classical flow networks.
An absorbing network is a special case of a mixed non-ergodic network. On the other hand, a mixed network can be considered an absorbing network if each ergodic component is condensed into one sink vertex.

2.5. Classification of Networks by Total Throughputs of Vertices

This classification, unlike the previous one, does not have a tree structure. Some classes are not “pure” and may inherit properties from two ancestors (Figure 2).
Definition 22.
A resource network is called uniform if all its edges have the same weights.
We have separated complete uniform networks into a particular class because it is a simple and convenient object for demonstrating various properties of networks.
The nonuniform networks are divided into non-symmetric and Eulerian networks.
Consider the tuple
ρ = ( ( r 1 i n , r 1 o u t ) , , ( r n i n , r n o u t ) ) .
It characterizes vertices by their total in- and out-throughputs.
If for the vertex v i , holds r i i n   >   r i o u t , then it can receive more than it can transmit. If r i i n < r i o u t , then, accordingly, it can transmit more than it receives. If r i i n = r i o u t , this vertex can receive and transmit the same resource amount.
Definition 23.
All the vertices of a network are divided into three classes according to the sign of the r i i n r i o u t value:
  • Receiver-vertices, r i i n r i o u t > 0 ;
  • Source-vertices, r i i n r i o u t < 0 ;
  • Neutral vertices, r i i n r i o u t = 0 .
If at least one receiver-vertex exists in the network, then at least one source also exists, and vice versa.
Definition 24.
A resource network is called non-symmetric if it has at least one receiver-vertex and one source-vertex.
Definition 25.
A resource network is called Eulerian if all its vertices are neutral.
An Eulerian network can be symmetric when the matrix of its graph is symmetric and quasi-symmetric when the matrix is not symmetric, but the equality r i i n = r i o u t holds for each vertex.

2.6. General Classification of Networks

We introduce a general classification of networks as the Cartesian product of the two introduced classifications (Figure 3).
As mentioned above, uniform networks are an illustrative model example. However, this is not a fully independent class. The results for uniform networks are included in the results for other classes (asymmetric, Eulerian networks) depending on the topology of a uniform network.
This study focuses on the models from the top row of the table in Figure 3. In some cases, they will be considered separately; in other cases, when their properties coincide together.

3. Materials and Methods: The Standard Model

3.1. Regular Resource Networks and Homogeneous Markov Chains

Given a regular network from any throughput-class (the entire top row of the table in Figure 3), consider its operation for the total resource equal to one ( W = 1 ).
It was proved that in this case, the resource distribution process is described by a regular homogeneous Markov chain [2].
Denote the vectors of an arbitrary state and of the limit state for W = 1 as Q 1 ( t ) and Q 1 * , respectively.
In this case, the vector Q 1 ( 0 ) is a vector of the initial probability distribution. The transition matrix R is obtained from the matrix R as follows:
R = r 11 r 1 o u t r 1 n r 1 o u t r n 1 r n o u t r n n r n o u t ,
or R = D 1 R , where D = diag ( r 1 o u t , , r n o u t ) . R is a stochastic matrix.
The change of states is described by the formula
Q 1 ( t + 1 ) = Q 1 ( t ) R .
Formula (6) follows directly from the application of rule 2 of the network operation to all vertices. (We assume that the throughputs of the network edges are such that for W = 1 , all vertices operate according to rule 2).
Therefore, all the results valid for regular homogeneous Markov chains [33] can be transferred to the resource network with W = 1 .
Proposition 1.
If a regular network is given by matrix R, and matrix R is the corresponding stochastic matrix, then
  • The limit of degrees of matrix R exists:
    lim t ( R ) t = R * ;
  • The limit state exists and is unique for any initial state.
    For an arbitrary state Q 1 ( t ) the equality holds
    Q 1 ( t ) R * = Q 1 * ;
  • The limit matrix R * and limit vector Q 1 * are related by the following formula:
    R * = 1 · Q 1 * ,
    where 1 = ( 1 , , 1 ) T .
    In other words, matrix R * consists of n identical rows represented by vector Q 1 * .
  • Vector Q 1 * is a single left eigenvector of matrices R and R * corresponding to eigenvalue λ = 1 :
    Q 1 * R = Q 1 * ;
    Q 1 * R * = Q 1 * .
Corollary 1.
The limit flow exists and is unique for any initial state: F i n 1 * = ( F o u t 1 * ) T = Q 1 * ; f s u m * = 1 .
If W > 1 and all the vertices give out their resource according to rule 2, all of the above results will also be correct.
The limit state and flow vectors are unique for any initial state and can be found by the formulae
Q * = W · Q 1 * ; F i n * = ( F o u t * ) T = W · Q 1 * ; f s u m * = W .
Lemma 1.
In a regular non-symmetric resource network, for any total resource W and its initial distribution, the resource at source and neutral vertices v i becomes less than r i o u t in a finite number of steps (they start functioning according to rule 2).
Proof. 
Consider the source and neutral vertices separately.
  • Consider an arbitrary source-vertex v i . Let at t = 0 its resource be more than its out-throughput: q i ( 0 ) > r i o u t . It operates according to rule 1. At first time step it loses resource amount bounded from below by value Δ q i = r i o u t r i i n > 0 . Then it will loose all the surplus s i = q i ( 0 ) r i o u t in at most t = s i Δ q i steps.
  • Let there be neutral vertices in the network.
    Consider the time step t when all the source-vertices switched to rule 2.
    Consider a neutral vertex v j adjacent to any source vertex. As the network is regular, such a vertex always exists. Let at t = t its resource be more than its out-throughput: q j ( t ) > r j o u t . Then, it loses resource amount bounded from below by value Δ q j = r j i f j i ( t ) > 0 , as the source vertex cannot increase its resource. Then, it will loose all the surplus s j = q j ( t ) r j o u t in at most t = s j Δ q j steps.
    Consider the next neutral vertex adjacent either to the source vertex or to v j .
    Repeating these arguments, we get that in a finite number of steps, all neutral vertices will switch to rule 2.
 □
Corollary 2.
In a regular non-symmetric network, if the value W is large, the resource will be accumulated in some of the sink-vertices. Source and neutral vertices can neither attract nor hold a resource in excess of a certain value strictly less than their total out-throughput.
Lemma 2.
In a regular Eulerian resource network, for total resource W r s u m and any its initial distribution, all the vertices switch to operation according to rule 2. If W < r s u m the switching occurs in a finite number of steps; if W = r s u m resources at some vertices v i reach the values r i o u t asymptotically from above.
Proof. 
If W < r s u m the proof is similar to the proof of Lemma 1.
Let W = r s u m . As the network is Eulerian, then j r j i n = r j o u t . Let v i be the vertex for which inequality q i ( 0 ) r i o u t holds.
Its output flow is equal to r i o u t , its input flow does not exceed r i o u t . The input flow is equal to r i o u t if and only if for all the rest vertices v k holds q k ( 0 ) = r k o u t , k i . In this case, q i ( 0 ) = r i o u t , as W = r s u m , and the state Q ( 0 ) = r 1 o u t , , r n o u t is stable.
If q i ( 0 ) > r i o u t and t q i ( t ) > r i o u t then the value q i * > r i o u t will be reached asymptotically from above. The limit state is Q * = r 1 o u t , , r n o u t .
If q i ( 0 ) > r i o u t and t : q i ( t ) < r i o u t then the value q i * > r i o u t will be reached asymptotically from below. The limit state is Q * = r 1 o u t , , r n o u t .
 □
Theorem 1.
In a regular resource network, there exists a unique threshold value of the resource W = T , such that
  • if W T for any initial state Q ( 0 ) = ( q 1 ( 0 ) , , q n ( 0 ) ) , there is a time step t , such that if t > t all vertices operate according to rule 2.
  • if W > T for any initial state Q ( 0 ) = ( q 1 ( 0 ) , , q n ( 0 ) ) , there will always be at least one vertex operating according to rule 1.
Proof. 
It follows from Lemma 1 that in a non-symmetric network all the source- and neutral vertices switch to rule 2 in a finite number of steps t ( k ) .
It follows from Lemma 2 that in an Eulerian network all the vertices switch to rule 2 in a finite number of steps t ( m ) if W < r s u m .
For a non-symmetric network, let the value W be such that all receivers also function according to rule 2.
Consider the functioning of an arbitrary regular network starting from the moment t > max { t ( k ) , t ( m ) } .
It follows from Formula (9) that in this case the limit state exists and Q * = W · Q 1 * .
We will consider the vector Q * = Q * ( W ) as a function of W. Let us increase W until at least one coordinate q i * reach the value r i o u t .
Denote the limit vector with at least one coordinate satisfying the equality q i * = r i o u t , by Q ˜ .
As the vector Q 1 * is unique, the vector Q ˜ is also unique.
If the resource is increased further, vertex v i will switch to rule 1.
The resource value at which the equality q i * = r i o u t holds, is the threshold value W = T . It is unique and does not depend on the initial state.
T = i = 1 n q ˜ i .
 □
Corollary 3.
If W T , then the limit state and flow vectors are unique for any initial state. They can be found by formula (9).
The following theorem was first formulated in [3] for non-symmetric networks. Here, we generalize it to all regular networks and give a more compact proof.
Theorem 2.
In a regular resource network, the threshold value T is expressed by formula
T = min i = 1 , n ¯ r i o u t q i 1 * .
Proof. 
The formula for vector Q ˜ = ( q ˜ 1 , , q ˜ n ) is
Q ˜ = T · Q 1 * .
Let the vertices with q ˜ i = r i o u t have the indices from 1 to l , l 1 . Then,
( r 1 o u t , , r l o u t , q ˜ l + 1 , , q ˜ n ) = T ( q 1 1 * , , q l 1 * , q l + 1 1 * , , q n 1 * ) ;
or
T · q i 1 * = r i o u t , i = 1 , l ¯ ; T · q j 1 * = q j ˜ < r j o u t , j = l + 1 , n ¯ .
Then,
r 1 o u t q 1 1 * = = r l o u t q l 1 * = T ;
r j o u t q j 1 * > q j ˜ q j 1 * = T , j = l + 1 , n ¯ .
This immediately implies Formula (10).  □
Definition 26.
The total resource W T will be called small; the total resource W > T will be called large.
In the following sections, the limit state vector Q ˜ at W = T will play an important role. As the total resource W = T is covered by rule 2, the vector Q ˜ exists and is unique for any regular network. The flow vectors F ˜ i n and F ˜ o u t also exist.
Q ˜ = F ˜ o u t = F ˜ i n T = T Q 1 * .
Consider the distinctions in the behavior of regular networks of different classes with a small resource (the top row of the table in Figure 3).
Remark 3.
If W T , the total steady flow in networks of all these classes is equal to W.
In [32], two examples of uniform complete network operation with small and large resources demonstrate the difference in network dynamics.

3.1.1. Complete Uniform Resource Networks. Small Resource

For complete uniform networks, simpler formulas can be obtained for the limit state and flow vectors, as well as for the threshold value T. This section briefly outlines the results obtained in [1].
The uniform network is defined by only two parameters: the number of vertices n and the throughput of all edges r. The characteristics of a complete uniform network are expressed by the same parameters.
For an arbitrary W T , the limit vectors are
Q * = F o u t * = F i n * T = W n , , W n .
The limit flow in an arbitrary edge e i j is
f i j * = W n 2 .
If W = 1 then
Q 1 * = 1 n , , 1 n .
The threshold value T is expressed by formula
T = r n 2 .
The limit vectors for W = T are
Q ˜ = F ˜ o u t = F ˜ i n T = ( r n , , r n ) .
The resource above the threshold value is not aligned. The limit state depends on the initial state. The network operation with large resources will be considered in Section 3.2.

3.1.2. Eulerian Networks: Small Resource

Complete uniform networks are a special case of Eulerian networks. In Eulerian networks, the equality r i i n = r i o u t holds for each vertex v i . The results obtained for such networks are a generalization of the results obtained for complete uniform networks.
If W = 1 , then
Q 1 * = r 1 o u t r s u m , , r n o u t r s u m .
In the complete uniform network r i o u t = r n , r s u m = r n 2 , whence we obtain its steady state vector Q 1 * = 1 n , , 1 n (formula (12)).
For an arbitrary W T the limit vectors are
Q * = F o u t * = F i n * T = W r 1 o u t r s u m , , r n o u t r s u m .
The threshold value T is expressed by formula
T = r s u m .
The limit vectors for W = T are
Q ˜ = F ˜ o u t = F ˜ i n T = ( r 1 o u t , , r n o u t ) .
For the complete uniform network, this formula transforms into Formula (13).

3.1.3. Non-Symmetric Networks: Small Resource

For non-symmetric networks, only the most general formulae can be obtained. Vector Q 1 * cannot be expressed only in terms of network parameters. It can be found as the eigenvector of matrices R and R * (Formulae (7) and (8)).
For an arbitrary W T the limit state vector is
Q * = W · Q 1 * .
For the threshold value T, a strict inequality holds:
T < r s u m .
In the limit state, at least one vertex has the resource value equal to its total out-throughput
q i ˜ = r i o u t ,
and at least one vertex has the resource value strictly less than its total out-throughput
q i ˜ < r i o u t .
Let there be l vertices satisfying the condition (18) in a network, 1 l < n . Introduce such numbering that these vertices have the first numbers. Then, the limit vectors for W = T are
Q ˜ = F ˜ o u t = F ˜ i n T = ( r 1 o u t , , r l o u t , q ˜ l + 1 , , q ˜ n ) .
Comparing Formula (19) with Formulae (13) and (16), we find that for complete uniform and Eulerian networks, the equality l = n holds. For non-symmetric networks, the strict inequality l < n is required.
As the threshold value is equal to the sum of the coordinates of vector Q ˜ , the nature of inequality (17) becomes clear.

3.2. Regular Networks. Large resource

3.2.1. Non-Symmetric Networks

In this section, for introducing a number of properties, we turn first to non-symmetric networks.
When the resource in the network is above the threshold, some vertices start accumulating surpluses. It is natural to assume that these are the receiver-vertices (see Definition 23).
Examples with different networks functioning are considered in [32] (Examples 3–5). Example 5 demonstrates that not all receivers can accumulate a resource surplus. Moreover, based only on the network topology and characteristics of the vertices r i i n , r i o u t , it is not always possible to determine which of the receivers will attract the resource.
Let us introduce the concept of an attractor vertex.
Definition 27.
A vertex capable of accumulating a surplus of resource is called an attractor vertex.
Attractors can be receiver-vertices and some neutral vertices. Results for neutral vertices will be presented in Section 3.2.2.
Receivers are active attractors. They can attract the resource from other vertices.
Neutral vertices can only partially keep the surplus if they already have it. Such attractors will be called passive.

3.2.2. Complete Uniform and Eulerian Networks: Large Resource

For the complete uniform network with parameters n and r, the threshold value is T = r n 2 , and the limit vector Q ˜ is defined by Formula (13):
Q ˜ = ( r n , , r n ) .
Let W > T . Consider an arbitrary initial state. There exists at least one vertex v i in a network for which holds
q i ( 0 ) > r n .
This vertex has a surplus equal q i ( 0 ) r n > 0 . Let us denote this surplus as s i ( 0 ) . At least at time step t = 0 this vertex will operate according to rule 1.
Arrange the vertices in descending order of their resource.
Let there be l vertices in a network satisfying condition (20). Then, the vector of initial distribution has the form
Q ( 0 ) = ( r n + s 1 ( 0 ) , , r n + s l ( 0 ) , r n d l + 1 ( 0 ) , , r n d n ( 0 ) ) ,
where d i ( 0 ) 0 , i = l + 1 , n ¯ are deficits of resources to value r n .
The total surplus in a network at t = 0 is denoted as s s u m ( 0 ) and the total deficit as d s u m ( 0 ) :
s s u m ( 0 ) = i = 1 l s i ( 0 ) ; d s u m ( 0 ) = i = l + 1 n d i ( 0 ) .
If W > T then s s u m ( 0 ) > d s u m ( 0 ) and t s s u m ( t ) > d s u m ( t ) .
Experiments show that in a complete uniform network with the initial distribution given by (21) the limit state exists. It has a form
Q * = ( r n + s 1 * , , r n + s m * , r n , , r n ) ,
where m l . The Example 6 in [32] shows both these cases: ( 1 ) m = l , and ( 2 ) m < l .
Proposition 2.
In the complete uniform network with parameters r , n , for given Q ( 0 ) = ( r n + s 1 ( 0 ) , , r n + s l ( 0 ) , r n d l + 1 ( 0 ) , , r n d n ( 0 ) ) if
s l ( 0 ) > d s u m ( 0 ) l
then m = l and
Q * = ( r n + s 1 * , , r n + s l * , r n , , r n )
where
s i * = s i ( 0 ) d s u m ( 0 ) l , i = 1 , l ¯ ,
m < l otherwise.
This statement is demonstrated in Example 6 [32].
For an arbitrary Eulerian network, all the results obtained for complete uniform networks are transferred almost unchanged as any vertex of the Eulerian network is also a passive attractor. However, finding the limit state with a large resource is much more complicated (Section 4.3).

4. Results: Standard Model

In this section, we present the main results for regular resource networks.

4.1. Non-Symmetric Networks

In Definition 27, we introduced a notion of an attractor vertex. In general, this is a vertex that can have resource surpluses in the limit state at W > T .
Except for some special cases, in asymmetric networks, the attractors are always receiver-vertices. Experiments show that not every receiver-vertex can be an attractor. Moreover, the Example 4 in [32] demonstrates that in a number of cases, it is impossible to recognize an attractor only by the topology of the graph and the total capacities of the vertices. An attractiveness criterion is formulated and proved in [4]. Here, we give a much shorter proof. This criterion is universal. It is suitable for all classes of resource networks, not just regular ones.
Theorem 3.
The vertex v k of resource network is an attractor if it satisfies the equality
k = arg min i = 1 , n ¯ r i o u t q i 1 * .
Proof. 
The threshold value T is defined by Formula (10) in Theorem 2.
T = min i = 1 , n ¯ r i o u t q i 1 * .
The minimum of this ratio is achieved on the attractor vertices. Therefore, vertex v k is an attractor if and only if Formula (22) is true.
 □
The following theorems determine the limit states and flows in a regular asymmetric network for any total resource and its initial distribution. They summarize the above results.
Theorem 4.
The limit state Q * in an asymmetric regular network with l attractor vertices exists for any total resource W.
1 
If W < T then vector Q * = ( q 1 * , , q n * ) is unique and defined by the formula
Q * = W · Q 1 * ,
where Q 1 * is the limit stochastic vector of corresponding homogeneous regular Markov chain with stochastic matrix
R = diag 1 r 1 o u t , , 1 r n o u t · R .
All components of Q * are positive.
2 
If W = T then vector Q ˜ is unique and has the form
Q ˜ = T · Q 1 * = ( r 1 o u t , , r l o u t , q ˜ l + 1 , , q ˜ n ) ,
where vertices with first l , indexes ( l 1 ) are attractor vertices; the rest ( n l ) vertices satisfy the strict inequality
q ˜ i < r i o u t , i = l + 1 , n ¯ .
3 
If W > T , then vector Q * has the form
Q ˜ = T · Q 1 * = ( r 1 o u t + s 1 * , , r l o u t + s l * , q ˜ l + 1 , , q ˜ n ) ,
where s i * > 0 , i = 1 , l ¯ , are resource surpluses distributed among attractors:
i = 1 l s i * = W T .
The values of s i * depend on the initial distribution.
Theorem 5.
The limit flow F * = ( f i j * ) n × n in an asymmetric regular network with l attractor vertices exists and is unique for any total resource W. Vectors F i n * and F o u t * are defined as follows.
1 
If W < T then
F i n * = F o u t * T = W · Q 1 * ,
All components of matrix F * are positive.
f s u m = W .
2 
If W T then
F ˜ i n = F ˜ o u t * T = T · Q 1 * = Q ˜ = ( r 1 o u t , , r l o u t , q ˜ l + 1 , , q ˜ n ) ,
where vertices with first l , indexes ( l 1 ) are attractor vertices; the rest ( n l ) vertices satisfy the strict inequality
q ˜ i < r i o u t , i = l + 1 , n ¯ .
f s u m = T .
Remark 4.
For any arbitrarily large resource W > T , the total flow is limited by the value T.
As follows from the theorems, the resource is accumulated only by the attractor vertices. The rest of the vertices at W > T have the same small amount of resources, no matter how large W is.
To investigate a more even distribution of the resource, we created a model with constraints on attractors. It will be described in Section 5.

4.2. Complete Uniform Networks

In Eulerian networks in general, and in complete uniform networks in particular, each vertex is an attractor. This feature determines their behavior with a large resource. All vertices are passive attractors. They can hold a resource at certain initial states, but they cannot accumulate it.
We remind that for a complete uniform network, the threshold value is T = r n 2 .
First, describe the results for complete uniform networks. Uniform complete networks were introduced and investigated in [1]. However, in that work, the apparatus of converging series was used, which was reflected not only in the proofs, but also in the formulation of the statements. In the present article, the results obtained are structured and simplified. All theorem proofs are new.
Theorem 6.
The limit state Q * in a complete uniform network exists for any total resource W. For W T , it is unique.
1 
If W < T then
Q * = W n , , W n ,
2 
If W = T = r n 2 then
Q * = r n , , r n ,
3 
If W > T , then vector Q * depends on the initial state
Q ( 0 ) = ( r n + s 1 ( 0 ) , , r n + s l ( 0 ) , r n d l + 1 ( 0 ) , , r n d n ( 0 ) )
and has the form
Q * = ( r n + s 1 * , , r n + s m * , r n , , r n ) , m l ,
where s i * > 0 , i = 1 , m ¯ , are resource surpluses:
i = 1 m s i * = W T .
The values of s i * depend on the initial distribution.
  • If
    s l ( 0 ) d s u m ( 0 ) l
    then m = l ant the limit state has the form (Proposition 2):
    Q * = r n + s 1 ( 0 ) d s u m ( 0 ) l , , r n + s l ( 0 ) d s u m ( 0 ) l , r n , , r n ,
  • If
    s l ( 0 ) < d s u m ( 0 ) l
    then m < l is the highest index for which the inequality holds
    s m ( 0 ) 1 m d s u m ( 0 ) i = m l i · s i ( 0 )
    and the limit state vector is
    Q * = r n + s 1 ( 0 ) w m ( 0 ) , , r n + s m ( 0 ) w m ( 0 ) , r n , , r n
    where
    w m ( 0 ) = 1 m d s u m ( 0 ) i = m l i · s i ( 0 ) .
Proof. 
The validity of items 1 and 2 follows directly from the results obtained for regular homogeneous Markov chains [33].
Consider an arbitrary initial state of the network for W > T where the vertices are ordered in descending order of the resource (Formula (23)). As the network is complete and uniform, all vertices have the same input flows. The output flow of the first l vertices is equal to r n . The remaining vertices give all their resources equally to all other vertices of the network. Then, all vertices v 1 , , v l during the network operation must give the resource equally. The resource at each vertex must decrease by d s u m ( 0 ) / l .
  • If s l ( 0 ) d s u m ( 0 ) l then the limit state is described by the Formula (25).
  • If s l ( 0 ) < d s u m ( 0 ) l then perform a number of steps.
    • Reduce the surplus in each of the first l vertices by the value c l ( 0 ) .
    • Distribute the resource l · c l ( 0 ) equally between the vertices v l + 1 , , v n .
    • Take the resulting vector
      Q ( 0 ) = ( r n + s 1 ( 0 ) s l ( 0 ) , , r n + s l 1 ( 0 ) s l ( 0 ) , r n , r n d l + 1 ( 0 ) + l · c l ( 0 ) n l , , r n d n ( 0 ) + l · c l ( 0 ) n l )
      as a new initial state Q ( 0 ) = ( r n + s 1 ( 0 ) , , r n + s l 1 ( 0 ) , r n , r n d l + 1 ( 0 ) , , r n d n ( 0 ) ) .
    • Calculate the new value of the total deficit: d s u m ( 0 ) = d s u m ( 0 ) l · c l ( 0 ) .
    • Evaluate the new value s l 1 ( 0 ) .
      If s l 1 ( 0 ) d s u m ( 0 ) l · c l ( 0 ) l 1 then m = l 1 and the limit state is described by the Formula (26).
      If s l 1 ( 0 ) < d s u m ( 0 ) l · c l ( 0 ) l 1 then all steps 1 ÷ 5 must be repeated.
The limit state will be found in at most l 1 iterations and is expressed by the formula (25) or (26) depending on the condition (24).
 □
The limit flow is defined by the following theorem.
Theorem 7.
The limit flow F * = ( f i j * ) n × n in a complete uniform network exists and unique for any total resource W.
1 
If W < T then
F i n * = F o u t * T = W n , , W n ,
f s u m = W .
2 
If W T = r n 2 then
F ˜ i n = F ˜ o u t T = Q ˜ = r n , , r n ,
f s u m = T = r n 2 .

4.3. Eulerian Networks

The threshold value for Eulerian networks is T = r s u m .
For W > T , let the vector of initial distribution be Q ( 0 ) = ( r 1 o u t + s 1 ( 0 ) , , r l o u t + s l ( 0 ) , r l + 1 o u t d l + 1 ( 0 ) , , r n o u t d n ( 0 ) ) where
s i ( 0 ) > 0 , i = 1 , l ¯ , d j ( 0 ) 0 , j = l + 1 , n ¯ .
The following theorem was proved in [6].
Theorem 8.
The limit state Q * in an Eulerian network exists for any total resource W. For W T , it is unique.
1 
If W < T then
Q * = W r 1 o u t r s u m , , r n o u t r s u m ,
2 
If W = T = r s u m then
Q * = r 1 o u t , , r n o u t .
3 
If W > T , then vector Q * depends on the initial state Q ( 0 ) = ( r 1 o u t + s 1 ( 0 ) , , r l o u t + s l ( 0 ) , r l + 1 o u t d l + 1 ( 0 ) , , r n o u t d n ( 0 ) ) and has the form
Q * = ( r 1 o u t + s 1 * , , r m o u t + s m * , r m + 1 o u t , , r n o u t ) , m l ,
where s i * 0 , i = 1 , m ¯ are resource surpluses:
i = 1 m s i * = W T .
The values of s i * depend on the initial distribution.
Remark 5.
For W > T , the relationship between the initial and limit states in Eulerian networks is much more complicated than this relationship in complete uniform networks. It is not enough to arrange the vertices in descending order of surpluses to find out which of them will not be able to hold the resource. In formula (27), some of the first l vertices may have zero surpluses.
This remark is illustrated by Example 7 in [32].

4.3.1. Initial State Analysis

First, consider symmetric networks. The behavior of quasi-symmetric networks is more complicated. If a network is symmetric, every vertex v 1 , , v l has paired in- and out- edges with the same weights, so the flows between these vertices are also symmetric. The flow f i j ( t ) = r i j sent by vertex v i along the output edge e i j into vertex v j , i , j = 1 , l ¯ , returns along the coupled input edge e j i , ( r i j = r j i ) . Therefore, the flow within the subnetwork of the first l vertices is constant. In quasi-symmetric network this symmetry is violated.
Let W = T = r s u m and the initial state has the form
Q ( 0 ) = ( r 1 o u t + s 1 ( 0 ) , , r l o u t + s l ( 0 ) , r l + 1 o u t d l + 1 ( 0 ) , , r n o u t d n ( 0 ) ) .
The total deficit is denoted as d s u m ( 0 ) , the total surplus as s s u m ( 0 ) . For W = T , d s u m ( 0 ) = s s u m ( 0 ) , and t d s u m ( t ) = s s u m ( t ) .
The vectors of deficit and surplus at time t are
D ( t ) = ( 0 , , 0 , d l + 1 ( t ) , , d n ( t ) ) , S ( t ) = ( s 1 ( 0 ) , , s l ( 0 ) , 0 , , 0 ) .
Then
Q ( t ) = ( r 1 o u t , , r n o u t ) + S ( t ) D ( t ) .
Formulate the problem as follows.
Let the vector of initial deficits D ( 0 ) is known. Find a vector of initial surpluses
S ( 0 ) = S ˜ ,
at which none of the first l vertices will switch to rule 2 during the network operation. This is a necessary and sufficient condition for m = l (item 3 of Theorem 8, Formula (27)).
When this vector is found, for any initial state with W > r s u m , for each of the first l vertices it will be possible to determine its surplus in the limit state: s i * = max 0 , s i ( 0 ) s i ˜ . Generally, if s i ( 0 ) s i ˜ , i = 1 , l ¯ , finding the vector S ˜ is equal to finding the limit state vector, as
Q * = ( r 1 o u t , , r n o u t ) + S * ,
where S * = S ( 0 ) S ˜ , D * = 0 .
Comparing vectors F o u t ( t + 1 ) and F o u t ( t )
F o u t ( t + 1 ) = ( r 1 o u t , , r l o u t , q l + 1 ( t + 1 ) , , q n ( t + 1 ) ) ,
F o u t ( t ) = ( r 1 o u t , , r l o u t , q l + 1 ( t ) , , q n ( t ) ) ,
we get the formula
F o u t ( t + 1 ) = F o u t ( t ) P ,
where
P = I 1 R 1 O R 3 .
Here, I 1 is the identity matrix of size l × l ; O is the zero matrix of size l × ( n l ) , R 1 and R 3 are corresponding blocks of matrix R :
R = R 0 R 1 R 2 R 3 .
It follows directly from (29) that
F o u t ( t + k ) = F o u t ( t ) P k ; F o u t * = F o u t ( 0 ) P * ,
where P * = lim k P k . The formula for P * is obtained in [6].
P * = I 1 R 1 ( I 2 R 3 ) 1 O O ,
where I 2 is the identity matrix of size ( n l ) × ( n l ) .
Split vector R o u t = ( r 1 o u t , , r n o u t ) into two components: R [ 1 , l ] o u t of length l, and R [ l + 1 , n ] o u t of length n l .
It follows from (31) that
R [ 1 , l ] o u t · P S D = R [ l + 1 , n ] o u t , or
( r 1 o u t , , r l o u t ) · P S D = ( r l + 1 o u t , , r n o u t ) ,
where matrix P S D of size ( n l ) × l is the upper right block of matrix P * : P S D = R 1 ( I 2 R 3 ) 1 .
Proposition 3.
Let W = r s u m and Q ( 0 ) = R o u t + S ( 0 ) D ( 0 ) . Then, the first l coordinates of vector S ˜ (28) are found as follows:
s i ˜ = r i o u t j = 1 n l d l + j ( 0 ) r l + j o u t p i j S D .
Proof. 
  • If j = l + 1 , n ¯ q j ( 0 ) = 0 , the deficits in the corresponding vertices are r j o u t , d j ( 0 ) r j o u t = 1 , and the proof follows from Formula (32).
  • If j = l + 1 , n ¯ : q j ( 0 ) > 0 , then the j-th term in sum (33) will be reduced so that the right side of formula (32) has vector ( d l + 1 ( 0 ) , , d n ( 0 ) ) instead of vector ( r l + 1 o u t , , r n o u t ) .
 □
In [6], an algorithm for finding the limit state is proposed for the case m < l . It is based on the same principles as Theorem 6, formulated for complete uniform networks, but in the case of arbitrary symmetric networks, the formulas are more cumbersome.

4.3.2. Operation Analysis

Write out the formulas for changing the network states with a large total resource. Again, assume that the first l vertices at each time step operate according to rule 1.
Q ( t + 1 ) = Q ( t ) F o u t ( t ) + F i n T ( t + 1 ) .
By definition,
F i n T ( t + 1 ) = F o u t ( t ) R .
Then
Q ( t + 1 ) = Q ( t ) F o u t ( t ) + F o u t ( t ) R = Q ( t ) F o u t ( t ) ( I R ) .
It is easy to see that I R = L where L is the normalized Laplacian matrix.
Q ( t + 2 ) = Q ( t + 1 ) F o u t ( t + 1 ) + F o u t ( t + 1 ) R = = Q ( t ) F o u t ( t ) ( I R ) F o u t ( t ) P + F o u t ( t ) P R = = Q ( t ) F o u t ( t ) ( I + P ) ( I R ) .
Generally,
Q ( t + k ) = Q ( t ) F o u t ( t ) i = 0 k 1 P k ( I R ) .
The sequence of vectors Q ( t ) converges to Q * . The sum i = 0 k 1 P k does not converge as k , as P * is not equal to the zero-matrix (Formula (31)). However, F o u t ( t + k ) = P k F o u t ( t ) tends to F o u t * , which, in turn, is the unique eigenvector of matrix R . Therefore, F o u t ( t ) P k ( I R ) tends to the zero vector. Passing to the limit, obtain
Q * = Q ( t ) i = 0 F o u t ( t ) P k ( I R ) .
As t is an arbitrary time step, then
Q * = Q ( 0 ) i = 0 F o u t ( 0 ) P k ( I R ) .
Q ( 0 ) = R o u t + S ( 0 ) D ( 0 ) ,
where
R o u t = ( r 1 o u t , , r n o u t ) .
Then,
Q * = R o u t + S ( 0 ) D ( 0 ) i = 0 F o u t ( 0 ) P k ( I R ) .
On the other hand, Q * = R o u t . Then,
S ( 0 ) = D ( 0 ) + i = 0 F o u t ( 0 ) P k ( I R ) .
If S ( 0 ) = S ˜ for a given network, W = T = r s u m and given vector D ( 0 ) then
S ˜ = D ( 0 ) + i = 0 F o u t ( 0 ) P k ( I R ) .
The first l coordinates of this vector are defined by Formula (33), the remaining are equal to zero.
The flow behavior in Eulerian networks is much simpler to describe. The flow in an arbitrary Eulerian network (both symmetric and quasi-symmetric) with W > T depends only on its throughputs. Each edge is filled completely.
Theorem 9.
In an Eulerian network, the limit flow F * = ( f i j * ) n × n exists and is unique for any total resource W.
1 
If W < T , then
F i n * = F o u t * T = W r 1 o u t r s u m , , r n o u t r s u m , f s u m = W .
2 
If W T = r s u m , then
F ˜ i n = F ˜ o u t T = Q ˜ = r 1 o u t , , r n o u t , f s u m = T = r s u m .
Proof. 
The proof follows directly from the properties of homogeneous Markov chains, since unlike network states, flows are always described by homogeneous chains.  □

5. Resource Network with Limited Capacity of Attractor Vertices

In this section, we consider only non-symmetric regular networks, as in Eulerian networks, each vertex is a potential attractor, and there is no point in limiting such vertices. In non-symmetric networks, for any arbitrarily large resource, attractors accumulate all the surplus. Capacity limitations are introduced for a more even distribution of the resource.
A vertex is an attractor of an asymmetric network if it satisfies criterion (22). In this modification of the standard model, such vertices will be called primary attractors. For such vertices, we impose a limitation on the capacity of the following form
q k ( t ) r k o u t + p , p 0 .
This limitation applies only if q k ( 0 ) r k o u t + p ; otherwise, for a given initial state, the capacity of the vertex will remain unbounded.
The form of constraint (34) is due to the fact that for attractor v k , the equality q k ˜ = r k o u t holds. And p > 0 is some constant value limiting resource surplus s k * .
The following two propositions are proved in [29].
Proposition 4.
In a regular non-symmetric network with restrictions, there is a second threshold value of the total resource T 2 , T < T 2 < r s u m :
  • if W T 2 + l p , the network operates as a network without capacity limitations;
  • if W > T 2 + l p , the dynamics of the network changes,
where l is the number of attractors.
Proposition 5.
For the values of total resource W, there are four intervals with different network functioning.
  • For W ( 0 , T ] , from some moment t 0 the network operation is described by a homogeneous Markov chain. The limit state and flow vectors exist, are unique and coincide. The total limit flow is equal to W and increases with the growth of W.
  • For W T , T + l p , the limit state and flow exist. The limit flow is unique, the limit state is unique for l = 1 ; for l > 1 , the limit state is unique at all vertices, except attractors. The resource in attractors is not less than their output throughputs. The surpluses in attractors depend on the initial distribution of the resource, but the sum of these surpluses does not depend on the initial state and is equal to W T l p . The total limit flow is equal to T and does not change with increasing W.
  • For W ( T + l p , T 2 + l p ] , all attractors reach a capacity limitation. An excess resource begins to accumulate in the remaining vertices, but none of them is still able to exceed the value r i o u t , that is, switch to rule 1 operation. The total limit flow is equal to W l p and increases with the growth of W.
  • For W ( T 2 + l p , ) , the new vertices are saturated to the total output r i o u t and the flow is stabilized at the value T 2 . For any arbitrarily large value of W, the total limit flow is equal to T 2 .
If the limitations of attractors are equal to zero ( p = 0 ) , the second interval disappears and three remain: ( 0 , T ] , ( T , T 2 ] , ( T 2 , ) .
Definition 28.
The vertices v i that saturate to the total output throughput r i o u t when W T 2 + l p are called secondary attractors.
Example 8 in [32] illustrates the concept of a secondary attractor. It demonstrates the functioning of an asymmetric network with a total resource W belonging to the last interval W ( T 2 + l p , ) .
The first two intervals of the total resource in Proposition 5 specify the conditions under which restrictions on attractors do not apply, and the operation of the network is standard.
Consider the two remaining intervals. Without loss of generality, we assume that p = 0 .

5.1. Network Operation with Resource W ( T , T 2 )

In this interval, such a moment t exists when all attractors are saturated. Then they cannot receive the entire input flow and start to return its part back; and this part is redistributed between the non-attractive vertices. For all t > t the operation of a network can be described by formula
Q ( t ) = c 1 ( t ) j = l + 1 n f j 1 ( t ) , , c l ( t ) j = l + 1 n f j l ( t ) , i = 1 l c i ( t ) f l + 1 , i ( t ) , , i = 1 l c i ( t ) f n i ( t ) + Q ( t 1 ) · R , or
Q ( t ) + c 1 ( t ) j = l + 1 n f j 1 ( t ) , , c l ( t ) j = l + 1 n f j l ( t ) , i = 1 l c i ( t ) f l + 1 , i ( t ) , , i = 1 l c i ( t ) f n i ( t ) = Q ( t 1 ) · R ,
where c i ( t ) , i = 1 , l ¯ , are excess surpluses of the input flow in saturated attractors, which are redistributed between other vertices. They are expressed by formula
c i ( t ) = Δ q i ( t ) j = l + 1 n f j i ( t ) ; Δ q i ( t ) = q i ( t ) r i o u t .
Note that in formula (35), for all flows f k m ( t ) holds k > l . This means that these are flows from non-attractive vertices, and according to rule 2, they are equal to the fractions of q k ( t )
f k m ( t ) = q k ( t ) r k m r k o u t .
Then, expression (35) can be rewritten in terms of Q ( t ) .
In the matrix form, it is written as
Q ( t ) S ( t ) = Q ( t 1 ) R ,
where R is the stochastic matrix of a standard network (Formula (5)). To define matrix S ( t ) , we introduce additional notation.
As in the previous section, represent the matrix R in block form (30).
Block R 0 has dimension l × l and corresponds to attractor vertices.
Then matrix S ( t ) can be expressed in terms of blocks of matrix R and c i ( t ) values, i = 1 , l ¯
S ( t ) = I 1 O R 2 diag ( c 1 ( t ) , , c l ( t ) ) I 2 diag ( c 1 ( t ) , , c l ( t ) ) ( R 2 ) T ,
where I 1 and I 2 are the identity matrices of size l × l and ( n l ) × ( n l ) accordingly; O is the zero matrix of size l × ( n l ) .
Proposition 6.
S ( t ) is a stochastic matrix.
Proof. 
Consider the two lower blocks of matrix S ( t ) .
R 2 diag ( c 1 ( t ) , , c l ( t ) ) = r l + 1 , 1 r l + 1 o u t c 1 ( t ) r l + 1 , l r l + 1 o u t c l ( t ) r n , 1 r n o u t c 1 ( t ) r n , l r n o u t c l ( t ) ,
I 2 diag ( c 1 ( t ) , , c l ( t ) ) ( R 2 ) T = 1 i = 1 l c i ( t ) r l + 1 , 1 r l + 1 o u t 0 0 1 i = 1 l c i ( t ) r n , 1 r n o u t .
The diagonal elements of matrix I 2 diag ( c 1 ( t ) , , c l ( t ) ) ( R 2 ) T are positive. The values i = 1 l c i ( t ) r l + k , 1 r l + k o u t , k = 1 , n l ¯ in this matrix are the sums of the elements of the corresponding row of matrix (37). Then, the total sum of elements of each row is equal to one.  □
Proposition 7.
S ( t ) is an invertible matrix. The inverse matrix S 1 ( t ) is expressed by formula
S 1 ( t ) = I 1 0 D ( t ) R 2 diag ( c 1 ( t ) , , c l ( t ) ) D ( t ) ,
where
D ( t ) = I 2 diag c 1 ( t ) , , c l ( t ) ( R 2 ) T 1 .
Proof. 
It is easy to verify that for the matrix given by Formula (38), the equality holds
S ( t ) S 1 ( t ) = S 1 ( t ) S ( t ) = I .
 □
Due to this proposition, Equation (36) can be rewritten to find Q ( t ) .
Q ( t ) = Q ( t 1 ) R S 1 ( t ) .
Proposition 8.
S 1 ( t ) · 1 = 1 where 1 is a column vector of ones.
As matrix S 1 ( t ) has negative elements, it is pseudo-stochastic.
Remark 6.
For different networks, matrix R S 1 ( t ) can be stochastic or pseudo-stochastic. The work in [34] introduces reversible network transformations that convert a pseudo-stochastic matrix R S 1 ( t ) into a stochastic one. Without loss of generality, we will assume that the matrix is stochastic. Then, the equality (39) describing the operation of a network defines a heterogeneous Markov chain [35].
The network operation is described as follows:
Q ( t + k ) = Q ( t ) i = 0 k 1 R S 1 ( t + i ) .
Definition 29.
A heterogeneous Markov chain with stochastic matrices P ( i ) is called strongly ergodic if
lim t i = 1 t P ( i ) = 1 · π T ,
where 1 is a column vector of n units, π is a certain probability vector.
Proposition 9.
The heterogeneous Markov chain with stochastic matrices R S 1 ( t ) is strongly ergodic.
Proof. 
First, prove that lim t S 1 ( t ) exists.
R S 1 ( t ) = R 0 R 1 D ( t ) R 2 diag ( c 1 ( t ) , , c l ( t ) ) R 1 D ( t ) R 2 R 3 D ( t ) R 2 diag ( c 1 ( t ) , , c l ( t ) ) R 3 D ( t ) .
For W ( T , T 2 ] the first l components of vector Q ( t ) tend to values r i o u t by definition of a network with attractor limitations.
It means that two left blocks of R S 1 ( t ) have limits; and then the sequences c i ( t ) converge and two right blocks also have limits.
The sequence R S 1 ( t ) converges. Therefore, the sequence S 1 ( t ) converges too. Let lim t S 1 ( t ) = S * 1 .
Consider matrix R S * 1 . This is a regular stochastic matrix and then it defines a homogeneous Markov chain. Thus,
lim t ( R S * 1 ) t = 1 · π T ,
and therefore
lim t i = 1 t R S 1 ( t ) = 1 · π T .
 □
Theorem 10.
In a regular non-symmetric network with a limited capacity of attractors for W ( T , T 2 ] , the limit state exists, is unique, and is an eigenvector of matrix
R * = lim t i = 1 t R ( S ) 1 ( i ) .
The proof the proof follows directly from Proposition 9.

5.2. Network Operation with Resource W = T 2

All the statements in this section are proved in [34].
Theorem 11.
The second threshold value T 2 , for which at least one non-attractive vertex v i , i > l , has the limit resource q ^ i = r i o u t , is unique.
The limit state vector at W = T 2 is denoted by Q ^ .
Matrices S ( t ) depend not only on time but also on the total amount of resource W in the network.
The limit matrix at W = T 2 is denoted by S ^ .
Matrix S ^ 1 is expressed by formula
S ^ 1 = I 1 0 I 1 diag c ^ 1 , , c ^ l ( R 2 ) T 1 R 2 diag c ^ 1 , , c ^ l I 2 diag c ^ 1 , , c ^ l ( R 2 ) T 1 ,
where c ^ i are the limit flow surpluses
c ^ i = Δ q ^ i j = l + 1 n r j i r i o u t q ^ i , i = 1 , l ¯ ,
the numerator contains the i-th coordinate of vector
Δ Q ^ = Q ^ R ( r 1 o u t , , r l o u t , 0 , , 0 ) .
The limit state vector Q ^ is the left eigenvector of matrix R S ^ 1 with eigenvalue λ = 1 :
Q ^ = Q ^ R S ^ 1 .
Proposition 10.
The limit of powers R S ^ 1 t as t exists and is equal to the limit matrix of a homogeneous Markov chain with limit probability distribution 1 / T 2 · Q ^ :
lim t R S ^ 1 t = R S ^ 1 * = 1 T 2 · 1 · Q ^ ,
where 1 is a column vector of n units.
Corollary 4.
Each network with limitations can be uniquely associated with a regular homogeneous Markov chain with matrix R = R S ^ 1 defining a new network without constraints (a standard model) with the following parameters:
  • Q 1 * = 1 T 2 Q ^ ;
  • the threshold value T = T 2 ;
  • the limit state vector at W = T is Q ˜ = Q ^ ;
  • the limit of powers of the stochastic matrix is
    R * = R S ^ 1 * = 1 T 2 · 1 · Q ^ .
Proposition 11.
A non-attractive vertex v i of a regular asymmetric network is a secondary attractor of this network with limitations if and only if, for W = T 2 , it satisfies the condition
q ^ i = r i o u t .
Matrix R S ^ 1 is stochastic (see Remark 6). Any stochastic matrix defines a family of networks, which corresponds to a family of throughput matrices, the corresponding rows of which are proportional. Let R n e w be the matrix of the network whose threshold value T coincides with T 2 of the original network. Moreover, for all primary and secondary attractors, the equality q k ˜ = r k o u t will hold, i.e., both the primary and secondary attractors of the original network are the primary attractors of the induced network. Such a network is given by the formula
R n e w = diag r 1 o u t , , r n o u t R S ^ 1 .
Thus, knowing the limit vector of resource distribution at W = T 2 in a network without limitations given by matrix R, it is possible to construct a homogeneous Markov chain and the induced matrix R n e w such that at W = T 2 , their limit states coincide.
Now, we can formulate the criterion of secondary attractiveness.
Theorem 12
(Secondary Attractiveness Criterion). A non-attractive vertex v j of a regular asymmetric network without constraints with matrix R is a secondary attractor if and only if in induced network R n e w it satisfies
j = arg min i = 1 , n ¯ r i o u t q i 1 * n e w ,
where q i 1 * are coordinates of limit vector Q 1 * of induced network R n e w with W = 1 .
Theorem 13
(Threshold theorem). The second threshold value of the network with constraints is determined by the formula
T 2 = min i = 1 , n ¯ r i o u t q i 1 * n e w .
The Limit State Theorem summarizes the results of this section.
Theorem 14
(Limit State Theorem). In a regular non-symmetric network with constraints on attractors p, the limit state Q * exists for any value of the total resource W. There are two threshold values T and T 2 , ( 0 < T < T 2 < r s u m ) , such that:
  • For W ( 0 , T ] , the limit state is unique and is found by the formula Q * = W · Q 1 * ;
  • For W T , T + l p , the limit state is unique for l = 1 ; for l > 1 , the limit state is unique at all vertices, except for attractors:
    Q * = ( r 1 o u t + s 1 * , , r l o u t + s l * , q ˜ l + 1 , , q ˜ n )
    where q ˜ i are components of limit vector Q ˜ at W = T ;
  • For W ( T + l p , T 2 + l p ] , the limit state is unique. It consists of the sum of two vectors Q * = P + Q W * . Here P = ( p , , p , 0 , , 0 ) ; Q W * is the limit state of an induced network with matrix
    R n e w ( W ) = diag r 1 o u t , , r n o u t R S * 1 ( W ) .
    If W = T 2 + l p , then this equality transforms into formula (40) and the limit state is
    Q * = Q ^ + P = r 1 o u t + p , , r l o u t + p , r l + 1 o u t , , r m o u t , q ^ m + 1 , , q ^ n ,
    the vertices v l + 1 , , v m are the secondary attractors.
  • For W ( T 2 + l p , ) , the limit state is unique up to surpluses in the secondary attractors. It is found by the formula
    Q * = r 1 o u t + p , , r l o u t + p , r l + 1 o u t + s l + 1 * , , r m o u t + s m * , q ^ m + 1 , , q ^ n .
    Q ^ is the left eigenvector of matrix R S ^ 1 corresponding to the maximum eigenvalue λ = 1 ; s i * are surpluses of resource in excess of the T 2 + l p value, distributed among secondary attractors.

6. Resource Network with Greedy Vertices

Consider a resource network with loops and define its functioning as follows. At time step t vertex v i sends to the loop the resource value equal to
f i i ( t ) = r i i , if q i ( t ) > r i i , q i ( t ) , if q i ( t ) r i i .
If q i ( t ) > r i i the remaining resource Δ q i ( t ) = q i ( t ) r i i is distributed among other vertices according to the rules of the standard resource network.
Thus, the nodes of the network are “greedy”; they allocate the available resource first of all to themselves.
Definition 30.
We will say that the network stopped at time step t if t > t i , j = 1 , n ¯ ( i j ) , f i j ( t ) = 0 .
Remark 7.
Note that in the first two described models, the network did not stop at any resource value. The stop is a new state that has appeared in a network with greedy vertices.
Proposition 12.
The network stopped at time step t if and only if t > t i = 1 , n ¯ q i ( t ) r i i .
The proof of this proposition follows from the rules of the network operation.
Definition 31.
Given time step t, vertex v i is called unsaturated if q i ( t ) < r i i , saturated if q i ( t ) r i i , and oversaturated if q i ( t ) > r i i .
Definition 32.
The resource at the vertex in excess of the loop throughput is called free and denoted as
Δ q i ( t ) = q i ( t ) r i i .
Proposition 13.
A vertex saturated at time t will also remain saturated at time t + 1 .

6.1. Two Threshold Values

There is one threshold value T of total resource W in a standard resource network. This threshold divides the resource into small values, when all vertices give away their entire resource at each time step, and large values, when resource surpluses accumulate in one or several vertices.
In resource networks with greedy vertices, there are two threshold values T 0 and T 1 , which separate zones of different network behavior. If W T 0 the network stops—in a finite number of time steps, or asymptotically, depending on the initial state.
Definition 33.
The total resource value at which the network stops operating is called insufficient; otherwise, it is called sufficient.
The threshold value separating insufficient and sufficient resources is denoted by T 0 . The threshold value at which at least one vertex switches from rule 2 to rule 1 is denoted by T 1 .
Proposition 14.
The first threshold value of the resource T 0 of a regular network with greedy vertices is unique for any initial state and is found by formula
T 0 = i = 1 n r i i .
Theorem 15.
If the total resource W > T 0 , all the vertices of a regular network are saturated in a finite number of time steps.
Proof. 
Consider an arbitrary vertex v i with the resource value q i ( 0 ) < r i i . As W > T 0 and the network is regular, its input flow f i i n ( 0 ) > 0 . Its output flow is equal to zero. Then, at each time step the resource of the unsaturated vertex increases by a positive value bounded from below, as the total flow f s u m ( t ) is strictly positive and does not tend to zero. If W T 1 and all the vertices operate according rule 2 then
f s u m ( t ) = i = 1 n Δ q i ( t ) W T 0 > 0 .
If W > T 1 the flow is bounded from below at least by the sum of all out-throughputs of vertices operating according to rule 1.
Therefore, f i i n ( t ) is bounded from below at every step t by a strictly positive constant δ q i . The number of the time steps for its saturation is not greater than ( r i i q i ( 0 ) ) / δ q i .  □
The following theorem is important since it allows to reduce the study of networks with greedy vertices to the standard model, passing to a new initial state, when W > T 0 .
Theorem 16.
For W > T 0 , a regular resource network with greedy vertices from moment t operates equivalently to the corresponding standard resource network without loops, in which the resource at each vertex is reduced by the loop throughput r i i .
Theorem 17.
The threshold value of a network with greedy vertices T 1 coincides with the threshold value T of a corresponding standard model.
The proofs of these two theorems follow from the definition of the resource allocation rules in a network with greedy vertices.
These theorems show that only two cases are of interest for networks with greedy vertices.
The first case is W < T 0 . The resource is absorbed by the loops during the network operation. Such a network can be considered as an absorbing network with sink vertices corresponding to unsaturated greedy vertices. The main difference is that a greedy vertex can saturate and start giving up the resource, while this is impossible for a sink vertex.
The second case is a violation of the regularity of the network when removing loops. Below we consider both cases.

6.2. Insufficient Resource W < T 0

Proposition 15.
The network stopped at time step t if and only if there is no such cycle v k 1 , , v k m , v k 1 in the network that t > t q k 1 ( t ) r k 1 k 1 , , q k m ( t ) r k m k m and for every t, at least one inequality is strict.
Proof. 
1. Consider the cycle where all the vertices are saturated and, at every time step, at least one of them is oversaturated. The vertex that has become saturated remains saturated in the future. The part of the free resources of oversaturated vertices will be dispersed to other unsaturated vertices, but the other part will still stay inside the cycle. Then, the network will not stop.
2. If the network stopped, then all free resource was absorbed by the loops, which means that there is no saturated cycle in the network.  □
Note that the unsaturated vertex only accepts the resource, but does not give it away. This means that if we eliminate all of its outgoing edges, the network operating will not change. Thus, unsaturated vertices in the regular network correspond to sinks in the absorbing network.
Depending on the total resource and its initial allocation, some unsaturated vertices may become saturated over time. However, some of them will remain unsaturated, since W < T 0 .
Let t be the time step starting from which the set of unsaturated vertices has stabilized and let these vertices have indices 1 , , l . Then, matrix R can be represented as follows:
R = D O R 1 R 2 .
Here, the weights of all outgoing edges of unsaturated vertices are equal to zero. D is a diagonal matrix with weights of loops, R 1 and R 2 are the unchanged blocks of matrix R.
The corresponding stochastic matrix has a form
R = I O R 1 R 2 .
Its powers are
R k = I O R 1 + R 2 R 1 + + ( R 2 ) k 1 R 1 ( R 2 ) k .
The two results follow directly from Theorem 1.11.1 in [33]: (1) matrices ( R 2 ) k tend to zero matrix, and (2) the series I + R 2 + R 2 2 + converges to matrix ( I R 2 ) 1 . Therefore, the limit of powers exists and is expressed by the formula
R * = I O ( I R 2 ) 1 R 1 O .
Theorem 18.
Matrix R * remains unchanged for any changes in the diagonal elements of matrix R.
Proof. 
Consider the new matrix R d = R + d i a g ( d 1 , , d n ) where d i a g ( d 1 , , d n ) is the diagonal matrix with arbitrary values d i r i i .
The blocks of a new stochastic matrix will have a form
R d 1 = d i a g r 1 o u t r 1 o u t + d 1 , , r n o u t r n o u t + d n R 1 ,
R d 2 = d i a g r 1 o u t r 1 o u t + d 1 , , r n o u t r n o u t + d n R 2 + d i a g d 1 r 1 o u t , , d n r n o u t .
This imposes a constraint on d i : d i r i o u t . To fulfill this condition at the first l vertices, we assume that d i > r i i .
Substitute these values into the expression for the matrix R * d . Let
d i a g r 1 o u t r 1 o u t + d 1 , , r n o u t r n o u t + d n = D 1 , d i a g d 1 r 1 o u t , , d n r n o u t = D 2 .
R * = I O ( I D 1 ( R 2 + D 2 ) ) 1 D 1 R 1 O .
Therefore,
( I R d 2 ) 1 R d 1 = ( I D 1 ( R 2 + D 2 ) ) 1 D 1 R 1 .
All the diagonal elements of matrix D 1 are nonzero then it is invertible. Therefore,
( I D 1 ( R 2 + D 2 ) ) 1 D 1 R 1 = ( D 1 1 ( R 2 + D 2 ) ) 1 R 1 .
D 1 1 D 2 = d i a g r 1 o u t + d 1 r 1 o u t , , r n o u t + d n r n o u t d i a g d 1 r 1 o u t , , d n r n o u t = I .
Thus, we have that
( I R d 2 ) 1 R d 1 = ( I R 2 ) 1 R 1
and R d * = R * .  □
Theorem 19.
Let the set of unsaturated vertices not change from time step t and these vertices have indices from 1 to l. Then, the limit state of the network is found by the formula
Q * = Q ( t ) R * , t t .
Proof. 
If for t t all vertices v l + 1 , , v n operate according to rule 2, the proof is obvious, since the network is described by a homogeneous Markov chain.
Let some of vertices v l + 1 , , v n operate according to rule 1. Since the network is absorbing, and these vertices are in the transient component, they will lose surplus in a finite number of time steps t . During the time interval [ t , t ] , the network will be described by an inhomogeneous Markov chain with stochastic matrices R ( t ) corresponding to the matrices R ( t ) , differing from each other by the weights of some loops. The elements of stochastic matrices R ( t ) are
r i j ( t ) = r i j r i o u t , if q i ( t ) r i o u t , r i j q ( t ) , if q i ( t ) > r i o u t and i j 1 i j r i j q i ( t ) , if q i ( t ) > r i o u t and i = j .
The limit vector is described by the following expression:
Q * = Q ( t ) t = t t R ( t ) R * .
Prove that for arbitrary matrix R ( t ) , the equality holds R ( t ) R * = R * , where R * has the form (41).
As matrices R ( t ) differ only in diagonal elements, the two lower blocks of the matrix R ( t ) can be represented as R 1 ( t ) = R 1 d = D 1 R 1 , R 2 ( t ) = R 2 d = D 1 ( R 2 + D 2 ) , where D 1 and D 2 are defined by formula (42). Consider the product R ( t ) R *
R ( t ) R * = I O R 1 d + R 2 d ( I R 2 ) ) 1 R 1 O .
Transform the bottom left block
R 1 d + R 2 d ( I R 2 ) 1 R 1 = D 1 R 1 + D 1 ( R 2 + D 2 ) ( I R 2 ) 1 R 1 = = D 1 R 1 + ( D 1 R 2 + D 1 D 2 ) ( I R 2 ) 1 R 1 .
Note that
D 1 D 2 = I D 1 ,
thus
D 1 R 1 + ( D 1 R 2 + D 1 D 2 ) ( I R 2 ) 1 R 1 = D 1 R 1 + ( D 1 R 2 + I D 1 ) ( I R 2 ) 1 R 1 = = D 1 R 1 + ( D 1 ( R 2 I ) + I ) ( I R 2 ) 1 R 1 = = D 1 R 1 D 1 ( I R 2 ) ( I R 2 ) 1 R 1 + ( I R 2 ) 1 R 1 = = D 1 R 1 D 1 R 1 + ( I R 2 ) 1 R 1 = ( I R 2 ) 1 R 1 .
We obtain that R ( t ) R * = R * , and
Q * = Q ( t ) t = t t R ( t ) R * = Q ( t ) R * .
 □

6.3. Greedy Vertices and Cyclic Networks

Theorem 16 has an important corollary. In Section 2.4, a notion of a cyclic resource network was introduced (Definition 16). In a cyclic network, the greatest common divisor of the lengths of all cycles is greater than one. Note that even a single loop turns a cyclic network into a regular one. The reverse process, i.e., the elimination of all loops, can turn the regular network into a cyclic one.
Definition 34.
Let the GCD of all cycles of a network without loops be d > 1 . Such a network with greedy vertices is called d-cyclic.
Theorem 20.
If, after removing the loops in the standard model, the regular network turns into a d-cyclic one, then in a network with greedy vertices for T 0 < W T 1 there is a limit cycle with d limit vectors Q 1 * , , Q d * .
This theorem is illustrated by Example 9 in [32]. Its proof follows from the definition of a network with greedy vertices.
Consider the network operation with the resource value satisfying inequality T 0 < W T 1 , i.e., with sufficient small resource. The results listed below are obtained for cyclic networks of the standard model in [36].
Let R 0 is the throughput matrix of a d-cyclic network with greedy vertices where all diagonal elements are replaced with zeros.
Let R 0 be the stochastic matrix corresponding to R 0 . The sequence of its powers: R 0 , R 0 2 , . It consists of d convergent subsequences:
(1) R 0 , R 0 d + 1 , R 0 2 d + 1 ,
(2) R 0 2 , R 0 d + 2 , R 0 2 d + 2 ,
...
(d) R 0 d , R 0 2 d , R 0 3 d ,
Matrices of each subsequence have zero elements in the same places.
All limits of these subsequences are expressed in terms of one limit matrix
R 0 * = lim t ( R 0 d ) t .
Then, these limits are
R 0 * · R 0 , R 0 * · R 0 2 , , R 0 * · R 0 ( d 1 ) , R 0 * · R 0 d = R 0 * .
A saturated d-cyclic resource network has a limit cycle of length d:
Q 1 * = Q ( t ) · R 0 * · R 0 , Q 2 * = Q ( t ) · R 0 * · R 0 2 , , Q d 1 * = Q ( t ) · R 0 * · R 0 ( d 1 ) , Q d * = Q ( t ) · R 0 * .
Here, Q ( t ) is a vector of state at any time step t > t , when all the vertices have already saturated and operate according to rule 2.
Each vector cyclically passes to the next one:
Q i + 1 * = Q i * · R 0 , i = 1 , d 1 ¯ , Q 1 * = Q d * · R 0 .
Vectors Q 1 * , , Q d * are eigenvectors of matrix R 0 * corresponding to the eigenvalue λ = 1 of multiplicity d.
If these vectors coincide, then the network has an equilibrium state. The equilibrium vector is vector W Q 0 1 * , where Q 0 1 * is any row of Cesaro limit matrix A:
A = 1 d R 0 * E + R 0 + + R 0 ( d 1 ) .
Vector Q 0 1 * is the unique positive eigenvector of the matrix R . It can be calculated as
Q 0 1 * = Q 1 * + + Q d * d W
for any T 0 < W T 1 .
For a large resource W > T 1 , the cyclic nature of the network ceases to matter. For such a network, all the results obtained for regular networks in the standard model are true. The limit state and flow exist. The limit flow is unique. The limit state is unique up to the surplus of resources in the attractors. The attractiveness criterion remains unchanged.

7. Resource Networks with the Limited Capacity and Greedy Vertices

Consider combining two modifications of the standard model. The models are completely independent. Features of a network with limitations on attractor capacities appear at a large resource, features of a network with greedy vertices appear at an insufficient resource. However, both of these models allow vertices to accumulate resource at different intervals. Primary and secondary attractors can attract a resource due to the structure of their connections; greedy vertices can only use the capacity of their loops.
The combination of the two models will allow the vertices to have both features. The new model will have three thresholds. This process can be continued. By limiting the secondary attractors, we obtain attractors of rank 3, etc. (Figure 4).

8. Discussion

Resource network is a graph dynamic model with threshold switching of functioning rules. Transient processes and limit states depend on the topology of the graph and the weights of its edges, as well as on the total network resource, and, in some cases, its initial distribution. Each vertex operates according to one of two rules of functioning, depending on the available resource. The local threshold value of vertex v i is equal to its total out-throughput r i o u t . Despite many local thresholds, it has been proven that there is only one global threshold T in the network. If the total resource has exceeded this threshold, the network ceases to be described by a homogeneous Markov chain. Some vertices begin to accumulate surplus resources. They are called attractor vertices. If the graph weights are given by rational random variables, there is a single attractor in the network with a probability equal to one. However, for any stochastic matrix, it is possible to create a network with an arbitrary number of attractors. If every vertex in the graph is an attractor, the network generated by this graph belongs to the class of quasi-symmetric networks. A special case of quasi-symmetric networks is a class of complete homogeneous networks, a convenient tool for illustrating the various properties of resource networks.
A criterion of vertex attractiveness is formulated and proved. Attractors can be active and passive. Active attractors are receiver vertices in an asymmetric network. Passive attractors are neutral vertices in symmetric and quasi-symmetric networks. Active attractors attract resources from other vertices. Passive attractors are only able to keep it. Thus, in a passive attractor, the property of “attraction” is manifested only in potency—it depends on the initial resource allocation. An active attractor accumulates surpluses regardless of the initial state.
Two different modifications of the standard resource network model are proposed. The first describes a model with constraints on attractor vertices. This model allows redistributing surplus resources more evenly. Other vertices appear in the network, accumulating surpluses. They are called secondary attractors. Vertices that are neither primary nor secondary attractors also slightly increase their resources in the limit state. A non-homogeneous Markov chain describing the operation of a network with limitations on attractors is constructed. Its strong ergodicity is proved. Based on the obtained non-homogeneous Markov chain, a homogeneous chain and a matrix of weights R n e w are constructed, describing the functioning of a new resource network, in which the primary attractors are the primary and secondary attractors of the original network. The criterion of secondary attractiveness is formulated and proved. It is proved that in a network with constraints, there is a second threshold value, and a formula for its value is found. The behavior of networks is investigated in each range of resource values bounded by the thresholds.
By limiting the secondary attractors, the attractors of the rank three can be found. Continuing this operation, you can rank all the vertices of the network by the rank of attraction. In this case, the attractiveness rank can serve as a new measure of the vertex centrality in a graph.
In the second modification of the model, the network with greedy vertices, the vertices first take the resource for themselves and only then begin to give the rest to other vertices. The resource reserve of a vertex is equal to the throughput of its loop. A new state appears in this network, a network stop. In the two previous models, this state was impossible. Two cases of interest are considered: the case of insufficient resource and the loss of regularity with a large resource.
Of particular interest is the fact that these networks also have a second threshold value. However, in networks with limitations, the additional threshold value is greater than the first, and in networks with greedy vertices, it is less than first.
For networks with greedy vertices, only the first results are obtained. Complete homogeneous networks are investigated [8]. The present paper considers the general case–regular networks with an arbitrary topology. New results are obtained for networks with insufficient resource. A formula for the limit state is obtained, theorems are proved on the independence of the resource allocation from the loops’ throughputs. In terms of matrices, this means that the limit of the powers of stochastic matrices does not depend on the diagonal elements of the original matrix.
Further research will include a description of the remained classes of networks. It is planned to develop resource networks on graphs with constraints imposed on some selected arcs. A separate large area is the development of applications using resource networks in various subject areas, in particular, in telecommunication technologies.
The following abbreviations are used in this manuscript:

Funding

This research was funded by the Russian Foundation for Basic Research (projects Nos. 20-07-00190-a, 19-07-00525-a, 18-29-22042-mk).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The author thanks Oleg Kuznetsov for inventing the resource network and many inspiring discussions, and Nadezhda Chaplinskaya for her collaboration in the study of networks with greedy vertices. I am very grateful to the reviewers for their constructive and inspiring comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kuznetsov, O.P. Uniform Resource Networks. I. Complete Graphs. Autom. Remote Control 2009, 70, 1767–1775. [Google Scholar] [CrossRef]
  2. Zhilyakova, L.Y. Asymmetrical Resource Networks. I. Stabilization Processes for Low Resources. Autom. Remote Control 2011, 72, 798–807. [Google Scholar] [CrossRef]
  3. Zhilyakova, L.Y. Asymmetric resource networks. II. Flows for large resources and their stabilization. Autom. Remote Control 2012, 73, 1016–1028. [Google Scholar] [CrossRef]
  4. Zhilyakova, L.Y. Asymmetric resource networks. III. A study of limit states. Autom. Remote Control 2012, 73, 1165–1172. [Google Scholar] [CrossRef]
  5. Zhilyakova, L. Resource Allocation among Attractor Vertices in Asymmetric Regular Resource Networks. Autom. Remote Control 2019, 80, 1519–1540. [Google Scholar] [CrossRef]
  6. Zhilyakova, L.Y. A study of Euler resource networks. Autom. Remote Control 2014, 75, 2248–2261. [Google Scholar] [CrossRef]
  7. Zhilyakova, L.Y. Resource Network with Limited Capacity of Attractor Vertices. Autom. Remote Control 2019, 80, 543–555. [Google Scholar] [CrossRef]
  8. Zhilyakova, L.; Chaplinskaya, N. Research of complete homogeneous “greedy-vertices” resource networks. UBS 2021, 89. (In Russian) [Google Scholar] [CrossRef]
  9. Ford, L.R., Jr.; Fulkerson, D.R. Flows in Networks; Princeton Univ. Press: Princeton, NJ, USA, 1962. [Google Scholar]
  10. Ahuja, R.K.; Magnati, T.L.; Orlin, J.B. Network Flows: Theory, Algorithms and Applications; Prentice Hall: Hoboken, NJ, USA, 1993. [Google Scholar]
  11. Blanchard, P.; Volchenkov, D. Random Walks and Diffusions on Graphs and Data-Bases: An Introduction; Springer Series in Synergetics; Springer: Berlin/Heisenberg, Germany, 2011. [Google Scholar]
  12. Volchenkov, D. Infinite Ergodic Walks in Finite Connected Undirected Graphs. Entropy 2021, 23, 205. [Google Scholar] [CrossRef]
  13. Oliveira, R.I.; Peres, Y. Random walks on graphs: New bounds on hitting, meeting, coalescing and returning. In Proceedings of the Meeting on Analytic Algorithmics and Combinatorics (ANALCO), San Diego, CA, USA, 6–7 January 2019. [Google Scholar] [CrossRef] [Green Version]
  14. Erusalimskii, Y.M. 2–3 Paths in a Lattice Graph: Random Walks. Math Notes 2018, 104, 395–403. [Google Scholar] [CrossRef]
  15. Jin, C. Simulating Random Walks on Graphs in the Streaming Model. arXiv 2018, arXiv:1811.08205. [Google Scholar]
  16. Björner, A.; Lovász, L.; Shor, P. Chip-firing games on graphs. Europ. J. Comb. 1991, 12, 283–291. [Google Scholar] [CrossRef] [Green Version]
  17. Björner, A.; Lovász, L. Chip-firing games on directed graphs. J. Algebr. Comb. 1992, 1, 305–328. [Google Scholar] [CrossRef]
  18. Biggs, N.L. Chip-Firing and the Critical Group of a Graph. J. Algebr. Comb. 1999, 9, 25–45. [Google Scholar] [CrossRef]
  19. Liscio, P. Lattices in Chip-Firing. arXiv 2020, arXiv:2010.15650. [Google Scholar]
  20. Glass, D.; Kaplan, N. Chip-Firing Games and Critical Groups. In A Project-Based Guide to Undergraduate Research in Mathematics. Foundations for Undergraduate Research in Mathematics; Harris, P., Insko, E., Wootton, A., Eds.; Birkhäuser: Cham, Switzerland, 2020; pp. 32–58. [Google Scholar]
  21. Dochtermann, A.; Meyers, E.; Samavedan, R.; Yi, A. Cycle and circuit chip-firing on graphs. arXiv 2020, arXiv:2006.13397. [Google Scholar]
  22. Bak, P.; Tang, C.; Wiesenfeld, K. Self-organized criticality. Phys. Rev. A 1988, 38, 364–374. [Google Scholar] [CrossRef]
  23. Dhar, D. The abelian sandpile and related models. Phys. A Stat. Mech. Its Appl. 1999, 263, 4–25. [Google Scholar] [CrossRef] [Green Version]
  24. Pegden, W.; Smart, C.K. Stability of Patterns in the Abelian Sandpile. Ann. Henri Poincaré 2020, 21, 1383–1399. [Google Scholar] [CrossRef] [Green Version]
  25. Kim, S.; Wang, Y. A Stochastic Variant of the Abelian Sandpile Model. J. Stat. Phys. 2020, 178, 711–724. [Google Scholar] [CrossRef] [Green Version]
  26. Dhar, D. Self-organized critical state of sandpile automaton models. Phys. Rev. Lett. 1990, 64, 1613–1616. [Google Scholar] [CrossRef]
  27. Járai, A.A. The Sandpile Cellular Automaton. In Probabilistic Cellular Automata. Emergence, Complexity and Computation; Louis, P.Y., Nardi, F., Eds.; Springer: Cham, Switzerland, 2018; pp. 79–88. [Google Scholar]
  28. Lovász, L.; Winkler, P. Mixing of Random Walks and Other Diffusions on a Graph. In Surveys Combinat; Rowlinson, P., Ed.; London Math. Soc. Lecture Notes Ser.; Cambridge Univ. Press: Cambridge, UK, 1995; Volume 218, pp. 119–154. [Google Scholar]
  29. Duffy, C.; Lidbetter, T.F.; Messinger, M.E.; Nowakowski, R.J. A Variation on Chip-Firing: The diffusion game. Discret. Math. Theor. Comput. Sci. 2018, 20. [Google Scholar] [CrossRef]
  30. Skorokhodov, V.A.; Chebotareva, A.S. The maximum flow problem in a network with special conditions of flow distribution. J. Appl. Ind. Math. 2015, 9, 435–446. [Google Scholar] [CrossRef]
  31. Zhilyakova, L. Dynamic Graph Models and Their Properties. Autom. Remote Control 2015, 76, 1417–1435. [Google Scholar] [CrossRef]
  32. Supplementary Materials for Article ‘Single-Threshold Model Resource Network and Its Double-Threshold Modifications’. Available online: https://www.researchgate.net/publication/352184919_Supplementary_Materials_for_article_%27Single-Threshold_Model_Resource_Network_and_its_Double-Threshold_Modifications%27 (accessed on 8 June 2021).
  33. Kemeny, J.G.; Snell, J.L. Finite Markov Chains; Van Nostrand Reinhold: New York, NY, USA, 1960. [Google Scholar]
  34. Zhilyakova, L. Resource networks with the capacity limitations on attractor-vertices. Formal characteristics. UBS 2016, 59, 72–119. (In Russian) [Google Scholar]
  35. Hajnal, J. Weak ergodicity in non-homogeneous Markov chains. Proc. Cambridge Philos. Soc. 1958, 54, 233–246. [Google Scholar] [CrossRef]
  36. Zhilyakova, L.Y. Ergodic cyclic resource networks. I. Oscillations and equilibrium at low resource. UBS 2013, 43, 34–54. (In Russian) [Google Scholar]
Figure 1. Classification of networks by topology.
Figure 1. Classification of networks by topology.
Mathematics 09 01444 g001
Figure 2. Classification of networks by total throughputs of vertices.
Figure 2. Classification of networks by total throughputs of vertices.
Mathematics 09 01444 g002
Figure 3. The general classification of networks. The focus of the study is the top row of the table. It lists the classes of networks under consideration.
Figure 3. The general classification of networks. The focus of the study is the top row of the table. It lists the classes of networks under consideration.
Mathematics 09 01444 g003
Figure 4. Threshold scheme in a resource network with greedy vertices: T 0 separates insufficient and sufficient resource values, T 1 divides the sufficient resource into small and large values, T 2 determines the interval at which the limitations on the attractors begin to apply. Attractors of the next ranks are schematically shown.
Figure 4. Threshold scheme in a resource network with greedy vertices: T 0 separates insufficient and sufficient resource values, T 1 divides the sufficient resource into small and large values, T 2 determines the interval at which the limitations on the attractors begin to apply. Attractors of the next ranks are schematically shown.
Mathematics 09 01444 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhilyakova, L. Single-Threshold Model Resource Network and Its Double-Threshold Modifications. Mathematics 2021, 9, 1444. https://doi.org/10.3390/math9121444

AMA Style

Zhilyakova L. Single-Threshold Model Resource Network and Its Double-Threshold Modifications. Mathematics. 2021; 9(12):1444. https://doi.org/10.3390/math9121444

Chicago/Turabian Style

Zhilyakova, Liudmila. 2021. "Single-Threshold Model Resource Network and Its Double-Threshold Modifications" Mathematics 9, no. 12: 1444. https://doi.org/10.3390/math9121444

APA Style

Zhilyakova, L. (2021). Single-Threshold Model Resource Network and Its Double-Threshold Modifications. Mathematics, 9(12), 1444. https://doi.org/10.3390/math9121444

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop