National Library of Energy BETA

Sample records for hughes network systems

  1. Comments of Hughes Network Systems, LLC and Inmarsat Inc. | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hughes and Inmarsat are global leaders in providing satellite networks and services and satellite services, respectively. Hughes and Inmarsat, both global satellite communications ...

  2. Hugh Chen | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hugh Chen About Us Hugh Chen - Deputy Director for Finance, Incentives, and Program Analysis Hugh Chen Hugh Chen is the Deputy Director for Finance, Incentives, and Program Analysis within the Office of Energy Policy and Systems Analysis (EPSA) at the U.S. Department of Energy. Within EPSA, Hugh leads an office that provides independent analysis on energy-related markets, policies, and investments that support the nation's energy goals. Prior to joining EPSA, Hugh was the Director of Program

  3. Joseph Hughes

    Broader source: Energy.gov [DOE]

    Joseph Hughes is a Project Officer with the U.S. Department of Energy's Office of Energy Efficiency and Renewable Energy.

  4. Hugh Clapp | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hugh Clapp About Us Hugh Clapp - Associate CIO for Cyber Operations

  5. Jefferson Lab Leadership Council - Hugh E. Montgomery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLab Director, Hugh E. Montgomery Hugh E. Montgomery Director, Thomas Jefferson National Accelerator Facility Dr. Hugh E. Montgomery is the Director of the Thomas Jefferson National Accelerator Facility (Jefferson Lab). As the lab's chief executive officer, he is responsible for ensuring funding for the lab and for setting policy and program direction. In addition, he oversees the delivery of the lab program and ensures that Jefferson Lab complies with all regulations, laws and contract

  6. Hughes Power & Light Co | Open Energy Information

    Open Energy Info (EERE)

    Power & Light Co Jump to: navigation, search Name: Hughes Power & Light Co Place: Alaska Phone Number: 907-889-2206 Outage Hotline: 907-889-2206 References: EIA Form EIA-861 Final...

  7. Hugh Montgomery Named JLab's New Director | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hugh Montgomery Named JLab's New Director Hugh Montgomery Named JLab's New Director Washington, D.C., April 3, 2008 - Hugh E. Montgomery, a highly regarded nuclear physicist with an extensive research portfolio and broad international experience, today was named director of the Department of Energy's Thomas Jefferson National Accelerator Facility. Montgomery's appointment as the lab's third director was announced by Jefferson Science Associates, LLC, which manages and operates Jefferson Lab for

  8. Hugh O'Neill | Photosynthetic Antenna Research Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hugh O'Neill Hugh O'Neill Hugh O'Neill Hugh O'Neill Research Affiliate E-mail: oneillhm@ornl.gov Phone: 865.574.5004 Research Affiliate Dr. O'Neill investigates the properties of plant light harvesting complex II (LHCII) for the development of artificial photoconversion units that self-assemble with functional catalytic units embedded in an electroactive membrane structure for solar fuel production. Staff Scientist 6/15/11:: ORNL Neutrons, Supercomputer Simulations Reveal Molecular Structure of

  9. Network Information System

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following aremore » the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an

  10. Network Information System

    SciTech Connect (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following are the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment

  11. FIA-15-0017- In the Matter of Shawn Hughes

    Broader source: Energy.gov [DOE]

    On May 4, 2015, OHA remanded to the National Nuclear Security Administration a FOIA Appeal filed by Shawn Hughes (Appellant). In the Appeal, the Appellant challenged a determination by the NNSA...

  12. Hughes_DPP2007_slide01-09.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Fusion Center American Physical Society 49th Annual Meeting of the Division of Plasma Physics Orlando, FL 14 November 2007 J.W. Hughes et al. "H-mode performance and pedestal...

  13. Hugh Montgomery Named JLab's New Director | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    "Hugh Montgomery is a superb choice for the Laboratory," said Raymond Orbach, undersecretary for science at DOE. "As director, he will lead a world-class center that can enable ...

  14. FIA-15-0019- In the Matter of Shawn Hughes

    Office of Energy Efficiency and Renewable Energy (EERE)

    On May 7, 2015, the Department of Energy’s (DOE) Office of Hearings and Appeals (OHA) denied in part and remanded in part a Freedom of Information Act (FOIA) Appeal filed by Shawn Hughes (Appellant...

  15. Solving Winfree's puzzle: The isochrons in the FitzHugh-Nagumo model

    SciTech Connect (OSTI)

    Langfield, Peter Krauskopf, Bernd Osinga, Hinke M.

    2014-03-15

    We consider the FitzHugh-Nagumo model, an example of a system with two time scales for which Winfree was unable to determine the overall structure of the isochrons. An isochron is the set of all points in the basin of an attracting periodic orbit that converge to this periodic orbit with the same asymptotic phase. We compute the isochrons as one-dimensional parametrised curves with a method based on the continuation of suitable two-point boundary value problems. This allows us to present in detail the geometry of how the basin of attraction is foliated by isochrons. They exhibit extreme sensitivity and feature sharp turns, which is why Winfree had difficulties finding them. We observe that the sharp turns and sensitivity of the isochrons are associated with the slow-fast nature of the FitzHugh-Nagumo system; more specifically, it occurs near its repelling (unstable) slow manifold.

  16. ESnet Network Operating System (ENOS)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Experimental Network Testbeds Performance (perfSONAR) Software & Tools Development Data ... Blog ESnet Live Home Network R&D Software-Defined Networking (SDN) ENOS Network ...

  17. FIA-12-0010- In the Matter of Hughes Socol Piers Resnick DYM, Ltd.

    Broader source: Energy.gov [DOE]

    Hughes Socol Piers Resnick DYM, Ltd. (Hughes Socol) appealed a determination issued to it on February 15, 2012, by the Chicago Office of the Department of Energy (DOE). The Chicago Office had responded to a request that Hughes Socol had filed under the Freedom of Information Act (FOIA), 5 U.S.C. § 552, as implemented by the DOE in 10 C.F.R. Part 1004. The Chicago Office had identified eight responsive documents, but it withheld them under FOIA Exemption 4. This appeal, if granted, would require the Chicago Office to release the withheld information to Hughes Socol.

  18. EIA - Natural Gas Pipeline Network - Network Configuration & System Design

    U.S. Energy Information Administration (EIA) Indexed Site

    Network Configuration & System Design About U.S. Natural Gas Pipelines - Transporting Natural Gas based on data through 2007/2008 with selected updates Network Configuration and System Design Overview | Transmission/Storage | Design Criteria | Importance of Storage| Overall Pipeline System Configuration Overview A principal requirement of the natural gas transmission system is that it be capable of meeting the peak demand of its shippers who have contracts for firm service. To meet this

  19. Energy Systems Network ESN | Open Energy Information

    Open Energy Info (EERE)

    associations and breakthroughs in cleantech which help promote growth in the local economy. References: Energy Systems Network (ESN)1 This article is a stub. You can help...

  20. Neural network based system for equipment surveillance

    DOE Patents [OSTI]

    Vilim, Richard B.; Gross, Kenneth C.; Wegerich, Stephan W.

    1998-01-01

    A method and system for performing surveillance of transient signals of an industrial device to ascertain the operating state. The method and system involves the steps of reading into a memory training data, determining neural network weighting values until achieving target outputs close to the neural network output. If the target outputs are inadequate, wavelet parameters are determined to yield neural network outputs close to the desired set of target outputs and then providing signals characteristic of an industrial process and comparing the neural network output to the industrial process signals to evaluate the operating state of the industrial process.

  1. Neural network based system for equipment surveillance

    DOE Patents [OSTI]

    Vilim, R.B.; Gross, K.C.; Wegerich, S.W.

    1998-04-28

    A method and system are disclosed for performing surveillance of transient signals of an industrial device to ascertain the operating state. The method and system involves the steps of reading into a memory training data, determining neural network weighting values until achieving target outputs close to the neural network output. If the target outputs are inadequate, wavelet parameters are determined to yield neural network outputs close to the desired set of target outputs and then providing signals characteristic of an industrial process and comparing the neural network output to the industrial process signals to evaluate the operating state of the industrial process. 33 figs.

  2. High-speed, intra-system networks

    SciTech Connect (OSTI)

    Quinn, Heather M; Graham, Paul S; Manuzzato, Andrea; Fairbanks, Tom; Dallmann, Nicholas; Desgeorges, Rose

    2010-06-28

    Recently, engineers have been studying on-payload networks for fast communication paths. Using intra-system networks as a means to connect devices together allows for a flexible payload design that does not rely on dedicated communication paths between devices. In this manner, the data flow architecture of the system can be dynamically reconfigured to allow data routes to be optimized for the application or configured to route around devices that are temporarily or permanently unavailable. To use intra-system networks, devices will need network controllers and switches. These devices are likely to be affected by single-event effects, which could affect data communication. In this paper we will present radiation data and performance analysis for using a Broadcom network controller in a neutron environment.

  3. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  4. Network support for system initiated checkpoints

    DOE Patents [OSTI]

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  5. Synchronization in networks of spatially extended systems

    SciTech Connect (OSTI)

    Filatova, Anastasiya E.; Hramov, Alexander E.; Koronovskii, Alexey A.; Boccaletti, Stefano

    2008-06-15

    Synchronization processes in networks of spatially extended dynamical systems are analytically and numerically studied. We focus on the relevant case of networks whose elements (or nodes) are spatially extended dynamical systems, with the nodes being connected with each other by scalar signals. The stability of the synchronous spatio-temporal state for a generic network is analytically assessed by means of an extension of the master stability function approach. We find an excellent agreement between the theoretical predictions and the data obtained by means of numerical calculations. The efficiency and reliability of this method is illustrated numerically with networks of beam-plasma chaotic systems (Pierce diodes). We discuss also how the revealed regularities are expected to take place in other relevant physical and biological circumstances.

  6. Uranium hydrogeochemical and stream sediment reconnaissance of the Hughes NTMS quadrangle, Alaska

    SciTech Connect (OSTI)

    D'Andrea, R.F. Jr.; Zinkl, R.J.; Shettel, D.L. Jr.; Langfeldt, S.L.; Youngquist, C.A.

    1981-09-01

    This report presents results of a Hydrogeochemical and Stream Sediment Reconnaissance (HSSR) of the Hughes NTMS quadrangle, Alaska. In addition to this abbreviated data release, more complete data are available to the public in machine-readable form through the Grand Junction Office Information System at Oak Ridge National Laboratory (ORNL). Presented in this data release are location data, field analyses, and laboratory analyses of several different sample media. For the sake of brevity, many field site observations have not been included in this volume. These data are, however, available on the magnetic tape. Appendices A and B describe the sample media and summarize the analytical results for each medium. The data were subdivided by one of the Los Alamos National Laboratory (LANL) sorting programs of Zinkl and others into groups of stream sediment and lake sediment samples. For each group which contains a sufficient number of observations, statistical tables, tables of raw data, and 1:1000000 scale maps of pertinent elements have been included in this report. In addition, maps showing results of multivariate statistical analyses have been included. Further information about the HSSR program in general, or about the LANL portion of the program in particular, can be obtained in quarterly or semiannual program progress reports on open-file at DOE's Technical Library in Grand Junction. Information about the field and analytical procedures used by LANL during sample collection and analysis may be found in any HSSR data release prepared by the LANL and will not be included in this report.

  7. Network and adaptive system of systems modeling and analysis.

    SciTech Connect (OSTI)

    Lawton, Craig R.; Campbell, James E. Dr.; Anderson, Dennis James; Eddy, John P.

    2007-05-01

    This report documents the results of an LDRD program entitled ''Network and Adaptive System of Systems Modeling and Analysis'' that was conducted during FY 2005 and FY 2006. The purpose of this study was to determine and implement ways to incorporate network communications modeling into existing System of Systems (SoS) modeling capabilities. Current SoS modeling, particularly for the Future Combat Systems (FCS) program, is conducted under the assumption that communication between the various systems is always possible and occurs instantaneously. A more realistic representation of these communications allows for better, more accurate simulation results. The current approach to meeting this objective has been to use existing capabilities to model network hardware reliability and adding capabilities to use that information to model the impact on the sustainment supply chain and operational availability.

  8. Gas Main Sensor and Communications Network System

    SciTech Connect (OSTI)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  9. IEEE 342 Node Low Voltage Networked Test System

    SciTech Connect (OSTI)

    Schneider, Kevin P.; Phanivong, Phillippe K.; Lacroix, Jean-Sebastian

    2014-07-31

    The IEEE Distribution Test Feeders provide a benchmark for new algorithms to the distribution analyses community. The low voltage network test feeder represents a moderate size urban system that is unbalanced and highly networked. This is the first distribution test feeder developed by the IEEE that contains unbalanced networked components. The 342 node Low Voltage Networked Test System includes many elements that may be found in a networked system: multiple 13.2kV primary feeders, network protectors, a 120/208V grid network, and multiple 277/480V spot networks. This paper presents a brief review of the history of low voltage networks and how they evolved into the modern systems. This paper will then present a description of the 342 Node IEEE Low Voltage Network Test System and power flow results.

  10. System restoration of a transmission network

    SciTech Connect (OSTI)

    Ebert, A.; Eppel, M.; Genthe, S.; Schwarzjirg, H.; Stark, J.; Werner, W. [Bayernwerke AG, Karlsfeld (Germany); [Siemens AG, Wien (Austria)

    1995-12-31

    In a large SCADA/EMS-System an Expertsystem for Fault Diagnosis and for System Restoration is integrated. The System Restoration covered by the Expertsystem gives assistance to the operator in any kind of blackout by presenting restoration plans. In case any number of busbars is outaged the system automatically determines the affected network areas and thereby the magnitude of the whole blackout. The restoration of the network is done in phases depending on the kind of blackout and is based on a global utility-strategy-plan. Within this scheme the detailed restoration plan is determined dynamically based on the actual situation and some predefinitions such as load priorities and power plants to be reenergized with priority. The described system covers all cases of blackouts by evaluating a plan based on the individual case. The Expertsystem is a hybrid system using an optimal power flow, too, and is fully integrated in the SCADA/EMS system. The plans of each phase are presented via the common MMI to the operator and supervised due to execution. The system distinguishes between operator wanted deviations and unwanted deviations during execution. Thus the operator at any time can continue as he likes.

  11. System and method for networking electrochemical devices

    DOE Patents [OSTI]

    Williams, Mark C.; Wimer, John G.; Archer, David H.

    1995-01-01

    An improved electrochemically active system and method including a plurality of electrochemical devices, such as fuel cells and fluid separation devices, in which the anode and cathode process-fluid flow chambers are connected in fluid-flow arrangements so that the operating parameters of each of said plurality of electrochemical devices which are dependent upon process-fluid parameters may be individually controlled to provide improved operating efficiency. The improvements in operation include improved power efficiency and improved fuel utilization in fuel cell power generating systems and reduced power consumption in fluid separation devices and the like through interstage process fluid parameter control for series networked electrochemical devices. The improved networking method includes recycling of various process flows to enhance the overall control scheme.

  12. Pathways, Networks and Systems Medicine Conferences

    SciTech Connect (OSTI)

    Nadeau, Joseph H.

    2013-11-25

    The 6th Pathways, Networks and Systems Medicine Conference was held at the Minoa Palace Conference Center, Chania, Crete, Greece (16-21 June 2008). The Organizing Committee was composed of Joe Nadeau (CWRU, Cleveland), Rudi Balling (German Research Centre, Brauschweig), David Galas (Institute for Systems Biology, Seattle), Lee Hood (Institute for Systems Biology, Seattle), Diane Isonaka (Seattle), Fotis Kafatos (Imperial College, London), John Lambris (Univ. Pennsylvania, Philadelphia),Harris Lewin (Univ. of Indiana, Urbana-Champaign), Edison Liu (Genome Institute of Singapore, Singapore), and Shankar Subramaniam (Univ. California, San Diego). A total of 101 individuals from 21 countries participated in the conference: USA (48), Canada (5), France (5), Austria (4), Germany (3), Italy (3), UK (3), Greece (2), New Zealand (2), Singapore (2), Argentina (1), Australia (1), Cuba (1), Denmark (1), Japan (1), Mexico (1), Netherlands (1), Spain (1), Sweden (1), Switzerland (1). With respect to speakers, 29 were established faculty members and 13 were graduate students or postdoctoral fellows. With respect to gender representation, among speakers, 13 were female and 28 were male, and among all participants 43 were female and 58 were male. Program these included the following topics: Cancer Pathways and Networks (Day 1), Metabolic Disease Networks (Day 2), Day 3 ? Organs, Pathways and Stem Cells (Day 3), and Day 4 ? Inflammation, Immunity, Microbes and the Environment (Day 4). Proceedings of the Conference were not published.

  13. Complex network synchronization of chaotic systems with delay coupling

    SciTech Connect (OSTI)

    Theesar, S. Jeeva Sathya Ratnavelu, K.

    2014-03-05

    The study of complex networks enables us to understand the collective behavior of the interconnected elements and provides vast real time applications from biology to laser dynamics. In this paper, synchronization of complex network of chaotic systems has been studied. Every identical node in the complex network is assumed to be in Lur’e system form. In particular, delayed coupling has been assumed along with identical sector bounded nonlinear systems which are interconnected over network topology.

  14. Physical Modeling of Scaled Water Distribution System Networks...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Physical Modeling of Scaled Water Distribution System Networks. Citation Details In-Document Search Title: Physical Modeling of Scaled Water Distribution System ...

  15. Photovoltaic Systems Interconnected onto Secondary Network Distribution Systems – Success Stories

    Office of Energy Efficiency and Renewable Energy (EERE)

    This report examines six case studies of photovoltaic (PV) systems integrated into secondary network systems. The six PV systems were chosen for evaluation because they are interconnected to secondary network systems located in four major Solar America Cities.

  16. System and method for generating a relationship network

    DOE Patents [OSTI]

    Franks, Kasian; Myers, Cornelia A.; Podowski, Raf M.

    2011-07-26

    A computer-implemented system and process for generating a relationship network is disclosed. The system provides a set of data items to be related and generates variable length data vectors to represent the relationships between the terms within each data item. The system can be used to generate a relationship network for documents, images, or any other type of file. This relationship network can then be queried to discover the relationships between terms within the set of data items.

  17. System and method for generating a relationship network

    SciTech Connect (OSTI)

    Franks, Kasian; Myers, Cornelia A; Podowski, Raf M

    2015-05-05

    A computer-implemented system and process for generating a relationship network is disclosed. The system provides a set of data items to be related and generates variable length data vectors to represent the relationships between the terms within each data item. The system can be used to generate a relationship network for documents, images, or any other type of file. This relationship network can then be queried to discover the relationships between terms within the set of data items.

  18. Computer System, Cluster, and Networking Summer Institute Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System, Cluster, and Networking Summer Institute Program Description The Computer System, Cluster, and Networking Summer Institute (CSCNSI) is a focused technical enrichment program targeting third-year college undergraduate students currently engaged in a computer science, computer engineering, or similar major. The program emphasizes practical skill development in setting up, configuring, administering, testing, monitoring, and scheduling computer systems, supercomputer clusters, and computer

  19. in High Performance Computing Computer System, Cluster, and Networking...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    iSSH v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin,...

  20. A performance data network for solar process heat systems

    SciTech Connect (OSTI)

    Barker, G.; Hale, M.J.

    1996-03-01

    A solar process heat (SPH) data network has been developed to access remote-site performance data from operational solar heat systems. Each SPH system in the data network is outfitted with monitoring equipment and a datalogger. The datalogger is accessed via modem from the data network computer at the National Renewable Energy Laboratory (NREL). The dataloggers collect both ten-minute and hourly data and download it to the data network every 24-hours for archiving, processing, and plotting. The system data collected includes energy delivered (fluid temperatures and flow rates) and site meteorological conditions, such as solar insolation and ambient temperature. The SPH performance data network was created for collecting performance data from SPH systems that are serving in industrial applications or from systems using technologies that show promise for industrial applications. The network will be used to identify areas of SPH technology needing further development, to correlate computer models with actual performance, and to improve the credibility of SPH technology. The SPH data network also provides a centralized bank of user-friendly performance data that will give prospective SPH users an indication of how actual systems perform. There are currently three systems being monitored and archived under the SPH data network: two are parabolic trough systems and the third is a flat-plate system. The two trough systems both heat water for prisons; the hot water is used for personal hygiene, kitchen operations, and laundry. The flat plate system heats water for meat processing at a slaughter house. We plan to connect another parabolic trough system to the network during the first months of 1996. We continue to look for good examples of systems using other types of collector technologies and systems serving new applications (such as absorption chilling) to include in the SPH performance data network.

  1. Interconnecting PV on New York City's Secondary Network Distribution System

    SciTech Connect (OSTI)

    Anderson, K.; Coddington, M.; Burman, K.; Hayter, S.; Kroposki, B.; Watson, A.

    2009-12-01

    This study describes technical assistance provided by NREL to help New York City and Con Edison improve the interconnection of distributed PV systems on a secondary network distribution system.

  2. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    SciTech Connect (OSTI)

    Zarkesh-Ha, Payman

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  3. Decision support systems and methods for complex networks

    DOE Patents [OSTI]

    Huang, Zhenyu; Wong, Pak Chung; Ma, Jian; Mackey, Patrick S; Chen, Yousu; Schneider, Kevin P

    2012-02-28

    Methods and systems for automated decision support in analyzing operation data from a complex network. Embodiments of the present invention utilize these algorithms and techniques not only to characterize the past and present condition of a complex network, but also to predict future conditions to help operators anticipate deteriorating and/or problem situations. In particular, embodiments of the present invention characterize network conditions from operation data using a state estimator. Contingency scenarios can then be generated based on those network conditions. For at least a portion of all of the contingency scenarios, risk indices are determined that describe the potential impact of each of those scenarios. Contingency scenarios with risk indices are presented visually as graphical representations in the context of a visual representation of the complex network. Analysis of the historical risk indices based on the graphical representations can then provide trends that allow for prediction of future network conditions.

  4. Interactivity vs. fairness in networked linux systems

    SciTech Connect (OSTI)

    Wu, Wenji; Crawford, Matt; ,

    2007-01-01

    In general, the Linux 2.6 scheduler can ensure fairness and provide excellent interactive performance at the same time. However, our experiments and mathematical analysis have shown that the current Linux interactivity mechanism tends to incorrectly categorize non-interactive network applications as interactive, which can lead to serious fairness or starvation issues. In the extreme, a single process can unjustifiably obtain up to 95% of the CPU! The root cause is due to the facts that: (1) network packets arrive at the receiver independently and discretely, and the 'relatively fast' non-interactive network process might frequently sleep to wait for packet arrival. Though each sleep lasts for a very short period of time, the wait-for-packet sleeps occur so frequently that they lead to interactive status for the process. (2) The current Linux interactivity mechanism provides the possibility that a non-interactive network process could receive a high CPU share, and at the same time be incorrectly categorized as 'interactive.' In this paper, we propose and test a possible solution to address the interactivity vs. fairness problems. Experiment results have proved the effectiveness of the proposed solution.

  5. Model Specification for Networked Outdoor Lighting Control Systems

    Broader source: Energy.gov [DOE]

    The DOE Municipal Solid-State Street Lighting Consortium's Model Specification for Networked Outdoor Lighting Control Systems is a tool designed to help cities, utilities, and other local agencies...

  6. Systems and methods for modeling and analyzing networks

    DOE Patents [OSTI]

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  7. System for testing properties of a network

    DOE Patents [OSTI]

    Rawle, Michael; Bartholomew, David B.; Soares, Marshall A.

    2009-06-16

    A method for identifying properties of a downhole electromagnetic network in a downhole tool sting, including the step of providing an electromagnetic path intermediate a first location and a second location on the electromagnetic network. The method further includes the step of providing a receiver at the second location. The receiver includes a known reference. The analog signal includes a set amplitude, a set range of frequencies, and a set rate of change between the frequencies. The method further includes the steps of sending the analog signal, and passively modifying the signal. The analog signal is sent from the first location through the electromagnetic path, and the signal is modified by the properties of the electromagnetic path. The method further includes the step of receiving a modified signal at the second location and comparing the known reference to the modified signal.

  8. Active system area networks for data intensive computations. Final report

    SciTech Connect (OSTI)

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  9. Interconnecting PV on New York City's Secondary Network Distribution System

    SciTech Connect (OSTI)

    K. Anderson; M. Coddington; K. Burman; S. Hayter; B. Kroposki; and A. Watson

    2009-11-30

    The U.S. Department of Energy (DOE) has teamed with cities across the country through the Solar America Cities (SAC) partnership program to help reduce barriers and accelerate implementation of solar energy. The New York City SAC team is a partnership between the City University of New York (CUNY), the New York City Mayor s Office of Long-term Planning and Sustainability, and the New York City Economic Development Corporation (NYCEDC).The New York City SAC team is working with DOE s National Renewable Energy Laboratory (NREL) and Con Edison, the local utility, to develop a roadmap for photovoltaic (PV) installations in the five boroughs. The city set a goal to increase its installed PV capacity from1.1 MW in 2005 to 8.1 MW by 2015 (the maximum allowed in 2005). A key barrier to reaching this goal, however, is the complexity of the interconnection process with the local utility. Unique challenges are associated with connecting distributed PV systems to secondary network distribution systems (simplified to ???¢????????networks???¢??????? in this report). Although most areas of the country use simpler radial distribution systems to distribute electricity, larger metropolitan areas like New York City typically use networks to increase reliability in large load centers. Unlike the radial distribution system, where each customer receives power through a single line, a network uses a grid of interconnected lines to deliver power to each customer through several parallel circuits and sources. This redundancy improves reliability, but it also requires more complicated coordination and protection schemes that can be disrupted by energy exported from distributed PV systems. Currently, Con Edison studies each potential PV system in New York City to evaluate the system s impact on the network, but this is time consuming for utility engineers and may delay the customer s project or add cost for larger installations. City leaders would like to streamline

  10. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  11. FIPA agent based network distributed control system

    SciTech Connect (OSTI)

    D. Abbott; V. Gyurjyan; G. Heyes; E. Jastrzembski; C. Timmer; E. Wolin

    2003-03-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  12. Momentum Integral Network Method for Thermal-Hydraulic Systems Analysis.

    Energy Science and Technology Software Center (OSTI)

    2000-11-20

    EPIPE is used for design or design evaluation of complex large piping systems. The piping systems can be viewed as a network of straight pipe elements (or tangents) and curved elements (pipe bends) interconnected at joints (or nodes) with intermediate supports and anchors. The system may be subject to static loads such as thermal, dead weight, internal pressure, or dynamic loads such as earthquake motions and flow-induced vibrations, or any combination of these. MINET (Momentummore » Integral NETwork) was developed for the transient analysis of intricate fluid flow and heat transfer networks, such as those found in the balance of plant in power generating facilities. It can be utilized as a stand-alone program or interfaced to another computer program for concurrent analysis. Through such coupling, a computer code limited by either the lack of required component models or large computational needs can be extended to more fully represent the thermal hydraulic system thereby reducing the need for estimating essential transient boundary conditions. The MINET representation of a system is one or more networks of volumes, segments, and boundaries linked together via heat exchangers only, i.e., heat can transfer between networks, but fluids cannot. Volumes are used to represent tanks or other volume components, as well as locations in the system where significant flow divisions or combinations occur. Segments are composed of one or more pipes, pumps, heat exchangers, turbines, and/or valves each represented by one or more nodes. Boundaries are simply points where the network interfaces with the user or another computer code. Several fluids can be simulated, including water, sodium, NaK, and air.« less

  13. Sensor network based vehicle classification and license plate identification system

    SciTech Connect (OSTI)

    Frigo, Janette Rose; Brennan, Sean M; Rosten, Edward J; Raby, Eric Y; Kulathumani, Vinod K

    2009-01-01

    Typically, for energy efficiency and scalability purposes, sensor networks have been used in the context of environmental and traffic monitoring applications in which operations at the sensor level are not computationally intensive. But increasingly, sensor network applications require data and compute intensive sensors such video cameras and microphones. In this paper, we describe the design and implementation of two such systems: a vehicle classifier based on acoustic signals and a license plate identification system using a camera. The systems are implemented in an energy-efficient manner to the extent possible using commercially available hardware, the Mica motes and the Stargate platform. Our experience in designing these systems leads us to consider an alternate more flexible, modular, low-power mote architecture that uses a combination of FPGAs, specialized embedded processing units and sensor data acquisition systems.

  14. Neural Network Based System for Equipment Startup Surveillance

    Energy Science and Technology Software Center (OSTI)

    1996-12-18

    NEBSESS is a system for equipment surveillance and fault detection which relies on a neural-network based means for diagnosing disturbances during startup and for automatically actuating the Sequential Probability Ratio Test (SPRT) as a signal validation means during steady-state operation.

  15. Physical Modeling of Scaled Water Distribution System Networks.

    SciTech Connect (OSTI)

    O'Hern, Timothy J.; Hammond, Glenn Edward; Orear, Leslie ,; van Bloemen Waanders, Bart G.; Paul Molina; Ross Johnson

    2005-10-01

    Threats to water distribution systems include release of contaminants and Denial of Service (DoS) attacks. A better understanding, and validated computational models, of the flow in water distribution systems would enable determination of sensor placement in real water distribution networks, allow source identification, and guide mitigation/minimization efforts. Validation data are needed to evaluate numerical models of network operations. Some data can be acquired in real-world tests, but these are limited by 1) unknown demand, 2) lack of repeatability, 3) too many sources of uncertainty (demand, friction factors, etc.), and 4) expense. In addition, real-world tests have limited numbers of network access points. A scale-model water distribution system was fabricated, and validation data were acquired over a range of flow (demand) conditions. Standard operating variables included system layout, demand at various nodes in the system, and pressure drop across various pipe sections. In addition, the location of contaminant (salt or dye) introduction was varied. Measurements of pressure, flowrate, and concentration at a large number of points, and overall visualization of dye transport through the flow network were completed. Scale-up issues that that were incorporated in the experiment design include Reynolds number, pressure drop across nodes, and pipe friction and roughness. The scale was chosen to be 20:1, so the 10 inch main was modeled with a 0.5 inch pipe in the physical model. Controlled validation tracer tests were run to provide validation to flow and transport models, especially of the degree of mixing at pipe junctions. Results of the pipe mixing experiments showed large deviations from predicted behavior and these have a large impact on standard network operations models.3

  16. Networked Microgrids for Self-healing Power Systems

    SciTech Connect (OSTI)

    Wang, Zhaoyu; Chen, Bokan; Wang, Jianhui; Chen, Chen

    2015-06-17

    This paper proposes a transformative architecture for the normal operation and self-healing of networked microgrids (MGs). MGs can support and interchange electricity with each other in the proposed infrastructure. The networked MGs are connected by a physical common bus and a designed two-layer cyber communication network. The lower layer is within each MG where the energy management system (EMS) schedules the MG operation; the upper layer links a number of EMSs for global optimization and communication. In the normal operation mode, the objective is to schedule dispatchable distributed generators (DGs), energy storage systems (ESs) and controllable loads to minimize the operation costs and maximize the supply adequacy of each MG. When a generation deficiency or fault happens in a MG, the model switches to the self-healing mode and the local generation capacities of other MGs can be used to support the on-emergency portion of the system. A consensus algorithm is used to distribute portions of the desired power support to each individual MG in a decentralized way. The allocated portion corresponds to each MG’s local power exchange target which is used by its EMS to perform the optimal schedule. The resultant aggregated power output of networked MGs will be used to provide the requested power support. Test cases demonstrate the effectiveness of the proposed methodology.

  17. Scaling the Earth System Grid to 100Gbps Networks

    SciTech Connect (OSTI)

    Balman, Mehmet; Sim, Alex

    2012-03-02

    The SC11 demonstration, titled Scaling the Earth System Grid to 100Gbps Networks, showed the ability to use underlying infrastructure for the movement of climate data over 100Gbps network. Climate change research is one of the critical data intensive sciences, and the amount of data is continuously growing. Climate simulation data is geographically distributed over the world, and it needs to be accessed from many sources for fast and efficient analysis and inter-comparison of simulations. We used a 100Gbps link connecting National Energy Research Scientific Computing Center (NERSC) at Lawrence Berkeley National Laboratory (LBNL), Argonne National Laboratory (ANL) and Oak Ridge National Laboratory (ORNL). In the demo, the Intergovernmental Panel on Climate Change (IPCC) Fourth Assessment Report (AR4) phase 3 of the Coupled Model Intercomparison Project (CMIP-3) dataset was staged into the memory of computing nodes at ANL and ORNL from NERSC over the 100Gbps network for analysis and visualization. In general, climate simulation data consists of relatively small and large files with irregular file size distribution in each dataset. In this demo, we addressed challenges on data management in terms of high bandwidth networks, usability of existing protocols and middleware tools, and how applications can adapt and benefit from next generation networks.

  18. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    SciTech Connect (OSTI)

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason; Stout, William M.S.; Lee, Erik

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  19. End-System Network Interface Controller for 100 Gb/s Wide Area Networks: Final Report

    SciTech Connect (OSTI)

    Wen, Jesse

    2013-08-30

    In recent years, network bandwidth requirements have scaled multiple folds, pushing the need for the development of data exchange mechanisms at 100 Gb/s and beyond. High performance computing, climate modeling, large-scale storage, and collaborative scientific research are examples of applications that can greatly benefit by leveraging high bandwidth capabilities of the order of 100 Gb/s. Such requirements and advances in IEEE Ethernet standards, Optical Transport Unit4 (OTU4), and host-system interconnects demand a network infrastructure supporting throughput rates of the order of 100 Gb/s with a single wavelength. To address such a demand Acadia Optronics in collaboration with the University of New Mexico, proposed and developed a end-system Network Interface Controller (NIC) for the 100Gbps WANs. Acadia’s 100G NIC employs an FPGA based system with a high-performance processor interconnect (PCIe 3.0) and a high capacity optical transmission link (CXP) to provide data transmission at the rate of 100 Gbps.

  20. Computer System, Cluster and Networking Summer Institute (CSCNSI)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LaboratoryNational Security Education Center Menu About Seminar Series Summer Schools Workshops Viz Collab IS&T Projects NSEC » Information Science and Technology Institute (ISTI) » Summer School Programs » CSCNSI Computer System, Cluster and Networking Summer Institute Emphasizes practical skills development Contacts Program Lead Carolyn Connor (505) 665-9891 Email Professional Staff Assistant Nicole Aguilar Garcia (505) 665-3048 Email Technical enrichment program for third-year

  1. Computer System, Cluster, and Networking Summer Institute Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CSCNSI Projects Computer System, Cluster, and Networking Summer Institute Projects Present and past projects Contacts Program Lead Carolyn Connor (505) 665-9891 Email Professional Staff Assistant Nickole Aguilar Garcia (505) 665-3048 Email 2015 Projects The summer school program was held June 1-July 31, 2015, at the National Security Education Center (NSEC) and New Mexico Consortium (NMC). Class of 2015 2015-si-group Back Row L-R: Matthew Broomfield (instructor), Gustavo Rayos, Destiny

  2. New No-Cost ANTFARM Tool Maps Control System Networks to Help...

    Office of Environmental Management (EM)

    New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber ...

  3. Secondary Network Distribution Systems Background and Issues Related to the Interconnection of Distributed Resources

    SciTech Connect (OSTI)

    Behnke, M.; Erdman, W.; Horgan, S.; Dawson, D.; Feero, W.; Soudi, F.; Smith, D.; Whitaker, C.; Kroposki, B.

    2005-07-01

    This document addresses the technical considerations associated with the interconnection of distributed resources (DR) with secondary network distribution systems. It provides an overview of the characteristics of distribution systems and interconnection requirements and identifies unique issues specific to network interconnections. It also identifies the network-specific interconnection issues for which test protocols should be developed. Recommended criteria and requirements for the interconnection of DR with network distribution systems are presented.

  4. High-speed and high-fidelity system and method for collecting network traffic

    DOE Patents [OSTI]

    Weigle, Eric H.

    2010-08-24

    A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

  5. Controllable quantum information network with a superconducting system

    SciTech Connect (OSTI)

    Zhang, Feng-yang, E-mail: zhangfy@mail.dlut.edu.cn [School of Physics and Materials Engineering, Dalian Nationalities University, Dalian 116600 (China); Liu, Bao [Beijing Computational Science Research Center (CSRC), Beijing 100084 (China); Chen, Zi-hong [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China); Wu, Song-lin [School of Physics and Materials Engineering, Dalian Nationalities University, Dalian 116600 (China); Song, He-shan [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)

    2014-07-15

    We propose a controllable and scalable architecture for quantum information processing using a superconducting system network, which is composed of current-biased Josephson junctions (CBJJs) as tunable couplers between the two superconducting transmission line resonators (TLRs), each coupling to multiple superconducting qubits (SQs). We explicitly demonstrate that the entangled state, the phase gate, and the information transfer between any two selected SQs can be implemented, respectively. Lastly, numerical simulation shows that our scheme is robust against the decoherence of the system. -- Highlights: An architecture for quantum information processing is proposed. The quantum information transfer between any two selected SQs is implemented. This proposal is robust against the decoherence of the system. This architecture can be fabricated on a chip down to the micrometer scale.

  6. Preliminary systems engineering evaluations for the National Ecological Observatory Network.

    SciTech Connect (OSTI)

    Robertson, Perry J.; Kottenstette, Richard Joseph; Crouch, Shannon M.; Brocato, Robert Wesley; Zak, Bernard Daniel; Osborn, Thor D.; Ivey, Mark D.; Gass, Karl Leslie; Heller, Edwin J.; Dishman, James Larry; Schubert, William Kent; Zirzow, Jeffrey A.

    2008-11-01

    The National Ecological Observatory Network (NEON) is an ambitious National Science Foundation sponsored project intended to accumulate and disseminate ecologically informative sensor data from sites among 20 distinct biomes found within the United States and Puerto Rico over a period of at least 30 years. These data are expected to provide valuable insights into the ecological impacts of climate change, land-use change, and invasive species in these various biomes, and thereby provide a scientific foundation for the decisions of future national, regional, and local policy makers. NEON's objectives are of substantial national and international importance, yet they must be achieved with limited resources. Sandia National Laboratories was therefore contracted to examine four areas of significant systems engineering concern; specifically, alternatives to commercial electrical utility power for remote operations, approaches to data acquisition and local data handling, protocols for secure long-distance data transmission, and processes and procedures for the introduction of new instruments and continuous improvement of the sensor network. The results of these preliminary systems engineering evaluations are presented, with a series of recommendations intended to optimize the efficiency and probability of long-term success for the NEON enterprise.

  7. Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ESnet About ESnet Our Mission The Network ESnet History Governance & Policies Career Opportunities ESnet Staff & Org Chart Contact Us Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net About ESnet A Platform for Science Discovery The Energy Sciences Network (ESnet) is a high-performance, unclassified network built to

  8. System and method for time synchronization in a wireless network

    DOE Patents [OSTI]

    Gonia, Patrick S.; Kolavennu, Soumitri N.; Mahasenan, Arun V.; Budampati, Ramakrishna S.

    2010-03-30

    A system includes multiple wireless nodes forming a cluster in a wireless network, where each wireless node is configured to communicate and exchange data wirelessly based on a clock. One of the wireless nodes is configured to operate as a cluster master. Each of the other wireless nodes is configured to (i) receive time synchronization information from a parent node, (ii) adjust its clock based on the received time synchronization information, and (iii) broadcast time synchronization information based on the time synchronization information received by that wireless node. The time synchronization information received by each of the other wireless nodes is based on time synchronization information provided by the cluster master so that the other wireless nodes substantially synchronize their clocks with the clock of the cluster master.

  9. New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Standards | Department of Energy No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in

  10. Torus Network on a BG/Q System | Argonne Leadership Computing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Blue GeneQ Versus Blue GeneP BGQ Drivers Status Machine Overview Machine Partitions Torus Network Data Storage & File Systems Compiling & Linking Queueing & Running Jobs Data...

  11. Optimizing parameters for predicting the geochemical behavior and performance of discrete fracture networks in geothermal systems

    Broader source: Energy.gov [DOE]

    Optimizing parameters for predicting the geochemical behavior and performance of discrete fracture networks in geothermal systems presentation at the April 2013 peer review meeting held in Denver, Colorado.

  12. Compressed Air System Optimization Improves Production and saves energy at a Satellite Manufacturer

    SciTech Connect (OSTI)

    2002-05-01

    In 2001, a compressed air improvement project was implemented following an audit on the compressed air system at Boeing Satellite Systems (formerly Hughes Space & Communications Company) in Los Angeles, California.

  13. Calculating a checksum with inactive networking components in a computing system

    DOE Patents [OSTI]

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2014-12-16

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  14. Calculating a checksum with inactive networking components in a computing system

    DOE Patents [OSTI]

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2015-01-27

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  15. Tank Waste Information Network System (TWINS) FY 2001 Data Management Plan

    SciTech Connect (OSTI)

    ADAMS, M.R.

    2000-06-12

    The mission of Tank Waste Information Network System (TWINS) is to provide system users with quality tank data and information when needed, in the form needed and at a reasonable cost.

  16. Synchronization in node of complex networks consist of complex chaotic system

    SciTech Connect (OSTI)

    Wei, Qiang, E-mail: qiangweibeihua@163.com [Beihua University computer and technology College, BeiHua University, Jilin, 132021, Jilin (China); Digital Images Processing Institute of Beihua University, BeiHua University, Jilin, 132011, Jilin (China); Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024 (China); Xie, Cheng-jun [Beihua University computer and technology College, BeiHua University, Jilin, 132021, Jilin (China); Digital Images Processing Institute of Beihua University, BeiHua University, Jilin, 132011, Jilin (China); Liu, Hong-jun [School of Information Engineering, Weifang Vocational College, Weifang, 261041 (China); Li, Yan-hui [The Library, Weifang Vocational College, Weifang, 261041 (China)

    2014-07-15

    A new synchronization method is investigated for node of complex networks consists of complex chaotic system. When complex networks realize synchronization, different component of complex state variable synchronize up to different scaling complex function by a designed complex feedback controller. This paper change synchronization scaling function from real field to complex field for synchronization in node of complex networks with complex chaotic system. Synchronization in constant delay and time-varying coupling delay complex networks are investigated, respectively. Numerical simulations are provided to show the effectiveness of the proposed method.

  17. Automated Measurement and Signaling Systems for the Transactional Network

    Broader source: Energy.gov [DOE]

    The Transactional Network Project is a multi-lab activity funded by the U.S. Department of Energy’s Building Technologies Office. The project team included staff from Lawrence Berkeley National Laboratory, Pacific Northwest National Laboratory, and Oak Ridge National Laboratory. The team designed, prototyped, and tested a transactional network (TN) platform to support energy, operational, and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). This document describes the agents and applications developed by the LBNL team, and associated tests of the applications.

  18. Comparison of a Recurrent Neural Network PV System Model with a Traditional Component-Based PV System Model

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Recurrent Neural Network PV System Model with a Traditional Component-Based PV System Model Daniel Riley, Sandia National Laboratories, Albuquerque, New Mexico, USA | Ganesh K. Venayagamoorthy, Missouri University of Science and Technology, Rolla, Missouri, USA Abstract Traditional PV system modeling approaches require system components to be tested in order to determine performance parameters. In some cases, system owners may wish to predict system performance, but lack the parameters

  19. LHCNet: Wide Area Networking and Collaborative Systems for HEP

    SciTech Connect (OSTI)

    Newman, H.B,

    2007-08-20

    This proposal presents the status and progress in 2006-7, and the technical and financial plans for 2008-2010 for the US LHCNet transatlantic network supporting U.S. participation in the LHC physics program. US LHCNet provides transatlantic connections of the Tier1 computing facilities at Fermilab and Brookhaven with the Tier0 and Tier1 facilities at CERN as well as Tier1s elsewhere in Europe and Asia. Together with ESnet, Internet2, the GEANT pan-European network, and NSF’s UltraLight project, US LHCNet also supports connections between the Tier2 centers (where most of the analysis of the data will take place, starting this year) and the Tier1s as needed.See report

  20. Automated Measurement and Signaling Systems for the Transactional Network

    SciTech Connect (OSTI)

    Piette, Mary Ann; Brown, Richard; Price, Phillip; Page, Janie; Granderson, Jessica; Riess, David; Czarnecki, Stephen; Ghatikar, Girish; Lanzisera, Steven

    2013-12-31

    The Transactional Network Project is a multi-lab activity funded by the US Department of Energy?s Building Technologies Office. The project team included staff from Lawrence Berkeley National Laboratory, Pacific Northwest National Laboratory and Oak Ridge National Laboratory. The team designed, prototyped and tested a transactional network (TN) platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). PNNL was responsible for the development of the TN platform, with agents for this platform developed by each of the three labs. LBNL contributed applications to measure the whole-building electric load response to various changes in building operations, particularly energy efficiency improvements and demand response events. We also provide a demand response signaling agent and an agent for cost savings analysis. LBNL and PNNL demonstrated actual transactions between packaged rooftop units and the electric grid using the platform and selected agents. This document describes the agents and applications developed by the LBNL team, and associated tests of the applications.

  1. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore » established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less

  2. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    SciTech Connect (OSTI)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  3. System-wide power management control via clock distribution network

    DOE Patents [OSTI]

    Coteus, Paul W.; Gara, Alan; Gooding, Thomas M.; Haring, Rudolf A.; Kopcsay, Gerard V.; Liebsch, Thomas A.; Reed, Don D.

    2015-05-19

    An apparatus, method and computer program product for automatically controlling power dissipation of a parallel computing system that includes a plurality of processors. A computing device issues a command to the parallel computing system. A clock pulse-width modulator encodes the command in a system clock signal to be distributed to the plurality of processors. The plurality of processors in the parallel computing system receive the system clock signal including the encoded command, and adjusts power dissipation according to the encoded command.

  4. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  5. EIA - Natural Gas Pipeline Network - Largest Natural Gas Pipeline Systems

    U.S. Energy Information Administration (EIA) Indexed Site

    Interstate Pipelines Table About U.S. Natural Gas Pipelines - Transporting Natural Gas based on data through 2007/2008 with selected updates Thirty Largest U.S. Interstate Natural Gas Pipeline Systems, 2008 (Ranked by system capacity) Pipeline Name Market Regions Served Primary Supply Regions States in Which Pipeline Operates Transported in 2007 (million dekatherm)1 System Capacity (MMcf/d) 2 System Mileage Columbia Gas Transmission Co. Northeast Southwest, Appalachia DE, PA, MD, KY, NC, NJ, NY,

  6. Characterizing system dynamics with a weighted and directed network constructed from time series data

    SciTech Connect (OSTI)

    Sun, Xiaoran; School of Mathematics and Statistics, The University of Western Australia, Crawley WA 6009 ; Small, Michael; Zhao, Yi; Xue, Xiaoping

    2014-06-15

    In this work, we propose a novel method to transform a time series into a weighted and directed network. For a given time series, we first generate a set of segments via a sliding window, and then use a doubly symbolic scheme to characterize every windowed segment by combining absolute amplitude information with an ordinal pattern characterization. Based on this construction, a network can be directly constructed from the given time series: segments corresponding to different symbol-pairs are mapped to network nodes and the temporal succession between nodes is represented by directed links. With this conversion, dynamics underlying the time series has been encoded into the network structure. We illustrate the potential of our networks with a well-studied dynamical model as a benchmark example. Results show that network measures for characterizing global properties can detect the dynamical transitions in the underlying system. Moreover, we employ a random walk algorithm to sample loops in our networks, and find that time series with different dynamics exhibits distinct cycle structure. That is, the relative prevalence of loops with different lengths can be used to identify the underlying dynamics.

  7. Time lagged ordinal partition networks for capturing dynamics of continuous dynamical systems

    SciTech Connect (OSTI)

    McCullough, Michael; Iu, Herbert Ho-Ching; Small, Michael; Stemler, Thomas

    2015-05-15

    We investigate a generalised version of the recently proposed ordinal partition time series to network transformation algorithm. First, we introduce a fixed time lag for the elements of each partition that is selected using techniques from traditional time delay embedding. The resulting partitions define regions in the embedding phase space that are mapped to nodes in the network space. Edges are allocated between nodes based on temporal succession thus creating a Markov chain representation of the time series. We then apply this new transformation algorithm to time series generated by the Rssler system and find that periodic dynamics translate to ring structures whereas chaotic time series translate to band or tube-like structuresthereby indicating that our algorithm generates networks whose structure is sensitive to system dynamics. Furthermore, we demonstrate that simple network measures including the mean out degree and variance of out degrees can track changes in the dynamical behaviour in a manner comparable to the largest Lyapunov exponent. We also apply the same analysis to experimental time series generated by a diode resonator circuit and show that the network size, mean shortest path length, and network diameter are highly sensitive to the interior crisis captured in this particular data set.

  8. System, apparatus and methods to implement high-speed network analyzers

    DOE Patents [OSTI]

    Ezick, James; Lethin, Richard; Ros-Giralt, Jordi; Szilagyi, Peter; Wohlford, David E

    2015-11-10

    Systems, apparatus and methods for the implementation of high-speed network analyzers are provided. A set of high-level specifications is used to define the behavior of the network analyzer emitted by a compiler. An optimized inline workflow to process regular expressions is presented without sacrificing the semantic capabilities of the processing engine. An optimized packet dispatcher implements a subset of the functions implemented by the network analyzer, providing a fast and slow path workflow used to accelerate specific processing units. Such dispatcher facility can also be used as a cache of policies, wherein if a policy is found, then packet manipulations associated with the policy can be quickly performed. An optimized method of generating DFA specifications for network signatures is also presented. The method accepts several optimization criteria, such as min-max allocations or optimal allocations based on the probability of occurrence of each signature input bit.

  9. Improving network performance on multicore systems: Impact of core affinities on high throughput flows

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Future Generation Computer Systems ( ) - Contents lists available at ScienceDirect Future Generation Computer Systems journal homepage: www.elsevier.com/locate/fgcs Improving network performance on multicore systems: Impact of core affinities on high throughput flows Nathan Hanford a,∗ , Vishal Ahuja a , Matthew Farrens a , Dipak Ghosal a , Mehmet Balman b , Eric Pouyoul b , Brian Tierney b a Department of Computer Science, University of California, Davis, CA, United States b Energy Sciences

  10. Network Upgrade for the SLC: Control System Modifications

    SciTech Connect (OSTI)

    Crane, M.; Mackenzie, R.; Sass, R.; Himel, T.; /SLAC

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  11. Fault-tolerant interconnection network and image-processing applications for the PASM parallel processing system

    SciTech Connect (OSTI)

    Adams, G.B. III

    1984-01-01

    The demand for very high speed data processing coupled with falling hardware costs has made large-scale parallel and distributed computer systems both desirable and feasible. Two modes of parallel processing are single instruction stream-multiple data stream (SIMD) and multiple instruction stream-multiple data stream (MIMD). PASM, a partitionable SIMD/MIMD system, is a reconfigurable multimicroprocessor system being designed for image processing and pattern recognition. An important component of these systems is the interconnection network, the mechanism for communication among the computation nodes and memories. Assuring high reliability for such complex systems is a significant task. Thus, a crucial practical aspect of an interconnection network is fault tolerance. In answer to this need, the Extra Stage Cube (ESC), a fault-tolerant, multistage cube-type interconnection network, is define. The fault tolerance of the ESC is explored for both single and multiple faults, routing tags are defined, and consideration is given to permuting data and partitioning the ESC in the presence of faults. The ESC is compared with other fault-tolerant multistage networks. Finally, reliability of the ESC and an enhanced version of it are investigated.

  12. Time-Varying, Multi-Scale Adaptive System Reliability Analysis of Lifeline Infrastructure Networks

    SciTech Connect (OSTI)

    Gearhart, Jared Lee; Kurtz, Nolan Scot

    2014-09-01

    The majority of current societal and economic needs world-wide are met by the existing networked, civil infrastructure. Because the cost of managing such infrastructure is high and increases with time, risk-informed decision making is essential for those with management responsibilities for these systems. To address such concerns, a methodology that accounts for new information, deterioration, component models, component importance, group importance, network reliability, hierarchical structure organization, and efficiency concerns has been developed. This methodology analyzes the use of new information through the lens of adaptive Importance Sampling for structural reliability problems. Deterioration, multi-scale bridge models, and time-variant component importance are investigated for a specific network. Furthermore, both bridge and pipeline networks are studied for group and component importance, as well as for hierarchical structures in the context of specific networks. Efficiency is the primary driver throughout this study. With this risk-informed approach, those responsible for management can address deteriorating infrastructure networks in an organized manner.

  13. Study of a transient identification system using a neural network for a PWR plant

    SciTech Connect (OSTI)

    Ishihara, Yoshinao; Kasai, Masao; Kambara, Masayuki [Mitsubishi Heavy Industries, Ltd., Yokohama (Japan); Mitsuda, Hiromichi; Kurata, Toshikazu; Shirosaki, Hidekazu [Inst. of Nuclear Safety System, Inc., Kyoto (Japan)

    1996-08-01

    This paper presents the procedure and results of a system for identifying PWR plant abnormal events, which uses neural network techniques. The neural network recognizes the abnormal event from the patterns of the transient changes of analog data from plant parameters when they deport from their normal state. For the identification of abnormal events in this study, events that cause a reactor to scram during power operation were selected as the design base events. The test data were prepared by simulating the transients on a compact PWR simulator. The simulation data were analyzed to determine how the plant parameters respond after the occurrence of a transient. A method of converting the pattern of the transient changes into characteristic parameters by fitting the data to pre-determined functions was developed. These characteristic parameters were used as the input data to the neural network. The neural network learning procedure used a generalized delta rule, namely a back-propagation algorithm. The neural network can identify the type of an abnormal event from a limited set of events by using these characteristic parameters obtained from the pattern of the changes in the analog data. From the results of this application of a neural network, it was concluded that it would be possible to use the method to identify abnormal events in a nuclear power plant.

  14. Carbon-13 nuclear magnetic resonance characterization of network systems

    SciTech Connect (OSTI)

    Mertzel, E.A.; Perchak, D.R.; Ritchey, W.M.; Koenig, J.L.

    1988-04-01

    Solid-state C-13 NMR measurements are utilized to characterize the tetrafunctional epoxy, tetraglycidyl (diaminodiphenyl) methane, and the tetrafunctional amine, diaminodiphenyl sulfone. Intermolecular effective ether cross-links, amine junction points, and extent of reaction of the amine and epoxy are measured for the polymerization. Chemical reactions in the epoxy-amine system are discussed, and the reactivity ratio of the epoxy-amine system is calculated. Junction point measurements are made by the use of the dipolar dephasing relaxation experiment. The experimental data collected with C-13 NMR are then compared with the calculated data from a model developed in this laboratory. The information obtained in this study is sufficient to calculate the molecular weight between cross-links.

  15. National information network and database system of hazardous waste management in China

    SciTech Connect (OSTI)

    Ma Hongchang

    1996-12-31

    Industries in China generate large volumes of hazardous waste, which makes it essential for the nation to pay more attention to hazardous waste management. National laws and regulations, waste surveys, and manifest tracking and permission systems have been initiated. Some centralized hazardous waste disposal facilities are under construction. China`s National Environmental Protection Agency (NEPA) has also obtained valuable information on hazardous waste management from developed countries. To effectively share this information with local environmental protection bureaus, NEPA developed a national information network and database system for hazardous waste management. This information network will have such functions as information collection, inquiry, and connection. The long-term objective is to establish and develop a national and local hazardous waste management information network. This network will significantly help decision makers and researchers because it will be easy to obtain information (e.g., experiences of developed countries in hazardous waste management) to enhance hazardous waste management in China. The information network consists of five parts: technology consulting, import-export management, regulation inquiry, waste survey, and literature inquiry.

  16. A High Performance Computing Network and System Simulator for the Power Grid: NGNS^2

    SciTech Connect (OSTI)

    Villa, Oreste; Tumeo, Antonino; Ciraci, Selim; Daily, Jeffrey A.; Fuller, Jason C.

    2012-11-11

    Designing and planing next generation power grid sys- tems composed of large power distribution networks, monitoring and control networks, autonomous generators and consumers of power requires advanced simulation infrastructures. The objective is to predict and analyze in time the behavior of networks of systems for unexpected events such as loss of connectivity, malicious attacks and power loss scenarios. This ultimately allows one to answer questions such as: What could happen to the power grid if .... We want to be able to answer as many questions as possible in the shortest possible time for the largest possible systems. In this paper we present a new High Performance Computing (HPC) oriented simulation infrastructure named Next Generation Network and System Simulator (NGNS2 ). NGNS2 allows for the distribution of a single simulation among multiple computing elements by using MPI and OpenMP threads. NGNS2 provides extensive configuration, fault tolerant and load balancing capabilities needed to simulate large and dynamic systems for long periods of time. We show the preliminary results of the simulator running approximately two million simulated entities both on a 64-node commodity Infiniband cluster and a 48-core SMP workstation.

  17. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    SciTech Connect (OSTI)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  18. Networked alpha and gamma spectral acquisition and analysis system

    SciTech Connect (OSTI)

    Wilcox, C.M.; Gross, J.M.

    1993-10-01

    This manual assumes a knowledge of (terminology used and a working familiarity with) the windowing system and mouse of the Sun computer workstation. See the appropriate Sun manuals for additional information. ALDO, the alpha detector control program, is used to control, monitor, and edit log information associated with the collection of alpha spectra. Actual data collection and control functions are performed by Mizar Real-Time computers for which ALDO acts as a friendly user command interface and status display. It is normally started as part of your login procedure, but may also be started from the ``NETSPEC Utilities`` submenu of the root menu. The root menu is obtained by pushing the right mouse button when the cursor is over the root window (background picture). To become a user of ALDO and the other programs in the NETSPEC system, contact the person who performs systems administration tasks for the Sun computers. Most user interaction with ALDO is by means of mouse manipulation of screen items such as buttons, checkboxes, and sliders. The action of pushing the left mouse button when the cursor is over an item is called selecting that item. The left mouse button is therefore called the select button. The right mouse button is the menu button because a limited number of options may be displayed when that button is pressed when the cursor is over an item with a triangle (inverted delta). In this document, names of selectable items are printed in bold when they are first mentioned or when emphasis is helpful. In general, items which do not apply to the current context are either disabled or made invisible in order to prevent selection.

  19. Fault-tolerant battery system employing intra-battery network architecture

    DOE Patents [OSTI]

    Hagen, Ronald A.; Chen, Kenneth W.; Comte, Christophe; Knudson, Orlin B.; Rouillard, Jean

    2000-01-01

    A distributed energy storing system employing a communications network is disclosed. A distributed battery system includes a number of energy storing modules, each of which includes a processor and communications interface. In a network mode of operation, a battery computer communicates with each of the module processors over an intra-battery network and cooperates with individual module processors to coordinate module monitoring and control operations. The battery computer monitors a number of battery and module conditions, including the potential and current state of the battery and individual modules, and the conditions of the battery's thermal management system. An over-discharge protection system, equalization adjustment system, and communications system are also controlled by the battery computer. The battery computer logs and reports various status data on battery level conditions which may be reported to a separate system platform computer. A module transitions to a stand-alone mode of operation if the module detects an absence of communication connectivity with the battery computer. A module which operates in a stand-alone mode performs various monitoring and control functions locally within the module to ensure safe and continued operation.

  20. Intelligent Control via Wireless Sensor Networks for Advanced Coal Combustion Systems

    SciTech Connect (OSTI)

    Aman Behal; Sunil Kumar; Goodarz Ahmadi

    2007-08-05

    Numerical Modeling of Solid Gas Flow, System Identification for purposes of modeling and control, and Wireless Sensor and Actor Network design were pursued as part of this project. Time series input-output data was obtained from NETL's Morgantown CFB facility courtesy of Dr. Lawrence Shadle. It was run through a nonlinear kernel estimator and nonparametric models were obtained for the system. Linear and first-order nonlinear kernels were then utilized to obtain a state-space description of the system. Neural networks were trained that performed better at capturing the plant dynamics. It is possible to use these networks to find a plant model and the inversion of this model can be used to control the system. These models allow one to compare with physics based models whose parameters can then be determined by comparing them against the available data based model. On a parallel track, Dr. Kumar designed an energy-efficient and reliable transport protocol for wireless sensor and actor networks, where the sensors could be different types of wireless sensors used in CFB based coal combustion systems and actors are more powerful wireless nodes to set up a communication network while avoiding the data congestion. Dr. Ahmadi's group studied gas solid flow in a duct. It was seen that particle concentration clearly shows a preferential distribution. The particles strongly interact with the turbulence eddies and are concentrated in narrow bands that are evolving with time. It is believed that observed preferential concentration is due to the fact that these particles are flung out of eddies by centrifugal force.

  1. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  2. GRAIL: A multi-agent neural network system for gene identification

    SciTech Connect (OSTI)

    Xu, Y.; Mural, R.J.; Einstein, J.R.; Shah, M.B.; Uberbacher, E.C.

    1996-10-01

    Identifying genes within large regions of uncharacterized DNA is a difficult undertaking and is currently the focus of many research efforts. The authors describe a gene localization and modeling system, called GRAIL. GRAIL is a multiple sensor-neural network-based system. It localizes genes in anonymous DNA sequence by recognizing features related to protein-coding regions and the boundaries of coding regions, and then combines the recognized features using a neural network system. Localized coding regions are then optimally parsed into a gene model. Through years of extensive testing, GRAIL consistently localizes about 90% of coding portions of test genes with a false positive rate of about 10%. A number of genes for major genetic diseases have been located through the use of GRAIL, and over 1,000 research laboratories worldwide use GRAIL on regular bases for localization of genes on their newly sequenced DNA.

  3. Networked MS Windows 3.1 based Classified Document Control System (CDOCS)

    SciTech Connect (OSTI)

    Desonier, L.M.

    1993-07-01

    Current classified document management systems require a tremendous amount of space and extensive manpower to account for, inventory, and protect the documents. Comprehensive analysis of current control and accountability procedures reveal the main problem is the actual handling of the paper itself. The purpose of the Networked Microsoft Windows 3.1 based Classified Document Control System (CDOCS) is to eliminate the paper by scanning and storing images of pages on a personal computer using {open_quotes}write once read mostly{close_quotes} (WORM) high density optical media. By saving images on the computer, not only can manpower and space requirements be reduced, but the chance of compromise is diminished. As an added benefit, the information is now more readily available to the authorized user and is provided to the user at the user`s PC. The network target for CDOCS is Microsoft Windows for Workgroups. Thus, the system is also readily applicable to unclassified document imaging uses.

  4. Foreign Affairs Information System (FAIS) Early Operational Capability (EOC) network security criteria

    SciTech Connect (OSTI)

    Not Available

    1988-09-12

    The Joint Center for Information Security Technology (JCIST) at Oak Ridge, Tennessee, under an interagency agreement between the Department of State (DOS) and the Department of Energy (DOE), has been tasked with the security certification testing of the Foreign Affairs Information system (FAIS) Early Operational Capability (EOC) software. The basis for this certification is the FAIS (EOC) Security Requirements Allocation (SRA) document. This document defines the security requirements for the FAIS EOC software. Security certification of the FAIS system is the responsibility of the Office of Information Systems Security, Bureau of Diplomatic Security (DS/ST/ISS). The overall FAIS EOC certification will be completed in two general steps. First, a test of a stand-alone FAIS EOC system against the SRA requirements which is currently in progress. Second is a test of all FAIS network system interfaces against the SRA requirements as expanded to adequately address the network security issues. This accumulation of requirements is referred to as the FAIS EOC Network Security Criteria. 5 refs.

  5. System and method for knowledge based matching of users in a network

    DOE Patents [OSTI]

    Verspoor, Cornelia Maria; Sims, Benjamin Hayden; Ambrosiano, John Joseph; Cleland, Timothy James

    2011-04-26

    A knowledge-based system and methods to matchmaking and social network extension are disclosed. The system is configured to allow users to specify knowledge profiles, which are collections of concepts that indicate a certain topic or area of interest selected from an. The system utilizes the knowledge model as the semantic space within which to compare similarities in user interests. The knowledge model is hierarchical so that indications of interest in specific concepts automatically imply interest in more general concept. Similarity measures between profiles may then be calculated based on suitable distance formulas within this space.

  6. Photovoltaic and other remote-site power generation systems for the Papua New Guinea Telecommunications network

    SciTech Connect (OSTI)

    Olden, A.H.

    1983-10-01

    Over the past six years the Papua New Guinea Telecommunications network has expanded considerably necessitating the requirements for high reliability power supplies for mountain top repeater sites and small capacity telephone exchange terminals in remote locations. Photovoltaic (solar) power systems are considered the most suited for these applications. Furthermore, new microwave systems and large trunk VHF systems are now being installed. This paper discusses these photovoltaic power supplies in detail with respect to their design, technical composition, configuration with reference to performance and installation requirements.

  7. Enerlogics Networks | Open Energy Information

    Open Energy Info (EERE)

    Networks Name: Enerlogics Networks Place: Pittsburgh, Pennsylvania Product: buidling automation control systems to utility software solutions to telecommunication systems...

  8. Optimizing parameters for predicting the geochemical behavior and performance of discrete fracture networks in geothermal systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Optimizing parameters for predicting the geochemical behavior and performance of discrete fracture networks in geothermal systems Alexandra Hakala (National Energy Technology Laboratory) Track 1 Project Officer: Lauren Boyd Total Project Funding: $995,718 April 25, 2013 This presentation does not contain any proprietary confidential, or otherwise restricted information. 2 | US DOE Geothermal Office eere.energy.gov Relevance/Impact of Research * Fractures - primary pathway for geothermal heat

  9. Gen Purpose 1-D Finite Element Network Fluid Flow Heat Transfer System Simulator

    Energy Science and Technology Software Center (OSTI)

    1993-08-02

    SAFSIM (System Analysis Flow Simulator) is a FORTRAN computer program to simulate the integrated performance of systems involving fluid mechanics, heat transfer, and reactor dynamics. SAFSIM provides sufficient versatility to allow the engineering simulation of almost any system, from a backyard sprinkler system to a clustered nuclear reactor propulsion system. In addition to versatility, speed and robustness are primary SAFSIM development goals. SAFSIM contains three basic physics modules: (1) a one-dimensional finite element fluid mechanicsmore » module with multiple flow network capability; (2) a one-dimensional finite element structure heat transfer module with multiple convection and radiation exchange capability; and (3) a point reactor dynamics module with reactivity feedback and decay heat capability. SAFSIM can be used for compressible and incompressible, single-phase, multicomponent flow systems.« less

  10. The Waveform Correlation Event Detection System project, Phase II: Testing with the IDC primary network

    SciTech Connect (OSTI)

    Young, C.J.; Beiriger, J.I.; Moore, S.G.

    1998-04-01

    Further improvements to the Waveform Correlation Event Detection System (WCEDS) developed by Sandia Laboratory have made it possible to test the system on the accepted Comprehensive Test Ban Treaty (CTBT) seismic monitoring network. For our test interval we selected a 24-hour period from December 1996, and chose to use the Reviewed Event Bulletin (REB) produced by the Prototype International Data Center (PIDC) as ground truth for evaluating the results. The network is heterogeneous, consisting of array and three-component sites, and as a result requires more flexible waveform processing algorithms than were available in the first version of the system. For simplicity and superior performance, we opted to use the spatial coherency algorithm of Wagner and Owens (1996) for both types of sites. Preliminary tests indicated that the existing version of WCEDS, which ignored directional information, could not achieve satisfactory detection or location performance for many of the smaller events in the REB, particularly those in the south Pacific where the network coverage is unusually sparse. To achieve an acceptable level of performance, we made modifications to include directional consistency checks for the correlations, making the regions of high correlation much less ambiguous. These checks require the production of continuous azimuth and slowness streams for each station, which is accomplished by means of FK processing for the arrays and power polarization processing for the three-component sites. In addition, we added the capability to use multiple frequency-banded data streams for each site to increase sensitivity to phases whose frequency content changes as a function of distance.

  11. A probablistic neural network classification system for signal and image processing

    SciTech Connect (OSTI)

    Bowman, B.

    1994-11-15

    The Acoustical Heart Valve Analysis Package is a system for signal and image processing and classification. It is being developed in both Matlab and C, to provide an interactive, interpreted environment, and has been optimized for large scale matrix operations. It has been used successfully to classify acoustic signals from implanted prosthetic heart valves in human patients, and will be integrated into a commercial Heart Valve Screening Center. The system uses several standard signal processing algorithms, as well as supervised learning techniques using the probabilistic neural network (PNN). Although currently used for the acoustic heart valve application, the algorithms and modular design allow it to be used for other applications, as well. We will describe the signal classification system, and show results from a set of test valves.

  12. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  13. Method of and system for determining locations of sources of harmonics in a power distribution network

    SciTech Connect (OSTI)

    Hayes, R.M.; Kirkpatrick, T.L.; Lauletta, J.L.; Shuter, T.C.; Vollkommer, H.T. Jr.

    1987-05-19

    A system is described for determining directions of locations of sources of power harmonics relative to a node interconnecting n branches of a power distribution network, where n is an integer greater than or equal to 2, comprising: voltage transducer means for monitoring voltage waveforms in at least (n-1) of the n branches; current transducer means for monitoring current waveforms in at least (n-1) branches; means for sampling the current and voltage waveforms to obtain analog current and voltage waveform samples; A/D converter means for digitizing the analog waveform samples; and spectrum analyzer means for resolving the digitized samples into their respective harmonic components.

  14. Demonstration Assessment of Light Emitting Diode (LED) Walkway Lighting at the Federal Aviation Administration William J. Hughes Technical Center, in Atlantic City, New Jersey

    SciTech Connect (OSTI)

    Kinzey, Bruce R.; Myer, Michael

    2008-03-18

    This report documents the results of a collaborative project to demonstrate a solid state lighting (SSL) general illumination product in an outdoor area walkway application. In the project, six light-emitting diode (LED) luminaires were installed to replace six existing high pressure sodium (HPS) luminaires mounted on 14-foot poles on a set of exterior walkways and stairs at the Federal Aviation Administration (FAA) William J. Hughes Technical Center in Atlantic City, New Jersey, during December, 2007. The effort was a U.S. Department of Energy (DOE) SSL Technology Gateway Demonstration that involved a collaborative teaming agreement between DOE, FAA and Ruud Lighting (and their wholly owned division, Beta LED). Pre- and post-installation power and illumination measurements were taken and used in calculations of energy savings and related economic payback, while personnel impacted by the new lights were provided questionnaires to gauge their perceptions and feedback. The SSL product demonstrated energy savings of over 25% while maintaining illuminance levels and improving illuminance uniformity. PNNL's economic analysis yielded a variety of potential payback results depending on the assumptions used. In the best case, replacing HPS with the LED luminaire can yield a payback as low as 3 years. The new lamps were quite popular with the affected personnel, who gave the lighting an average score of 4.46 out of 5 for improvement.

  15. User guide for transferring data from NOS (Network Operating System) to Applicon Graphics System

    SciTech Connect (OSTI)

    Young, E. G.; Grube, L. K.

    1980-08-01

    This document is a guide for obtaining data from Sandia Central Computing site that are to be introduced into a drawing file on Applicon Graphics Systems. 1 figure.

  16. Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Maps Engineering Services The Network Network Maps Network Traffic Volume Historical Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet...

  17. Combined expert system/neural networks method for process fault diagnosis

    DOE Patents [OSTI]

    Reifman, Jaques; Wei, Thomas Y. C.

    1995-01-01

    A two-level hierarchical approach for process fault diagnosis is an operating system employs a function-oriented approach at a first level and a component characteristic-oriented approach at a second level, where the decision-making procedure is structured in order of decreasing intelligence with increasing precision. At the first level, the diagnostic method is general and has knowledge of the overall process including a wide variety of plant transients and the functional behavior of the process components. An expert system classifies malfunctions by function to narrow the diagnostic focus to a particular set of possible faulty components that could be responsible for the detected functional misbehavior of the operating system. At the second level, the diagnostic method limits its scope to component malfunctions, using more detailed knowledge of component characteristics. Trained artificial neural networks are used to further narrow the diagnosis and to uniquely identify the faulty component by classifying the abnormal condition data as a failure of one of the hypothesized components through component characteristics. Once an anomaly is detected, the hierarchical structure is used to successively narrow the diagnostic focus from a function misbehavior, i.e., a function oriented approach, until the fault can be determined, i.e., a component characteristic-oriented approach.

  18. Combined expert system/neural networks method for process fault diagnosis

    DOE Patents [OSTI]

    Reifman, J.; Wei, T.Y.C.

    1995-08-15

    A two-level hierarchical approach for process fault diagnosis of an operating system employs a function-oriented approach at a first level and a component characteristic-oriented approach at a second level, where the decision-making procedure is structured in order of decreasing intelligence with increasing precision. At the first level, the diagnostic method is general and has knowledge of the overall process including a wide variety of plant transients and the functional behavior of the process components. An expert system classifies malfunctions by function to narrow the diagnostic focus to a particular set of possible faulty components that could be responsible for the detected functional misbehavior of the operating system. At the second level, the diagnostic method limits its scope to component malfunctions, using more detailed knowledge of component characteristics. Trained artificial neural networks are used to further narrow the diagnosis and to uniquely identify the faulty component by classifying the abnormal condition data as a failure of one of the hypothesized components through component characteristics. Once an anomaly is detected, the hierarchical structure is used to successively narrow the diagnostic focus from a function misbehavior, i.e., a function oriented approach, until the fault can be determined, i.e., a component characteristic-oriented approach. 9 figs.

  19. LANAI HIGH-DENSITY IRRADIANCE SENSOR NETWORK FOR CHARACTERIZING SOLAR RESOURCE VARIABILITY OF MW-SCALE PV SYSTEM

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANAI HIGH-DENSITY IRRADIANCE SENSOR NETWORK FOR CHARACTERIZING SOLAR RESOURCE VARIABILITY OF MW-SCALE PV SYSTEM Scott Kuszamaul 1 , Abraham Ellis 1 , Joshua Stein 1 , and Lars Johnson 2 1 Sandia National Laboratories, Albuquerque, NM, USA 2 SunPower Corporation, Richmond, CA, USA ABSTRACT Sandia National Laboratories (Sandia) and SunPower Corporation (SunPower) have completed design and deployment of an autonomous irradiance monitoring system based on wireless mesh communications and a battery

  20. Network design optimization of fuel cell systems and distributed energy devices.

    SciTech Connect (OSTI)

    Colella, Whitney G.

    2010-07-01

    This research explores the thermodynamics, economics, and environmental impacts of innovative, stationary, polygenerative fuel cell systems (FCSs). Each main report section is split into four subsections. The first subsection, 'Potential Greenhouse Gas (GHG) Impact of Stationary FCSs,' quantifies the degree to which GHG emissions can be reduced at a U.S. regional level with the implementation of different FCS designs. The second subsection, 'Optimizing the Design of Combined Heat and Power (CHP) FCSs,' discusses energy network optimization models that evaluate novel strategies for operating CHP FCSs so as to minimize (1) electricity and heating costs for building owners and (2) emissions of the primary GHG - carbon dioxide (CO{sub 2}). The third subsection, 'Optimizing the Design of Combined Cooling, Heating, and Electric Power (CCHP) FCSs,' is similar to the second subsection but is expanded to include capturing FCS heat with absorptive cooling cycles to produce cooling energy. The fourth subsection, - Thermodynamic and Chemical Engineering Models of CCHP FCSs,' discusses the physics and thermodynamic limits of CCHP FCSs.

  1. Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.

    SciTech Connect (OSTI)

    Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

    2011-09-01

    This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

  2. Method and system for conserving power in a telecommunications network during emergency situations

    DOE Patents [OSTI]

    Conrad, Stephen H. (Algodones, NM); O'Reilly, Gerard P. (Manalapan, NJ)

    2011-10-11

    Disclosed is a method and apparatus for conserving power in a telecommunications network during emergency situations. A permissible number list of emergency and/or priority numbers is stored in the telecommunications network. In the event of an emergency or power failure, input digits of a call to the telecommunications network are compared to the permissible number list. The call is processed in the telecommunications network and routed to its destination if the input digits match an entry in the permissible number list. The call is dropped without any further processing if the input digits do not match an entry in the permissible number list. Thus, power can be conserved in emergency situations by only allowing emergency and/or priority calls.

  3. Systems and methods for creation of conducting networks of magnetic particles through dynamic self-assembly process

    DOE Patents [OSTI]

    Snezhko, Oleksiy; Aronson, Igor; Kwok, Wai-Kwong

    2011-01-25

    Self-assembly of magnetic microparticles in AC magnetic fields. Excitation of the system by an AC magnetic field provides a variety of patterns that can be controlled by adjusting the frequency and the amplitude of the field. At low particle densities the low-frequency magnetic excitation favors cluster phase formation, while high frequency excitation favors chains and netlike structures. For denser configurations, an abrupt transition to the network phase was obtained.

  4. Co-scheduling of network resource provisioning and host-to-host bandwidth reservation on high-performance network and storage systems

    DOE Patents [OSTI]

    Yu, Dantong; Katramatos, Dimitrios; Sim, Alexander; Shoshani, Arie

    2014-04-22

    A cross-domain network resource reservation scheduler configured to schedule a path from at least one end-site includes a management plane device configured to monitor and provide information representing at least one of functionality, performance, faults, and fault recovery associated with a network resource; a control plane device configured to at least one of schedule the network resource, provision local area network quality of service, provision local area network bandwidth, and provision wide area network bandwidth; and a service plane device configured to interface with the control plane device to reserve the network resource based on a reservation request and the information from the management plane device. Corresponding methods and computer-readable medium are also disclosed.

  5. Sustainable Energy Solutions Task 1.0: Networked Monitoring and Control of Small Interconnected Wind Energy Systems

    SciTech Connect (OSTI)

    Janet.twomey@wichita.edu

    2010-04-30

    EXECUTIVE SUMARRY This report presents accomplishments, results, and future work for one task of five in the Wichita State University Sustainable Energy Solutions Project: To develop a scale model laboratory distribution system for research into questions that arise from networked control and monitoring of low-wind energy systems connected to the AC distribution system. The lab models developed under this task are located in the Electric Power Quality Lab in the Engineering Research Building on the Wichita State University campus. The lab system consists of four parts: 1. A doubly-fed induction generator 2. A wind turbine emulator 3. A solar photovoltaic emulator, with battery energy storage 4. Distribution transformers, lines, and other components, and wireless and wired communications and control These lab elements will be interconnected and will function together to form a complete testbed for distributed resource monitoring and control strategies and smart grid applications testing. Development of the lab system will continue beyond this project.

  6. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Yearly Network Traffic HPSS Yearly Network Traffic Yearly Summary of I/O Traffic Between Storage and Network Destinations These bar charts show the total transfer traffic for each year between storage and network destinations (systems within and outside of NERSC). Traffic for the current year is an estimate derived by scaling the known months traffic up to 12 months. The years shown are calendar years. The first graph shows the overall growth in network traffic to storage over the years.

  7. Network II Database

    Energy Science and Technology Software Center (OSTI)

    1994-11-07

    The Oak Ridge National Laboratory (ORNL) Rail and Barge Network II Database is a representation of the rail and barge system of the United States. The network is derived from the Federal Rail Administration (FRA) rail database.

  8. A neural network system for prediction of RNA polymerase II promoters

    SciTech Connect (OSTI)

    Matis, S.; Shah, M.; Mural, R.; Uberbacher, E.

    1994-12-31

    One of the most difficult problems in the analysis of eucaryotic genes is the detection of RNA polymerase II promoter regions. Although promoter regions vary in the primary DNA sequence, a basic group of core promoter elements has been suggested in the literature. Many human promoter sequences contain a TATAA sequence element at approximately 30 bases upstream of the cap site (transcription start site). Other elements are the GC box which binds SPA and upregulates transcription, the CAAT box, and the ATG initiator codon. To characterize promoters, we constructed frequency matrices for each element using experimentally mapped human promoter regions. Additionally, we constructed histograms for the distances separating the various elements. We then used a neural network to combine these informational elements. The output of the neural network is then processed using a set of expert rules which depend on GRAIL`s ability to find exons in anonymous DNA. This improves the selectivity of promoter detection and reduces the false positive rate.

  9. FNCS: A Framework for Power System and Communication Networks Co-Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Fuller, Jason C.; Fisher, Andrew R.; Marinovici, Laurentiu D.; Agarwal, Khushbu

    2014-04-13

    This paper describes the Fenix framework that uses a federated approach for integrating power grid and communication network simulators. Compared existing approaches, Fenix al- lows co-simulation of both transmission and distribution level power grid simulators with the communication network sim- ulator. To reduce the performance overhead of time synchro- nization, Fenix utilizes optimistic synchronization strategies that make speculative decisions about when the simulators are going to exchange messages. GridLAB-D (a distribution simulator), PowerFlow (a transmission simulator), and ns-3 (a telecommunication simulator) are integrated with the frame- work and are used to illustrate the enhanced performance pro- vided by speculative multi-threading on a smart grid applica- tion. Our speculative multi-threading approach achieved on average 20% improvement over the existing synchronization methods

  10. Neural network system and methods for analysis of organic materials and structures using spectral data

    DOE Patents [OSTI]

    Meyer, B.J.; Sellers, J.P.; Thomsen, J.U.

    1993-06-08

    Apparatus and processes are described for recognizing and identifying materials. Characteristic spectra are obtained for the materials via spectroscopy techniques including nuclear magnetic resonance spectroscopy, infrared absorption analysis, x-ray analysis, mass spectroscopy and gas chromatography. Desired portions of the spectra may be selected and then placed in proper form and format for presentation to a number of input layer neurons in an offline neural network. The network is first trained according to a predetermined training process; it may then be employed to identify particular materials. Such apparatus and processes are particularly useful for recognizing and identifying organic compounds such as complex carbohydrates, whose spectra conventionally require a high level of training and many hours of hard work to identify, and are frequently indistinguishable from one another by human interpretation.

  11. Neural network system and methods for analysis of organic materials and structures using spectral data

    DOE Patents [OSTI]

    Meyer, Bernd J.; Sellers, Jeffrey P.; Thomsen, Jan U.

    1993-01-01

    Apparatus and processes for recognizing and identifying materials. Characteristic spectra are obtained for the materials via spectroscopy techniques including nuclear magnetic resonance spectroscopy, infrared absorption analysis, x-ray analysis, mass spectroscopy and gas chromatography. Desired portions of the spectra may be selected and then placed in proper form and format for presentation to a number of input layer neurons in an offline neural network. The network is first trained according to a predetermined training process; it may then be employed to identify particular materials. Such apparatus and processes are particularly useful for recognizing and identifying organic compounds such as complex carbohydrates, whose spectra conventionally require a high level of training and many hours of hard work to identify, and are frequently indistinguishable from one another by human interpretation.

  12. Sentient networks

    SciTech Connect (OSTI)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  13. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  14. Lanai high-density irradiance sensor network for characterizing solar resource variability of MW-scale PV system.

    SciTech Connect (OSTI)

    Stein, Joshua S.; Johnson, Lars; Ellis, Abraham; Kuszmaul, Scott S.

    2012-01-01

    Sandia National Laboratories (Sandia) and SunPower Corporation (SunPower) have completed design and deployment of an autonomous irradiance monitoring system based on wireless mesh communications and a battery operated data acquisition system. The Lanai High-Density Irradiance Sensor Network is comprised of 24 LI-COR{reg_sign} irradiance sensors (silicon pyranometers) polled by 19 RF Radios. The system was implemented with commercially available hardware and custom developed LabVIEW applications. The network of solar irradiance sensors was installed in January 2010 around the periphery and within the 1.2 MW ac La Ola PV plant on the island of Lanai, Hawaii. Data acquired at 1 second intervals is transmitted over wireless links to be time-stamped and recorded on SunPower data servers at the site for later analysis. The intent is to study power and solar resource data sets to correlate the movement of cloud shadows across the PV array and its effect on power output of the PV plant. The irradiance data sets recorded will be used to study the shape, size and velocity of cloud shadows. This data, along with time-correlated PV array output data, will support the development and validation of a PV performance model that can predict the short-term output characteristics (ramp rates) of PV systems of different sizes and designs. This analysis could also be used by the La Ola system operator to predict power ramp events and support the function of the future battery system. This experience could be used to validate short-term output forecasting methodologies.

  15. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    SciTech Connect (OSTI)

    1998-05-01

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  16. Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks

    DOE Patents [OSTI]

    Goranson, Craig A.; Burnette, John R.; Greitzer, Frank L.; McMillan, Bryan H.

    2013-10-15

    A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data stream is interrogated to determine the presence of predetermined characteristics associated with at least one of the portions of data within the data stream. At least one of the portions of data is then characterized, based upon the portion of data exhibiting a predetermined combination of characteristics, wherein the predetermined combination of characteristics is related to the sensitivity of the portion of data. The portions of the data stream are then distributed into a plurality of different channels, each of the channels associated with different level of sensitivity.

  17. Network Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistics Network Activity Network Activity PDSF Network Uplinks to NERSC (dual 10 Gbps) NERSC Uplink to ESnet Last edited: 2011-03-31 22:20:59...

  18. System and method for merging clusters of wireless nodes in a wireless network

    DOE Patents [OSTI]

    Budampati, Ramakrishna S.; Gonia, Patrick S.; Kolavennu, Soumitri N.; Mahasenan, Arun V.

    2012-05-29

    A system includes a first cluster having multiple first wireless nodes. One first node is configured to act as a first cluster master, and other first nodes are configured to receive time synchronization information provided by the first cluster master. The system also includes a second cluster having one or more second wireless nodes. One second node is configured to act as a second cluster master, and any other second nodes configured to receive time synchronization information provided by the second cluster master. The system further includes a manager configured to merge the clusters into a combined cluster. One of the nodes is configured to act as a single cluster master for the combined cluster, and the other nodes are configured to receive time synchronization information provided by the single cluster master.

  19. Methods, systems, and computer program products for network firewall policy optimization

    DOE Patents [OSTI]

    Fulp, Errin W.; Tarsa, Stephen J.

    2011-10-18

    Methods, systems, and computer program products for firewall policy optimization are disclosed. According to one method, a firewall policy including an ordered list of firewall rules is defined. For each rule, a probability indicating a likelihood of receiving a packet matching the rule is determined. The rules are sorted in order of non-increasing probability in a manner that preserves the firewall policy.

  20. From systems biology to photosynthesis and whole-plant modeling: a conceptual model for integrating multi-scale networks

    SciTech Connect (OSTI)

    Weston, David; Hanson, Paul J; Norby, Richard J; Tuskan, Gerald A; Wullschleger, Stan D

    2012-01-01

    Network analysis is now a common statistical tool for molecular biologists. Network algorithms are readily used to model gene, protein and metabolic correlations providing insight into pathways driving biological phenomenon. One output from such an analysis is a candidate gene list that can be responsible, in part, for the biological process of interest. The question remains, however, as to whether molecular network analysis can be used to inform process models at higher levels of biological organization. In our previous work, transcriptional networks derived from three plant species were constructed, interrogated for orthology and then correlated to photosynthetic inhibition at elevated temperature. One unique aspect of that study was the link from co-expression networks to net photosynthesis. In this addendum, we propose a conceptual model where traditional network analysis can be linked to whole-plant models thereby informing predictions on key processes such as photosynthesis, nutrient uptake and assimilation, and C partitioning.

  1. Method, systems, and computer program products for implementing function-parallel network firewall

    DOE Patents [OSTI]

    Fulp, Errin W.; Farley, Ryan J.

    2011-10-11

    Methods, systems, and computer program products for providing function-parallel firewalls are disclosed. According to one aspect, a function-parallel firewall includes a first firewall node for filtering received packets using a first portion of a rule set including a plurality of rules. The first portion includes less than all of the rules in the rule set. At least one second firewall node filters packets using a second portion of the rule set. The second portion includes at least one rule in the rule set that is not present in the first portion. The first and second portions together include all of the rules in the rule set.

  2. Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems

    SciTech Connect (OSTI)

    Stuart Walsh; Shane Cherry; Lyle Roybal

    2009-05-01

    Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

  3. Network and topology for identifying, locating and quantifying physical phenomena, systems and methods for employing same

    DOE Patents [OSTI]

    Richardson, John G.; Moore, Karen A.; Carrington, Robert A.

    2005-05-10

    A method and system for detecting, locating and quantifying a physical phenomena such as strain or a deformation in a structure. A plurality of laterally adjacent conductors may each include a plurality of segments. Each segment is constructed to exhibit a unit value representative of a defined energy transmission characteristic. A plurality of identity groups are defined with each identity group comprising a plurality of segments including at least one segment from each of the plurality of conductors. The segments contained within an identity group are configured and arranged such that each of their associated unit values may be represented by a concatenated digit string which is a unique number relative to the other identity groups. Additionally, the unit values of the segments within an identity group maintain unique ratios with respect to the other unit values in the identity group.

  4. Neuro-fuzzy controller of low head hydropower plants using adaptive-network based fuzzy inference system

    SciTech Connect (OSTI)

    Djukanovic, M.B.; Calovic, M.S.; Vesovic, B.V.; Sobajic, D.J.

    1997-12-01

    This paper presents an attempt of nonlinear, multivariable control of low-head hydropower plants, by using adaptive-network based fuzzy inference system (ANFIS). The new design technique enhances fuzzy controllers with self-learning capability for achieving prescribed control objectives in a near optimal manner. The controller has flexibility for accepting more sensory information, with the main goal to improve the generator unit transients, by adjusting the exciter input, the wicket gate and runner blade positions. The developed ANFIS controller whose control signals are adjusted by using incomplete on-line measurements, can offer better damping effects to generator oscillations over a wide range of operating conditions, than conventional controllers. Digital simulations of hydropower plant equipped with low-head Kaplan turbine are performed and the comparisons of conventional excitation-governor control, state-feedback optimal control and ANFIS based output feedback control are presented. To demonstrate the effectiveness of the proposed control scheme and the robustness of the acquired neuro-fuzzy controller, the controller has been implemented on a complex high-order non-linear hydrogenerator model.

  5. The Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Engineering Services The Network Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net The Network A Nationwide Platform for Science Discovery The

  6. Software Defined Networking (SDN) Project

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Software Defined Networking (SDN) Project Energy sector-focused SDN flow controller to manage control system networks centrally and securely Background Traditional information technology (IT) approaches to network administration and packet delivery are not always appropriate for electric industry applications. The nondeterministic latency and configuration complexity make network design difficult for the deterministic, static control systems of the energy sector. In the electric industry, it is

  7. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  8. Network resilience; A measure of network fault tolerance

    SciTech Connect (OSTI)

    Najjar, W. . Dept. of Computer Science); Gaudoit, J.L. . Dept. of Electrical Engineering)

    1990-02-01

    The failure of a node in a multicomputer system will not only reduce the computational power but also alter the network's topology. Network fault tolerance is a measure of the number of failures the network can sustain before a disconnection occurs. It is expressed traditionally as the network's node degree. In this paper, the authors propose a probabilistic measure of network fault tolerance expressed as the probability f a disconnection. Qualitative evaluation of this measure is presented. As expected, the single-node disconnection probability is the dominant factor irrespective of the topology under consideration. They derive an analytical approximation of the disconnection probability and verify it with Monte Carlo simulation. Based on this model, the measures of network resilience and relative network resilience are proposed as probabilistic measures of network fault tolerance. These are then used to evaluate the effects of the disconnection probability on the reliability of the system.

  9. Message from Hugh Montgomery: Assistant Director | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with resource management and to support the Deputy Director for Science & Technology with strategic planning efforts. Allison will continue to treat her role as Deputy Project...

  10. Cosmology at the Beach Lecture: David Hughes

    ScienceCinema (OSTI)

    David Hughes

    2010-01-08

    The lecture was delivered as part of the "Cosmology at the Beach" winter school organized by Berkeley Lab's George Smoot in Los Cabos, Mexico from Jan. 12-16, 2009.

  11. 300ºC DDS + 300ºC MWD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    include) Aaron Dick and Jochen Schnitger Baker Hughes Track Name: EE0002782 + EE0005505 ... in granite in April - System testing - Baker Hughes Experimental Test Area (BETA) - ...

  12. Enhanced Geothermal Systems Subprogram Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Baker Hughes Oilfield Operations Inc. Texas Engineering Experiment Station Impact ... NakNek Electric Association ARRA NakNek, Alaska Raft River, ID Source: US Geothermal ...

  13. Network Upgrade for the SLC: PEP II Network

    SciTech Connect (OSTI)

    Crane, M.; Call, M.; Clark, S.; Coffman, F.; Himel, T.; Lahey, T.; Miller, E.; Sass, R.; /SLAC

    2011-09-09

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status information is included.

  14. Nothing But Networking for Residential Network Members

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Peer Exchange Call: Nothing But Networking for Residential Network Members, Call Slides and Discussion Summary, March 12, 2015.

  15. System for routing messages in a vertex symmetric network by using addresses formed from permutations of the transmission line indicees

    DOE Patents [OSTI]

    Faber, Vance; Moore, James W.

    1992-01-01

    A network of interconnected processors is formed from a vertex symmetric graph selected from graphs .GAMMA..sub.d (k) with degree d, diameter k, and (d+1)!/(d-k+1)! processors for each d.gtoreq.k and .GAMMA..sub.d (k,-1) with degree 3-1, diameter k+1, and (d+1)!/(d-k+1)! processors for each d.gtoreq.k.gtoreq.4. Each processor has an address formed by one of the permutations from a predetermined sequence of letters chosen a selected number of letters at a time, and an extended address formed by appending to the address the remaining ones of the predetermined sequence of letters. A plurality of transmission channels is provided from each of the processors, where each processor has one less channel than the selected number of letters forming the sequence. Where a network .GAMMA..sub.d (k,-1) is provided, no processor has a channel connected to form an edge in a direction .delta..sub.1. Each of the channels has an identification number selected from the sequence of letters and connected from a first processor having a first extended address to a second processor having a second address formed from a second extended address defined by moving to the front of the first extended address the letter found in the position within the first extended address defined by the channel identification number. The second address is then formed by selecting the first elements of the second extended address corresponding to the selected number used to form the address permutations.

  16. Energy management system helps container manufacturer contain costs

    SciTech Connect (OSTI)

    Not Available

    1986-04-10

    In the highly competitive cardboard box business, where a penny apiece can mean the difference between getting and losing an order, St. Hart Container Corp., Placentia, CA, has gained a competitive edge by reducing its overhead with an energy management system (EMS). The Orange County firm, a division of Sunclipse, Inc., fabricates boxes to customer specifications from cardboard stock. The company is saving $2000 a month in electricity since it installed a Gereral Electric ECON-S programmable energy management system with telephone override capability late in 1984 to control lighting, air conditioning, and nine large blower and compressor motors. Installed by Hughes Electrical Management Systems (HEMS), City of Industry, CA, the $18,000 system paid for itself in only 9 mo. It initially controlled just 32 points and will be expanded to control the conveyors in the 60,000 sq ft plant. The primary savings, HEMS president Bob Hughes noted, accrue not from controlling lighting, but from automatically limiting the operating time of large blower motors that draw cardboard scrap from six fabrication areas on the shop floor up 2 ft dia funnels into a roof-mounted silo. The scrap is later compacted, baled, and sold for recycling.

  17. Computer System,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    undergraduate summer institute http:isti.lanl.gov (Educational Prog) 2016 Computer System, Cluster, and Networking Summer Institute Purpose The Computer System,...

  18. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S [Richland, WA; TeGrotenhuis, Ward E [Kennewick, WA; Whyatt, Greg A [West Richland, WA

    2010-01-26

    Various aspects and applications or microsystem process networks are described. The design of many types of microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having energetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  19. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S.; TeGrotenhuis, Ward E.; Whyatt, Greg A.

    2006-10-24

    Various aspects and applications of microsystem process networks are described. The design of many types of microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having exergetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  20. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S.; TeGrotenhuis, Ward E.; Whyatt, Greg A.

    2007-09-18

    Various aspects and applications of microsystem process networks are described. The design of many types of Microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having energetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  1. Hydraulic model analysis of water distribution system, Rockwell International, Rocky Flats, Colorado

    SciTech Connect (OSTI)

    Perstein, J.; Castellano, J.A.

    1989-01-20

    Rockwell International requested an analysis of the existing plant site water supply distribution system at Rocky Flats, Colorado, to determine its adequacy. On September 26--29, 1988, Hughes Associates, Inc., Fire Protection Engineers, accompanied by Rocky Flats Fire Department engineers and suppression personnel, conducted water flow tests at the Rocky Flats plant site. Thirty-seven flows from various points throughout the plant site were taken on the existing domestic supply/fire main installation to assure comprehensive and thorough representation of the Rocky Flats water distribution system capability. The analysis was completed in four phases which are described, together with a summary of general conclusions and recommendations.

  2. The importance of input variables to a neural network fault-diagnostic system for nuclear power plants

    SciTech Connect (OSTI)

    Lanc, T.L.

    1992-01-01

    This thesis explores safety enhancement for nuclear power plants. Emergency response systems currently in use depend mainly on automatic systems engaging when certain parameters go beyond a pre-specified safety limit. Often times the operator has little or no opportunity to react since a fast scram signal shuts down the reactor smoothly and efficiently. These accidents are of interest to technical support personnel since examining the conditions that gave rise to these situations help determine causality. In many other cases an automated fault-diagnostic advisor would be a valuable tool in assisting the technicians and operators to determine what just happened and why.

  3. The importance of input variables to a neural network fault-diagnostic system for nuclear power plants

    SciTech Connect (OSTI)

    Lanc, T.L.

    1992-12-31

    This thesis explores safety enhancement for nuclear power plants. Emergency response systems currently in use depend mainly on automatic systems engaging when certain parameters go beyond a pre-specified safety limit. Often times the operator has little or no opportunity to react since a fast scram signal shuts down the reactor smoothly and efficiently. These accidents are of interest to technical support personnel since examining the conditions that gave rise to these situations help determine causality. In many other cases an automated fault-diagnostic advisor would be a valuable tool in assisting the technicians and operators to determine what just happened and why.

  4. Automated Measurement and Signaling Systems for the Transactional...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Measurement and Signaling Systems for the Transactional Network Automated Measurement and Signaling Systems for the Transactional Network The Transactional Network Project is a ...

  5. Modular sensor network node

    DOE Patents [OSTI]

    Davis, Jesse Harper Zehring; Stark, Jr., Douglas Paul; Kershaw, Christopher Patrick; Kyker, Ronald Dean

    2008-06-10

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  6. Towards A Network-of-Networks Framework for Cyber Security

    SciTech Connect (OSTI)

    Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

    2013-06-07

    Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

  7. Launching applications on compute and service processors running under different operating systems in scalable network of processor boards with routers

    DOE Patents [OSTI]

    Tomkins, James L.; Camp, William J.

    2009-03-17

    A multiple processor computing apparatus includes a physical interconnect structure that is flexibly configurable to support selective segregation of classified and unclassified users. The physical interconnect structure also permits easy physical scalability of the computing apparatus. The computing apparatus can include an emulator which permits applications from the same job to be launched on processors that use different operating systems.

  8. Distributed computing for signal processing: modeling of asynchronous parallel computation. Appendix C. Fault-tolerant interconnection networks and image-processing applications for the PASM parallel processing systems. Final report

    SciTech Connect (OSTI)

    Adams, G.B.

    1984-12-01

    The demand for very-high-speed data processing coupled with falling hardware costs has made large-scale parallel and distributed computer systems both desirable and feasible. Two modes of parallel processing are single-instruction stream-multiple data stream (SIMD) and multiple instruction stream - multiple data stream (MIMD). PASM, a partitionable SIMD/MIMD system, is a reconfigurable multimicroprocessor system being designed for image processing and pattern recognition. An important component of these systems is the interconnection network, the mechanism for communication among the computation nodes and memories. Assuring high reliability for such complex systems is a significant task. Thus, a crucial practical aspect of an interconnection network is fault tolerance. In answer to this need, the Extra Stage Cube (ESC), a fault-tolerant, multistage cube-type interconnection network, is defined. The fault tolerance of the ESC is explored for both single and multiple faults, routing tags are defined, and consideration is given to permuting data and partitioning the ESC in the presence of faults. The ESC is compared with other fault-tolerant multistage networks. Finally, reliability of the ESC and an enhanced version of it are investigated.

  9. RNEDE: Resilient Network Design Environment

    SciTech Connect (OSTI)

    Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

    2010-08-01

    Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

  10. Phoebus: Network Middleware for Next-Generation Network Computing

    SciTech Connect (OSTI)

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  11. Network Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Acceptable Use Policy About ESnet Our Mission The Network ESnet History Governance & Policies ESnet Policy Board ESCC Acceptable Use Policy Data Privacy Policy Facility Data Policy Career Opportunities ESnet Staff & Org Chart Contact Us Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net ESnet Acceptable Use Policy The

  12. Historical Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Maps Network Traffic Volume Historical Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Network R&D Software-Defined Networking (SDN) Experimental Network Testbeds Performance (perfSONAR) Software & Tools Development Data for Researchers Partnerships Publications Workshops Science Engagement Move your data Programs & Workshops Science

  13. Nothing But Networking for Residential Network Members | Department...

    Energy Savers [EERE]

    Nothing But Networking for Residential Network Members Nothing But Networking for Residential Network Members Better Buildings Residential Network Peer Exchange Call: Nothing But ...

  14. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Yearly Network Traffic HPSS Yearly Network Traffic Yearly Summary of IO Traffic Between Storage and Network Destinations These bar charts show the total transfer traffic for...

  15. Vihaan Networks Limited VNL | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search Name: Vihaan Networks Limited (VNL) Place: Gurgaon, Haryana, India Zip: 122015 Sector: Solar Product: Developer of solar-powered GSM system for rural...

  16. Broadband Energy Networks Inc | Open Energy Information

    Open Energy Info (EERE)

    Darby, Pennsylvania Zip: 19082 Product: Provides automated equipment and usage monitoring systems for energy management. References: Broadband Energy Networks Inc1 This article...

  17. ASCR Science Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Tierney, Brian

    2009-08-24

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the US Department of Energy Office of Science, the single largest supporter of basic research in the physical sciences in the United States. In support of the Office of Science programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In April 2009 ESnet and the Office of Advanced Scientific Computing Research (ASCR), of the DOE Office of Science, organized a workshop to characterize the networking requirements of the programs funded by ASCR. The ASCR facilities anticipate significant increases in wide area bandwidth utilization, driven largely by the increased capabilities of computational resources and the wide scope of collaboration that is a hallmark of modern science. Many scientists move data sets between facilities for analysis, and in some cases (for example the Earth System Grid and the Open Science Grid), data distribution is an essential component of the use of ASCR facilities by scientists. Due to the projected growth in wide area data transfer needs, the ASCR supercomputer centers all expect to deploy and use 100 Gigabit per second networking technology for wide area connectivity as soon as that deployment is financially feasible. In addition to the network connectivity that ESnet provides, the ESnet Collaboration Services (ECS) are critical to several science communities. ESnet identity and trust services, such as the DOEGrids certificate authority, are widely used both by the supercomputer centers and by collaborations such as Open Science Grid (OSG) and the Earth System Grid (ESG). Ease of use is a key determinant of the scientific utility of network-based services. Therefore, a key enabling aspect for scientists beneficial use of high

  18. System and method for implementing periodic early discard in on-chip buffer memories of network elements

    DOE Patents [OSTI]

    Francini, Andrea

    2013-05-14

    An advance is made over the prior art in accordance with the principles of the present invention that is directed to a new approach for a system and method for a buffer management scheme called Periodic Early Discard (PED). The invention builds on the observation that, in presence of TCP traffic, the length of a queue can be stabilized by selection of an appropriate frequency for packet dropping. For any combination of number of TCP connections and distribution of the respective RTT values, there exists an ideal packet drop frequency that prevents the queue from over-flowing or under-flowing. While the value of the ideal packet drop frequency may quickly change over time and is sensitive to the series of TCP connections affected by past packet losses, and most of all is impossible to compute inline, it is possible to approximate it with a margin of error that allows keeping the queue occupancy within a pre-defined range for extended periods of time. The PED scheme aims at tracking the (unknown) ideal packet drop frequency, adjusting the approximated value based on the evolution of the queue occupancy, with corrections of the approximated packet drop frequency that occur at a timescale that is comparable to the aggregate time constant of the set of TCP connections that traverse the queue.

  19. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  20. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  1. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Coteus, Paul W.; Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2011-08-16

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

  2. NetworkX

    Energy Science and Technology Software Center (OSTI)

    2004-05-17

    NetworkX (abbreviated NX in the software and documentation) is a package for studying network structure using graph theory.

  3. Functional Ecological Gene Networks to Reveal the Changes Among...

    Office of Scientific and Technical Information (OSTI)

    indicating the potential importance of network interactions in ecosystem functioning. ... aremore fundamentally important for research in microbial ecology, systems ...

  4. Networks in Buildings: Which Path Forward?

    SciTech Connect (OSTI)

    Nordman, Bruce

    2008-08-17

    To date, digital networks have principally been installed for connecting information technology devices, with more modest use in consumer electronics, security, and large building control systems. The next 20 years will see much greater deployment of networks in buildings of all types, and across all end uses. Most of these are likely to be introduced primarily for reasons other than energy efficiency, and add energy use for network interfaces and network products. Widespread networking could easily lead to increased energy use, and experience with IT and CE networks suggests this may be likely. Active engagement by energy efficiency professionals in the architecture and design of future networks could lead to their being a large and highly cost-effective tool for efficiency. However, network standards are complex and take many years to develop and negotiate so that lack of action on this in the near term may foreclose important opportunities for years or decades to come. Digital networks need to be common globally, providing another challenge to building systems and elements that are more commonly designed only for national or regional markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some examples of past network designs and use and the lessons they hold for future building networks. It also highlights key needed areas for research, policy, and standards development.

  5. Global interrupt and barrier networks

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E; Heidelberger, Philip; Kopcsay, Gerard V.; Steinmacher-Burow, Burkhard D.; Takken, Todd E.

    2008-10-28

    A system and method for generating global asynchronous signals in a computing structure. Particularly, a global interrupt and barrier network is implemented that implements logic for generating global interrupt and barrier signals for controlling global asynchronous operations performed by processing elements at selected processing nodes of a computing structure in accordance with a processing algorithm; and includes the physical interconnecting of the processing nodes for communicating the global interrupt and barrier signals to the elements via low-latency paths. The global asynchronous signals respectively initiate interrupt and barrier operations at the processing nodes at times selected for optimizing performance of the processing algorithms. In one embodiment, the global interrupt and barrier network is implemented in a scalable, massively parallel supercomputing device structure comprising a plurality of processing nodes interconnected by multiple independent networks, with each node including one or more processing elements for performing computation or communication activity as required when performing parallel algorithm operations. One multiple independent network includes a global tree network for enabling high-speed global tree communications among global tree network nodes or sub-trees thereof. The global interrupt and barrier network may operate in parallel with the global tree network for providing global asynchronous sideband signals.

  6. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    SciTech Connect (OSTI)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  7. The Ad Lucem Research Network

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Ad Lucem Research Network Lada Adamic Associate Professor, School of Information & Center for the Study of Complex Systems University of Michigan Research interests: structure and dynamics of social and information networks, with a particular emphasis on information diffusion, expertise sharing, and online communities D. Lazer et al. "Computational Social Science." Science 323, 5915 (2009). J. Leskovec, L. A. Adamic, and B. A. Huberman. "The dynamics of viral

  8. High Performance Network Monitoring

    SciTech Connect (OSTI)

    Martinez, Jesse E

    2012-08-10

    Network Monitoring requires a substantial use of data and error analysis to overcome issues with clusters. Zenoss and Splunk help to monitor system log messages that are reporting issues about the clusters to monitoring services. Infiniband infrastructure on a number of clusters upgraded to ibmon2. ibmon2 requires different filters to report errors to system administrators. Focus for this summer is to: (1) Implement ibmon2 filters on monitoring boxes to report system errors to system administrators using Zenoss and Splunk; (2) Modify and improve scripts for monitoring and administrative usage; (3) Learn more about networks including services and maintenance for high performance computing systems; and (4) Gain a life experience working with professionals under real world situations. Filters were created to account for clusters running ibmon2 v1.0.0-1 10 Filters currently implemented for ibmon2 using Python. Filters look for threshold of port counters. Over certain counts, filters report errors to on-call system administrators and modifies grid to show local host with issue.

  9. Insecurity of Wireless Networks

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo; Pan, W. David

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  10. network delithiation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Solar Thermal Test Facility Nuclear ... Climate & Earth Systems Climate Measurement & Modeling ... Tribal Energy Program Intellectual Property Current EC ...

  11. Groundwater Monitoring Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Groundwater Monitoring Network Groundwater Monitoring Network The network includes 92 natural sources, 102 regional aquifer wells, 41 intermediate-depth wells and springs, and 67 wells in alluvium in canyons. August 1, 2013 Map of LANL's groundwater monitoring network Map of LANL's groundwater monitoring network

  12. Quantifying evolvability in small biological networks

    SciTech Connect (OSTI)

    Nemenman, Ilya; Mugler, Andrew; Ziv, Etay; Wiggins, Chris H

    2008-01-01

    The authors introduce a quantitative measure of the capacity of a small biological network to evolve. The measure is applied to a stochastic description of the experimental setup of Guet et al. (Science 2002, 296, pp. 1466), treating chemical inducers as functional inputs to biochemical networks and the expression of a reporter gene as the functional output. The authors take an information-theoretic approach, allowing the system to set parameters that optimise signal processing ability, thus enumerating each network's highest-fidelity functions. All networks studied are highly evolvable by the measure, meaning that change in function has little dependence on change in parameters. Moreover, each network's functions are connected by paths in the parameter space along which information is not significantly lowered, meaning a network may continuously change its functionality without completely losing it along the way. This property further underscores the evolvability of the networks.

  13. Connected Lighting Systems Workshop Registration

    Broader source: Energy.gov [DOE]

    The registration fee for the 2016 DOE Connected Lighting Systems Workshop includes admission to all sessions, networking breakfasts and lunches, and an evening networking reception.

  14. Interconnection networks

    DOE Patents [OSTI]

    Faber, V.; Moore, J.W.

    1988-06-20

    A network of interconnected processors is formed from a vertex symmetric graph selected from graphs GAMMA/sub d/(k) with degree d, diameter k, and (d + 1)exclamation/ (d /minus/ k + 1)exclamation processors for each d greater than or equal to k and GAMMA/sub d/(k, /minus/1) with degree d /minus/ 1, diameter k + 1, and (d + 1)exclamation/(d /minus/ k + 1)exclamation processors for each d greater than or equal to k greater than or equal to 4. Each processor has an address formed by one of the permutations from a predetermined sequence of letters chosen a selected number of letters at a time, and an extended address formed by appending to the address the remaining ones of the predetermined sequence of letters. A plurality of transmission channels is provided from each of the processors, where each processor has one less channel than the selected number of letters forming the sequence. Where a network GAMMA/sub d/(k, /minus/1) is provided, no processor has a channel connected to form an edge in a direction delta/sub 1/. Each of the channels has an identification number selected from the sequence of letters and connected from a first processor having a first extended address to a second processor having a second address formed from a second extended address defined by moving to the front of the first extended address the letter found in the position within the first extended address defined by the channel identification number. The second address is then formed by selecting the first elements of the second extended address corresponding to the selected number used to form the address permutations. 9 figs.

  15. Valley Entrepreneurs' Network (VEN) Monthly Network Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    VEN Monthly Network Meeting Valley Entrepreneurs' Network (VEN) Monthly Network Meeting WHEN: Mar 05, 2015 5:30 PM - 7:00 PM WHERE: Anthony's At the Delta North Paseo De Onate, Española, NM CATEGORY: Community INTERNAL: Calendar Login Event Description An evening of exciting enterprise networking with like-minded entrepreneurs. For more information, contact Alejandro, VEN Coordinator, at (505) 410-0959

  16. Advanced mobile networking, sensing, and controls.

    SciTech Connect (OSTI)

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  17. NREL: Energy Systems Integration - Energy Systems Integration...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Power Systems Modeling and Control Get the full list of job postings and learn more about working at NREL. Smarter Grid Solutions to Demonstrate Active Network Management System ...

  18. Biological and Environmental Research Network Requirements

    SciTech Connect (OSTI)

    Balaji, V.; Boden, Tom; Cowley, Dave; Dart, Eli; Dattoria, Vince; Desai, Narayan; Egan, Rob; Foster, Ian; Goldstone, Robin; Gregurick, Susan; Houghton, John; Izaurralde, Cesar; Johnston, Bill; Joseph, Renu; Kleese-van Dam, Kerstin; Lipton, Mary; Monga, Inder; Pritchard, Matt; Rotman, Lauren; Strand, Gary; Stuart, Cory; Tatusova, Tatiana; Tierney, Brian; Thomas, Brian; Williams, Dean N.; Zurawski, Jason

    2013-09-01

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet be a highly successful enabler of scientific discovery for over 25 years. In November 2012, ESnet and the Office of Biological and Environmental Research (BER) of the DOE SC organized a review to characterize the networking requirements of the programs funded by the BER program office. Several key findings resulted from the review. Among them: 1) The scale of data sets available to science collaborations continues to increase exponentially. This has broad impact, both on the network and on the computational and storage systems connected to the network. 2) Many science collaborations require assistance to cope with the systems and network engineering challenges inherent in managing the rapid growth in data scale. 3) Several science domains operate distributed facilities that rely on high-performance networking for success. Key examples illustrated in this report include the Earth System Grid Federation (ESGF) and the Systems Biology Knowledgebase (KBase). This report expands on these points, and addresses others as well. The report contains a findings section as well as the text of the case studies discussed at the review.

  19. Damselfly Network Simulator

    Energy Science and Technology Software Center (OSTI)

    2014-04-01

    Damselfly is a model-based parallel network simulator. It can simulate communication patterns of High Performance Computing applications on different network topologies. It outputs steady-state network traffic for a communication pattern, which can help in studying network congestion and its impact on performance.

  20. Matching network for RF plasma source

    DOE Patents [OSTI]

    Pickard, Daniel S.; Leung, Ka-Ngo

    2007-11-20

    A compact matching network couples an RF power supply to an RF antenna in a plasma generator. The simple and compact impedance matching network matches the plasma load to the impedance of a coaxial transmission line and the output impedance of an RF amplifier at radio frequencies. The matching network is formed of a resonantly tuned circuit formed of a variable capacitor and an inductor in a series resonance configuration, and a ferrite core transformer coupled to the resonantly tuned circuit. This matching network is compact enough to fit in existing compact focused ion beam systems.

  1. Host Event Based Network Monitoring

    SciTech Connect (OSTI)

    Jonathan Chugg

    2013-01-01

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  2. Diagnosing Anomalous Network Performance with Confidence

    SciTech Connect (OSTI)

    Settlemyer, Bradley W; Hodson, Stephen W; Kuehn, Jeffery A; Poole, Stephen W

    2011-04-01

    Variability in network performance is a major obstacle in effectively analyzing the throughput of modern high performance computer systems. High performance interconnec- tion networks offer excellent best-case network latencies; how- ever, highly parallel applications running on parallel machines typically require consistently high levels of performance to adequately leverage the massive amounts of available computing power. Performance analysts have usually quantified network performance using traditional summary statistics that assume the observational data is sampled from a normal distribution. In our examinations of network performance, we have found this method of analysis often provides too little data to under- stand anomalous network performance. Our tool, Confidence, instead uses an empirically derived probability distribution to characterize network performance. In this paper we describe several instances where the Confidence toolkit allowed us to understand and diagnose network performance anomalies that we could not adequately explore with the simple summary statis- tics provided by traditional measurement tools. In particular, we examine a multi-modal performance scenario encountered with an Infiniband interconnection network and we explore the performance repeatability on the custom Cray SeaStar2 interconnection network after a set of software and driver updates.

  3. Cross-linked structure of network evolution

    SciTech Connect (OSTI)

    Bassett, Danielle S.; Wymbs, Nicholas F.; Grafton, Scott T.; Porter, Mason A.; Mucha, Peter J.

    2014-03-15

    We study the temporal co-variation of network co-evolution via the cross-link structure of networks, for which we take advantage of the formalism of hypergraphs to map cross-link structures back to network nodes. We investigate two sets of temporal network data in detail. In a network of coupled nonlinear oscillators, hyperedges that consist of network edges with temporally co-varying weights uncover the driving co-evolution patterns of edge weight dynamics both within and between oscillator communities. In the human brain, networks that represent temporal changes in brain activity during learning exhibit early co-evolution that then settles down with practice. Subsequent decreases in hyperedge size are consistent with emergence of an autonomous subgraph whose dynamics no longer depends on other parts of the network. Our results on real and synthetic networks give a poignant demonstration of the ability of cross-link structure to uncover unexpected co-evolution attributes in both real and synthetic dynamical systems. This, in turn, illustrates the utility of analyzing cross-links for investigating the structure of temporal networks.

  4. Zone routing in a torus network

    DOE Patents [OSTI]

    Chen, Dong; Heidelberger, Philip; Kumar, Sameer

    2013-01-29

    A system for routing data in a network comprising a network logic device at a sending node for determining a path between the sending node and a receiving node, wherein the network logic device sets one or more selection bits and one or more hint bits within the data packet, a control register for storing one or more masks, wherein the network logic device uses the one or more selection bits to select a mask from the control register and the network logic device applies the selected mask to the hint bits to restrict routing of the data packet to one or more routing directions for the data packet within the network and selects one of the restricted routing directions from the one or more routing directions and sends the data packet along a link in the selected routing direction toward the receiving node.

  5. Flexible network wireless transceiver and flexible network telemetry transceiver

    DOE Patents [OSTI]

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  6. Network user`s guide

    SciTech Connect (OSTI)

    McGrady, P.W.

    1994-12-01

    NETWORK is a FORTRAN code used to model process flow systems in the gaseous diffusion plants at Portsmouth, Ohio and Paducah, Kentucky, operated by the United States Enrichment Corporation. It can handle a wide range of components and several different types of controllers. NETWORK can be run in either a steady-state mode or a transient mode. In the transient mode many different types of perturbations may be modeled. It is currently being used to model taking a cell off-stream in a gaseous diffusion plant. A brief description of the code is given, and process equipment models and input data are discussed.

  7. ESnet - the energy sciences network strategic plan

    SciTech Connect (OSTI)

    1996-12-01

    The goal of the Energy Sciences Network (ESnet) Program is to provide a highly capable and reliable communications infrastructure that supports the Department of Energy`s (DOE) missions and enables DOE researchers to tap the power of leading-edge information technologies. ESnet provides an essential infrastructure that enhances national competitiveness and accelerates the development of future generations of high-performance, distributed computing systems and networks. These computing systems and networks are vital to modern scientific research. In addition, they enable development of new approaches to energy management, environmental restoration and waste management, national security, industrial processing, and health care, and also facilitate public access to government information. Extensive networks developed by the DOE`s high-energy physics and fusion energy research communities were the forerunners of the ESnet. These networks initially provided improved access to high-energy accelerator sites and to the Magnetic Fusion Energy Supercomputer Center, which opened at Lawrence Livermore National Laboratory in 1974.

  8. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ......... 17 Figure 5. Man-In-The-Middle attack on modem ... System LAN Local Area Network MITM Man-In-The-Middle OS Operating System PBX ...

  9. Belief network algorithms: A study of performance

    SciTech Connect (OSTI)

    Jitnah, N.

    1996-12-31

    This abstract gives an overview of the work. We present a survey of Belief Network algorithms and propose a domain characterization system to be used as a basis for algorithm comparison and for predicting algorithm performance.

  10. Cybersecurity Intrusion Detection and Security Monitoring for Field Area Networks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Intrusion Detection and Security Monitoring for Field Area Networks Continuous security validation, intrusion detection, and situational awareness for advanced metering infrastructure and distribution automation Background Advanced metering infrastructure (AMI) and distribution automation (DA) field area networks (FANs) are among the largest, possibly most complex, networks operated by utilities in the United States. Exploitable vulnerabilities in AMI and DA systems may arise from weaknesses in

  11. A Step Toward Conservation for Interior Alaska Tribes (Hughes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and electricity has been a challenge for the communities. Communities participating in DOE program Energy Crisis in Rural Alaska * Why are prices so high? - Alaska is ...

  12. Doctor Hugh Elliot Montgomery Thomas Jefferson National Accelerator Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WO R K I N G PA P E R S E R I E S N O 1 3 4 6 / J U N E 2 011 by Marco J. Lombardi and Ine Van Robays DO FINANCIAL INVESTORS DESTABILIZE THE OIL PRICE? WO R K I N G PA P E R S E R I E S N O 13 4 6 / J U N E 2011 DO FINANCIAL INVESTORS DESTABILIZE THE OIL PRICE? 1 by Marco J. Lombardi 2 and Ine Van Robays 3 1 This paper was initiated when the second author was with the European Central Bank. Without implicating, we would like to thank Bahattin Büyüksahin, Gert Peersman, Jaap Bos, Julio

  13. Hughes County, Oklahoma: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    Oklahoma Holdenville, Oklahoma Horntown, Oklahoma Lamar, Oklahoma Spaulding, Oklahoma Stuart, Oklahoma Wetumka, Oklahoma Yeager, Oklahoma Retrieved from "http:en.openei.orgw...

  14. Seafarers: Rob Hughes | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    his grandfather, uncle and father, serving 26 years in "the family business," the U.S. Navy. His grandfather built submarines in Portsmouth, N.H.; his uncle retired as a submarine...

  15. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  16. Recommended Practices Guide For Securing ZigBee Wireless Networks...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments This paper addresses design principles and best practices regarding the ...

  17. Class network routing

    DOE Patents [OSTI]

    Bhanot, Gyan; Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  18. Computational Systems & Software Environment | National Nuclear...

    National Nuclear Security Administration (NNSA)

    (IO), storage and networking, to post-processing visualization and data analysis tools. ... The IO, Storage Systems, and Networking product provides IO (inputoutput, or data ...

  19. BES Science Network Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Requirements Report of the Basic Energy Sciences Network Requirements Workshop Conducted June 4-5, 2007 BES Science Network Requirements Workshop Basic Energy Sciences Program Office, DOE Office of Science Energy Sciences Network Washington, DC - June 4 and 5, 2007 ESnet is funded by the US Dept. of Energy, Office of Science, Advanced Scientific Computing Research (ASCR) program. Dan Hitchcock is the ESnet Program Manager. ESnet is operated by Lawrence Berkeley National Laboratory, which

  20. Science-Driven Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science-Driven Network Requirements for ESnet Update to the 2002 Office of Science Networking Requirements Workshop Report February 21, 2006 1-1 Science-Driven Network Requirements for ESnet Update to the 2002 Office of Science Networking Requirements Workshop Report February 21, 2006 Contributors Paul Adams, LBNL (Advanced Light Source) Shane Canon, ORNL (NLCF) Steven Carter, ORNL (NLCF) Brent Draney, LBNL (NERSC) Martin Greenwald, MIT (Magnetic Fusion Energy) Jason Hodges, ORNL (Spallation

  1. Metallic nanowire networks

    DOE Patents [OSTI]

    Song, Yujiang; Shelnutt, John A.

    2012-11-06

    A metallic nanowire network synthesized using chemical reduction of a metal ion source by a reducing agent in the presence of a soft template comprising a tubular inverse micellar network. The network of interconnected polycrystalline nanowires has a very high surface-area/volume ratio, which makes it highly suitable for use in catalytic applications.

  2. Calorimetry Network Program

    Energy Science and Technology Software Center (OSTI)

    1998-01-30

    This is a Windows NT based program to run the SRTC designed calorimeters. The network version can communicate near real time data and final data values over the network. This version, due to network specifics, can function in a stand-alone operation also.

  3. LBNL Transactional Network Applications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transactional Network Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory LBNL Team: Mary Ann Piette, Richard Brown, Phil Price, Janie Page, Stephen Czarnecki, Anna Liao, Stephen Lanzisera, Jessica Granderson . LBNL Transactional Network Applications 2 | Building Technologies Office eere.energy.gov LBNL Transactional Network Applications Baseline Load Shape provides basis for measuring change in peak demand and energy use Demand Response Event Scheduler coordinates

  4. Internet protocol network mapper

    DOE Patents [OSTI]

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  5. Analysis of complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving - we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  6. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, Dario B.

    1996-01-01

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  7. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, D.B.

    1996-12-31

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor to a plurality of slave processors to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor`s status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer, a digital signal processor, a parallel transfer controller, and two three-port memory devices. A communication switch within each node connects it to a fast parallel hardware channel through which all high density data arrives or leaves the node. 6 figs.

  8. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  9. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  10. Redundancy and Error Resilience in Boolean Networks

    SciTech Connect (OSTI)

    Peixoto, Tiago P.

    2010-01-29

    We consider the effect of noise in sparse Boolean networks with redundant functions. We show that they always exhibit a nonzero error level, and the dynamics undergoes a phase transition from nonergodicity to ergodicity, as a function of noise, after which the system is no longer capable of preserving a memory of its initial state. We obtain upper bounds on the critical value of noise for networks of different sparsity.

  11. Downhole drilling network using burst modulation techniques

    DOE Patents [OSTI]

    Hall; David R. , Fox; Joe

    2007-04-03

    A downhole drilling system is disclosed in one aspect of the present invention as including a drill string and a transmission line integrated into the drill string. Multiple network nodes are installed at selected intervals along the drill string and are adapted to communicate with one another through the transmission line. In order to efficiently allocate the available bandwidth, the network nodes are configured to use any of numerous burst modulation techniques to transmit data.

  12. Reconfigureable network node

    DOE Patents [OSTI]

    Vanderveen, Keith B.; Talbot, Edward B.; Mayer, Laurence E.

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  13. National Highway Planning Network

    Energy Science and Technology Software Center (OSTI)

    1992-02-02

    NHPN, the National Highway Planning Network, is a database of major highways in the continental United States that is used for national-level analyses of highway transportation issues that require use of a network, such as studies of highway performance, network design, social and environmental impacts of transportation, vehicle routing and scheduling, and mapping. The network is based on a set of roadways digitized by the U. S. Geological Survey (USGS) from the 1980 National Atlasmore » and has been enhanced with additional roads, attribute detail, and topological error corrections to produce a true analytic network. All data have been derived from or checked against information obtained from state and Federal governmental agencies. Two files comprise this network: one describing links and the other nodes. This release, NHPN1.0, contains 44,960 links and 28,512 nodes representing approximately 380,000 miles of roadway.« less

  14. DOE Science Networking Challenge: Roadmap to 2008

    SciTech Connect (OSTI)

    R. Roy Whitney; Larry Price

    2003-06-01

    This report establishes a roadmap for a new approach to the DOE Science Networking and Services needed for science in the U.S. Department of Energy in the 21st century. It has become increasingly clear 2 that the network provided for DOE science in the past will not be adequate to keep that science competitive in the future. This roadmap, if implemented and followed during the next five years, will solve that problem. The past 5 years have seen a broad and general movement toward the assumption of and reliance on networked systems in all of the large new initiatives for DOE science. It is clear that the success of science depends increasingly on the ability of scientists to move large amounts of data, access computing and data resources, and collaborate in real time from multiple remote locations. It is also abundantly clear that business-as-usual in the network and information services that underpin the scientific collaborations will fall woefully short of what is needed. New capabilities such as computational and data grids, high-speed wireless networking, super-high-speed metro-scale networks, and cheap gigabit Ethernet have arrived in turn and have been enthusiastically incorporated into the arsenal of science, each permitting substantial new collaborative abilities and efficiencies. However, sophisticated structures and services using basic network connections can be used effectively only if the network infrastructure itself provides the necessary environment. Increasingly, the network must become a collaborative information exchange, with a core of higher-level services supported by network providers in addition to basic bandwidth and connectivity.

  15. Networking and Application Strategies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Networking and Application Strategies Networking and Application Strategies Los Alamos Lab recruits the best minds on the planet and offers job search information and assistance to our dual career spouses or partners. Contact Us dualcareers@lanl.gov You know more people than you think Having strong existing connections and building new ones is essential to finding a job-especially for a dual career family that is new to the Los Alamos area. Networking is a proven and effective way to increase

  16. BER Science Network Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... However, once this step is completed, the network transfers of data or documentation may not need the same level of protection accorded to the authentication credentials. For the ...

  17. LBNL Transactional Network Applications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Load Shape provides basis for measuring change in peak demand and energy use Demand Response Event Scheduler coordinates DR signals from outside server with available network ...

  18. battery electrode percolating network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    battery electrode percolating network - Sandia Energy Energy Search Icon Sandia Home ... Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel ...

  19. Rooftop Unit Network Project

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    part load performance - equipment maintenance * RTUs cannot easily interact with the ... Diagnostics - RTU Network Platform * Smart Monitoring and Diagnostics - Cloud * Autonomous ...

  20. Network Requirements Reviews

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reviews Network Requirements Reviews Documents and Background Materials FAQ for Case Study Authors BER Requirements Review 2015 ASCR Requirements Review 2015 Previous...

  1. Energy Sciences Network (ESnet)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    making it the standard for research institutions today. Read More ESnet Releases Open Source Software from MyESnet Portal for Building Online Interactive Network Portals ESnet...

  2. Harness: Heterogeneous Adaptable Reconfigurable Networked Systems -- U.S. Department of Energy Grant DE-FG02-99ER25379 Final Project Report

    SciTech Connect (OSTI)

    Vaidy Sunderam

    2003-07-02

    Issues in reconfigurability and adaptability in heterogeneous distributed systems for high-performance computing are the focus of the work funded by this grant. Our efforts are part of an ongoing research project in metacomputing and are a follow on to the DOE funded PVM system that has witnessed over a decade of use at numerous institutions worldwide. The current project, termed Harness, investigates novel methodologies and tools for distributed metacomputing, focusing on dynamically reconfigurable software frameworks. During the first phase, we defined the metacomputing architecture embodied in Harness and developed prototype subsystems as proof of concept exercises. Subsequently, we designed and developed a complete software framework manifesting the Harness architecture, and also developed several tools and subsystems that demonstrated the viability and effectiveness of our proposed model for next generation metacomputing. We then used this substrate to emulate multiple programming environments on Harness, and conducted performance evaluation and tuning exercises. The main research results from these efforts include the establishment of software metacomputing systems as viable and cost-effective alternatives to MPPs; the demonstration of dynamic and reconfigurable platforms as effective methods of tailoring parallel computing environments; the development of methodologies to construct plugin modules for component-based distributed systems; contributions to performance modeling and optimization in emulated software environments; and software architectures for multi- and mixed-paradigm parallel distributed computing. Details and specifics on these and other results have been reported in numerous publications, and are manifested in software systems, all of which may be accessed at or via the website http://www.mathcs.emory.edu/harness/

  3. On Building Inexpensive Network Capabilities

    SciTech Connect (OSTI)

    Shue, Craig A; Kalafut, Prof. Andrew; Allman, Mark; Taylor, Curtis R

    2011-01-01

    There are many deployed approaches for blocking unwanted traffic, either once it reaches the recipient's network, or closer to its point of origin. One of these schemes is based on the notion of traffic carrying capabilities that grant access to a network and/or end host. However, leveraging capabilities results in added complexity and additional steps in the communication process: Before communication starts a remote host must be vetted and given a capability to use in the subsequent communication. In this paper, we propose a lightweight mechanism that turns the answers provided by DNS name resolution---which Internet communication broadly depends on anyway---into capabilities. While not achieving an ideal capability system, we show the mechanism can be built from commodity technology and is therefore a pragmatic way to gain some of the key benefits of capabilities without requiring new infrastructure.

  4. Better Buildings Residential Network | Department of Energy

    Energy Savers [EERE]

    Residential Buildings Better Buildings Residential Network Better Buildings Residential Network Better Buildings Residential Network Explore Latest Peer Exchange Call Summaries ...

  5. Real-time distributed multimedia systems

    SciTech Connect (OSTI)

    Rahurkar, S.S.; Bourbakis, N.G.

    1996-12-31

    This paper presents a survey on distributed multimedia systems and discusses real-time issues. In particular, different subsystems are reviewed that impact on multimedia networking, the networking for multimedia, the networked multimedia systems, and the leading edge research and developments efforts and issues in networking.

  6. Functional performance requirements for seismic network upgrade

    SciTech Connect (OSTI)

    Lee, R.C.

    1991-08-18

    The SRL seismic network, established in 1976, was developed to monitor site and regional seismic activity that may have any potential to impact the safety or reduce containment capability of existing and planned structures and systems at the SRS, report seismic activity that may be relevant to emergency preparedness, including rapid assessments of earthquake location and magnitude, and estimates of potential on-site and off-site damage to facilities and lifelines for mitigation measures. All of these tasks require SRL seismologists to provide rapid analysis of large amounts of seismic data. The current seismic network upgrade, the subject of this Functional Performance Requirements Document, is necessary to improve system reliability and resolution. The upgrade provides equipment for the analysis of the network seismic data and replacement of old out-dated equipment. The digital network upgrade is configured for field station and laboratory digital processing systems. The upgrade consists of the purchase and installation of seismic sensors,, data telemetry digital upgrades, a dedicated Seismic Data Processing (SDP) system (already in procurement stage), and a Seismic Signal Analysis (SSA) system. The field stations and telephone telemetry upgrades include equipment necessary for three remote station upgrades including seismic amplifiers, voltage controlled oscillators, pulse calibrators, weather protection (including lightning protection) systems, seismometers, seismic amplifiers, and miscellaneous other parts. The central receiving and recording station upgrades will include discriminators, helicopter amplifier, omega timing system, strong motion instruments, wide-band velocity sensors, and other miscellaneous equipment.

  7. Form:Networking Organization | Open Energy Information

    Open Energy Info (EERE)

    Networking Organization Jump to: navigation, search Add a Networking Organization Input your networking organization name below to add to the registry. If your networking...

  8. Multi-Tenant Isolation via Reconfigurable Networks

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine; Koch, Scott M.; Pelfrey, Daniel S.; Pogge, James R.; Scott, Stephen L.; Shipman, Galen M.; Sorrillo, Lawrence

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in reconfigurable network enclaving through Software Defined Networking (SDN) and Network Function Virtualization (NFV) and their applicability to secure enclaves in HPC environments. SDN and NFV methods are based on a solid foundation of system wide virtualization. The purpose of which is very straight forward, the system administrator can deploy networks that are more amenable to customer needs, and at the same time achieve increased scalability making it easier to increase overall capacity as needed without negatively affecting functionality. The network administration of both the server system and the virtual sub-systems is simplified allowing control of the infrastructure through well-defined APIs (Application Programming Interface). While SDN and NFV technologies offer significant promise in meeting these goals, they also provide the ability to address a significant component of the multi-tenant challenge in HPC environments, namely resource isolation. Traditional HPC systems are built upon scalable high-performance networking technologies designed to meet specific application requirements. Dynamic isolation of resources within these environments has remained difficult to achieve. SDN and NFV methodology

  9. Collective network routing

    DOE Patents [OSTI]

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  10. Residential Network Members Unite to Form Green Bank Network...

    Broader source: Energy.gov (indexed) [DOE]

    The NY Green Bank logo. Residential Network members Connecticut Green Bank and NY Green Bank, a division of Residential Network member New York State Energy Research and ...