ABSTRACT

The information security model is composed of confidentiality, integrity, and availability. Availability is

the area of information security that requires services and network components to be continuously

available for the user community. If a service or component is unavailable, confidentiality and integrity

are meaningless. Network availability is the underlying component that must be present in order for

services to be accessible for end users. Developers have used redundancy to assist in ensuring that an

application or network is available; however, this is an expensive solution if several network components

and services are involved. Computer networks, the electrical power grid, the protein network of a cell,

and many other scale-free networks have inherent problems. In order to understand the problems that

reside within scale-free networks, an understanding of the concept of scale-free network construction

must be observed. Discovered by the research performed by Baraba

´

si and his team (2003), scale-free

networks are first identified by the characteristic of power laws. By examining a power law histogram

(Exhibit 129.1), the components of the power law follow a downward decline, indicating the presence of

many small nodes and a few large nodes.