Need Help With This Assignment?

Let Our Team of Professional Writers Write a PLAGIARISM-FREE Paper for You!

Overview of Nodes Assets and Links in the Lower Colorado Dams Network

Overview of Nodes Assets and Links in the Lower Colorado Dams Network

The Amtrak routes in the USA comprise various nodes. In this network, the nodes are railway stations/junctions, while the railroad tracks are links. Assets are the nodes that need protection for a functional network. In this case, the railway stations and connecting railways are assets. The entire network has at least 101 links, with ten in Chicago, seven in Indianapolis and Dallas/Ft Worth, and six in Atlanta, Ann Arbor, Cleveland, Nashville, Oklahoma City, and St. Louis.

Since Chicago has more links than other locations, it is highlighted as a critical node in the Amtrak railway network (Lewis, 2006).

Threats

One of the main threats that the railway network could encounter is a terror attack. Bombings have the potential to jeopardize the railway network’s links, which are critical for a functional transport system. Since the occurrence of the 9/11 attack, security personnel have become more alert to explosives that go undetected, especially at airports. Thus, the current railway networks must be designed to withstand such threats that could cause injuries, loss of lives, and damage to infrastructure (Wilson, Jackson, & Eisman, 2007). In addition, such attacks could also cause damage to vehicles and goods. Most importantly, it could interrupt the connectivity between the different forms of transport that enable the movement of goods and people to various locations.

The railway network’ vulnerability increases due to the extensive infrastructure and number of travelers that use trains for movement. On any weekday, travelers make at least 12 million unconnected trips by rail (Wilson, Jackson, & Eisman, 2007). This number excludes the trips made on the Amtrak network. A single attack has the potential to disrupt an entire network. The rich nature of the rail environment provides an attractive target for attackers who seek to exert extensive damage (U.S. Senate, 2011).

The rail network is also vulnerable because they are difficult to secure. The structure of railroads/links utilizes different physical features to allow for underground and above-ground passages. Thus, the process of fitting innovative technology for security purposes is not only costly, but also tasking. In most cases, the railway network faces trade-offs between security apparatus installation and functionalism. Features such as easy access, efficiency, ease of use, and privacy tend to receive priority (Wilson, Jackson, & Eisman, 2007).

Finally, railway networks face the threat of destruction because of natural disasters. Calamities such as floods, forest fires, typhoons, rockslides, thunderstorms, cyclones, tornadoes, avalanches, and earthquakes could endanger access by users and vehicles. These calamities can cut off parts of the network and freeze connectivity to various parts of the nation. The wide geographical network that the Amtrak rail network serves is at the potential for disruption. The connectivity of the network depends on the entire network’s functionality. If one part of the network is affected negatively by natural calamities, the safety of passengers is endangered (Rossetti, n.d). In addition, economic efficiency is affected negatively due to such weather-related disruptions. The railroads experience wear and tear at a faster rate, while the safety decreases due to poor visibility. Therefore, the critical infrastructure is partially strained while transport operations are shut down in other parts.

References

Lewis, T. G. (2006). Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. John Wiley & Sons.

Rossetti, M. A. (n.d). Potential Impacts of Climate Change on Railroads. Retrieved from https://www.transportation.gov/sites/dot.gov/files/docs/rossetti_CC_Impact_Railroads.pdf

U.S. Senate. (2011). Emerging Threats To Rail Security. Retrieved from https://www.govinfo.gov/content/pkg/CHRG-112shrg71203/html/CHRG-112shrg71203.htm

Wilson, J. M., Jackson, B. A., & Eisman, M. (2007). Securing America’s Passenger-Rail Systems. RAND Corporation.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Part 1

You have depicted a specific network from within your sector graphically and presented your depiction to your classmates and instructor. This week, you will explore in-depth the nodes, assets, and links within your selected network.

Overview of Nodes Assets and Links in the Lower Colorado Dams Network

Overview of Nodes Assets and Links in the Lower Colorado Dams Network

In 2 pages, deliver a preliminary view of the assets, nodes, and links in your network. Be concise, yet comprehensive.

The following elements should be included in the paper:

-Describe each node, asset, and link in the network. If these are too numerous, you may elect to describe types of assets and links.
-Using the Lower Colorado Dams as an example, it is important to realize that dams can produce hydroelectric power, serve as storage sites by creating a reservoir for drinking, irrigation, and recreation, or primarily provide diversion by directing water for other uses. Some dams may also serve all of these functions.
-Consider and describe the threats that might impact each node or type of node.
-Links may be critical too, but absorb these in considering threats to your nodes. For example, if a road links 2 power production facilities, and its impassibility in the winter means employees do not make it to work, you should simply cast this threat in terms of how it impacts the node. In other words, there is a threat of employees not reporting to work because of the remoteness of facility and routinely impassable roads.
-Every node should have multiple potential threats, and these should be realistic and fully described.
-Do not choose obscure or extremely unlikely threats, or you will find that infinite possibilities exist.
-You must use professional and governmental sources to help identify realistic threats.
-Consider and list the potential consequences each of these threats might produce.