Powered by Deep Web Technologies
Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and...

2

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

3

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

4

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

5

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

6

U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, 4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information October 4, 2012 - 6:00am Addthis PROBLEM: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information PLATFORM: HP Network Node Manager I (NNMi) v9.20 for HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. reference LINKS: HP Security Bulletin: c03507708 SecurityTracker Alert ID: 1027605 Security Focus: 524302 CVE-2012-3267 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Network Node

7

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes Vinod Sharma at that time at the node. For such networks we develop efficient energy management policies. First for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay

Sharma, Vinod

8

U-229: HP Network Node Manager i Input Validation Flaw Permits...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network...

9

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

10

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

11

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a packet. These packets are stored in a queue and transmitted using the energy available at that time at the node. For such networks we develop efficient energy management policies. First, for a single node, we obtain policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay in the queue. We also compare performance of several easily implementable suboptimal policies. A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay. Next using the results for a single node, we develop efficient MAC policies.

Sharma, Vinod; Joseph, Vinay

2008-01-01T23:59:59.000Z

12

Node-level Energy Management for Sensor Networks in the Presence of Multiple Applications  

E-Print Network (OSTI)

that solves the energy management problem at the node levelpredominately in energy saving problems. The energy sourcefor two sub-problems of our energy managing mechanism in

Athanassios Boulis; Mani Srivastava

2004-01-01T23:59:59.000Z

13

Node-level Energy Management for Sensor Networks in the Presence of Multiple Applications  

E-Print Network (OSTI)

some policy P . The energy management system proposed here,in [4]. In our energy management system there are threein section 3.2, our energy management system measures the

Athanassios Boulis; Mani Srivastava

2004-01-01T23:59:59.000Z

14

Random walk based node sampling in self-organizing networks  

Science Conference Proceedings (OSTI)

Random walk is a means of network node sampling that requires little index maintenance and can function on almost all connected network topologies. With careful guidance, node samples following a desired probability distribution can be generated with ...

Ming Zhong; Kai Shen

2006-07-01T23:59:59.000Z

15

Underwater Acoustic Sensor Network with Energy Harvesting Nodes.  

E-Print Network (OSTI)

??This thesis explores the possibility of a self sustained and service free Underwater Acoustic Sensor Network (UASN). The network nodes are installed along a subsea… (more)

Huseby, Morten

2011-01-01T23:59:59.000Z

16

Permanent oscillations in a 3-node recurrent neural network model  

Science Conference Proceedings (OSTI)

In this paper we discuss the existence of oscillations in a specific recurrent neural network: the 3-node network with two weight parameters and one time delay. Simple and practical criteria for fixing the range of the parameters in this network model ... Keywords: 3-node networks, Recurrent neural networks, Time delays

Chunhua Feng; Christian O'Reilly; Réjean Plamondon

2010-12-01T23:59:59.000Z

17

SENDROM: sensor networks for disaster relief operations management  

Science Conference Proceedings (OSTI)

SENDROM is a new sensor network architecture to manage the rescue operations after large scale disasters. This architecture mainly consists of sensor nodes deployed prior to a disaster and central nodes that can query sensor nodes. Central nodes are ... Keywords: data dissemination, disaster relief operations, sesnor networks, task dissemination

Erdal Cayirci; Tolga Coplu

2007-06-01T23:59:59.000Z

18

Optimized relay node placement for connecting disjoint wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) often operate in a harsh environment such as battlefield and may suffer simultaneous failure of multiple sensors that cause the network to become partitioned into disjoint segments. In order to prevent the application ... Keywords: Connectivity restoration, Network partitioning, Relay node placement, Wireless sensor networks

Sookyoung Lee; Mohamed Younis

2012-08-01T23:59:59.000Z

19

Energy efficient networking via dynamic relay node selection in wireless networks  

Science Conference Proceedings (OSTI)

Mobile wireless ad hoc networks need to maximize their network lifetime (defined as the time until the first node runs out of energy). In the broadcast network lifetime problem, all nodes are sending broadcast traffic, and one asks for an assignment ... Keywords: Ad hoc networks, Average case analysis, Network lifetime, Random graphs

Maurits De Graaf

2013-05-01T23:59:59.000Z

20

Computationally Simple Battery Management Techniques for Wireless Nodes  

E-Print Network (OSTI)

Computationally Simple Battery Management Techniques for Wireless Nodes Maria Adamou 1 and Saswati In this paper, we investigate di#11;erent battery management policies for a wireless node. The goal is to increase the lifetime of a node by exploiting its battery characteristics. We have presented a framework

Sarkar, Saswati

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Performance of wireless sensor networks under random node failures  

SciTech Connect

Networks are essential to the function of a modern society and the consequence of damages to a network can be large. Assessing network performance of a damaged network is an important step in network recovery and network design. Connectivity, distance between nodes, and alternative routes are some of the key indicators to network performance. In this paper, random geometric graph (RGG) is used with two types of node failure, uniform failure and localized failure. Since the network performance are multi-facet and assessment can be time constrained, we introduce four measures, which can be computed in polynomial time, to estimate performance of damaged RGG. Simulation experiments are conducted to investigate the deterioration of networks through a period of time. With the empirical results, the performance measures are analyzed and compared to provide understanding of different failure scenarios in a RGG.

Bradonjic, Milan [Los Alamos National Laboratory; Hagberg, Aric [Los Alamos National Laboratory; Feng, Pan [Los Alamos National Laboratory

2011-01-28T23:59:59.000Z

22

Network lifetime analytical model for node-disjoint multipath routing in wireless sensor networks  

Science Conference Proceedings (OSTI)

The objective of every sensor node in a sensor network is to send the sensed data in the phenomena to a sink node. The network lifetime is maximal, when the energy consumption of each node is uniform. Many routing protocols select an optimal path to ...

Shiva G. Murthy; R. J. D. Souza; G. Varaprasad

2013-02-01T23:59:59.000Z

23

Neural node network and model, and method of teaching same  

DOE Patents (OSTI)

The present invention is a fully connected feed forward network that includes at least one hidden layer 16. The hidden layer 16 includes nodes 20 in which the output of the node is fed back to that node as an input with a unit delay produced by a delay device 24 occurring in the feedback path 22 (local feedback). Each node within each layer also receives a delayed output (crosstalk) produced by a delay unit 36 from all the other nodes within the same layer 16. The node performs a transfer function operation based on the inputs from the previous layer and the delayed outputs. The network can be implemented as analog or digital or within a general purpose processor. Two teaching methods can be used: (1) back propagation of weight calculation that includes the local feedback and the crosstalk or (2) more preferably a feed forward gradient decent which immediately follows the output computations and which also includes the local feedback and the crosstalk. Subsequent to the gradient propagation, the weights can be normalized, thereby preventing convergence to a local optimum. Education of the network can be incremental both on and off-line. An educated network is suitable for modeling and controlling dynamic nonlinear systems and time series systems and predicting the outputs as well as hidden states and parameters. The educated network can also be further educated during on-line processing.

Parlos, Alexander G. (College Station, TX); Atiya, Amir F. (College Station, TX); Fernandez, Benito (Austin, TX); Tsai, Wei K. (Irvine, CA); Chong, Kil T. (College Station, TX)

1995-01-01T23:59:59.000Z

24

Neural node network and model, and method of teaching same  

DOE Patents (OSTI)

The present invention is a fully connected feed forward network that includes at least one hidden layer. The hidden layer includes nodes in which the output of the node is fed back to that node as an input with a unit delay produced by a delay device occurring in the feedback path (local feedback). Each node within each layer also receives a delayed output (crosstalk) produced by a delay unit from all the other nodes within the same layer. The node performs a transfer function operation based on the inputs from the previous layer and the delayed outputs. The network can be implemented as analog or digital or within a general purpose processor. Two teaching methods can be used: (1) back propagation of weight calculation that includes the local feedback and the crosstalk or (2) more preferably a feed forward gradient decent which immediately follows the output computations and which also includes the local feedback and the crosstalk. Subsequent to the gradient propagation, the weights can be normalized, thereby preventing convergence to a local optimum. Education of the network can be incremental both on and off-line. An educated network is suitable for modeling and controlling dynamic nonlinear systems and time series systems and predicting the outputs as well as hidden states and parameters. The educated network can also be further educated during on-line processing. 21 figs.

Parlos, A.G.; Atiya, A.F.; Fernandez, B.; Tsai, W.K.; Chong, K.T.

1995-12-26T23:59:59.000Z

25

System and Network Management  

Science Conference Proceedings (OSTI)

This document covers Systems and Network Management Requirements and is the first deliverable in a joint EPRI and Utility User Project to develop Network Management capability for Electric Utility Automation Systems (UAS) using international communication standards such as IEC 61850. The management of substation automation systems is critical since tools are now based, for the most part, on proprietary hardware and software. In modern state-of-the art substations, traditional network management has ...

2012-12-20T23:59:59.000Z

26

The Network Completion Problem: Inferring Missing Nodes and Edges in Networks  

SciTech Connect

Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

Kim, M; Leskovec, J

2011-11-14T23:59:59.000Z

27

Hybrid trust and reputation management for sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sensor networks need to be lightweight in terms of computational and communication ... Keywords: Reputation management, Sensor networks, Trust establishment

Efthimia Aivaloglou; Stefanos Gritzalis

2010-07-01T23:59:59.000Z

28

Optimal Energy Management Policies for Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

1 Optimal Energy Management Policies for Energy Harvesting Sensor Nodes Vinod Sharma, Senior Member the energy available at that time. We obtain energy management policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies

Sharma, Vinod

29

Relay node placement in structurally damaged wireless sensor networks via triangular steiner tree approximation  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) have many applications which operate in hostile environments. Due to the harsh surroundings, WSNs may suffer from a large scale damage that causes many nodes to fail simultaneously and the network to get partitioned into ... Keywords: Fault-tolerance, Network segmentation, Relay node placement, Wireless sensor networks

Fatih Senel; Mohamed Younis

2011-10-01T23:59:59.000Z

30

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

31

Evaluating the impact of network density, hidden nodes and capture effect for throughput guarantee in multi-hop wireless networks  

Science Conference Proceedings (OSTI)

To optimize the performance of wireless networks, one needs to consider the impact of key factors such as interference from hidden nodes, the capture effect, the network density and network conditions (saturated versus non-saturated). In this research, ... Keywords: Capture effect, Hidden nodes, Multi-hop wireless networks, Throughput guarantee

Haitao Zhao; Emiliano Garcia-Palacios; Shan Wang; Jibo Wei; Dongtang Ma

2013-01-01T23:59:59.000Z

32

Power Management in Disruption Tolerant Networks .  

E-Print Network (OSTI)

??Disruption Tolerant Networks (DTNs) are mobile wireless networks that are designed to work in highly-challenged environments where the density of nodes is insufficient to support… (more)

Jun, Hyewon

2007-01-01T23:59:59.000Z

33

Avoiding energy holes in wireless sensor networks with nonuniform node distribution  

E-Print Network (OSTI)

Abstract—In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We conclude that in a circular multihop sensor network (modeled as concentric coronas) with nonuniform node distribution and constant data reporting, the unbalanced energy depletion among all the nodes in the network is unavoidable. Even if the nodes in the inner coronas of the network have used up their energy simultaneously, the ones in the outermost corona may still have unused energy. This is due to the intrinsic many-to-one traffic pattern of WSNs. Nevertheless, nearly balanced energy depletion in the network is possible if the number of nodes increases in geometric progression from the outer coronas to the inner ones except the outermost one. Based on the analysis, we propose a novel nonuniform node distribution strategy to achieve nearly balanced energy depletion in the network. We regulate the number of nodes in each corona and derive the ratio between the node densities in the adjacent ði þ 1Þth and ith coronas by the strategy. Finally, we propose q-Switch Routing, a distributed shortest path routing algorithm tailored for the proposed nonuniform node distribution strategy. Extensive simulations have been performed to validate the analysis. Index Terms—Wireless sensor networks, nonuniform node distribution, energy hole problem, energy-efficient routing. 1

Xiaobing Wu; Guihai Chen; Ieee Computer Society; Sajal K. Das

2008-01-01T23:59:59.000Z

34

Optimal Energy Management Policies for Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

We study a sensor node with an energy harvesting source. The generated energy can be stored in a buffer. The sensor node periodically senses a random field and generates a packet. These packets are stored in a queue and transmitted using the energy available at that time. We obtain energy management policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay in the queue.We also compare performance of several easily implementable sub-optimal energy management policies. A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay.

Sharma, Vinod; Joseph, Vinay; Gupta, Shrey

2008-01-01T23:59:59.000Z

35

Energy Management in Wireless Sensor Network Operations  

E-Print Network (OSTI)

In this dissertation, we develop and analyze effective energy management policies for wireless sensor networks in emerging applications. Existing methods in this area have primarily focused on energy conservation through the use of various communication techniques. However, in most applications of wireless sensor networks, savings in energy come at the expense of several performance parameters. Therefore it is necessary to manage energy consumption while being conscious of its effects on performance. In most cases, such energy-performance issues are specific to the nature of the application. Our research has been motivated by new techniques and applications where efficient energy-performance trade-off decisions are required. We primarily study the following trade-off cases: energy and node replacement costs (Case I), energy and delay (Case II), and energy and availability (Case III). We consider these trade-off situations separately in three distinct problem scenarios. In the first problem (Case I), we consider minimizing energy and node replacement costs in underwater wireless sensor networks for seismic monitoring application. In this case, we introduce mixed-integer programming (MIP) formulations based on a combined routing and node replacement policy approach and develop effective policies for large problem instances where our MIP models are intractable. In the second problem (Case II), we develop a Markov decision process (MDP) model to manage energy-delay trade-off in network coding which is a new energy-saving technique for wireless networks. Here we derive properties of the optimal policy and develop in- sights into other simple policies that are later shown to be efficient in particular situations. In the third problem (Case III), we consider an autonomous energy harvesting sensor network where nodes are turned off from time to time to operate in an “energy-neutral” manner. In this case, we use stochastic fluid-flow analysis to evaluate and analyze the availability of the sensor nodes under effective energy management policies. In each of the above problem cases, we develop analytical formulations, and derive and/or analyze policies that effectively manage the considered energy-performance trade-off. Overall, our analyses and solution methods make new contributions to both operations research and communication networking literature.

Mohapatra, Arupa Kumar

2013-08-01T23:59:59.000Z

36

A virtual square grid-based coverage algorithm of redundant node for wireless sensor network  

Science Conference Proceedings (OSTI)

A virtual square grid-based coverage algorithm (VSGCA) is proposed in this paper. Each sensor node divides its sensing range into virtual square grids, if all the grids are covered by neighbors, the target node is redundant node. Compared with some previous ... Keywords: Coverage, Energy conservation, Square grid, Wireless sensor network (WSN)

Yanheng Liu; Longxiang Suo; Dayang Sun; Aimin Wang

2013-03-01T23:59:59.000Z

37

Efficient Optimization of Reliable Two-Node Connected Networks: A Biobjective Approach  

Science Conference Proceedings (OSTI)

This paper presents a biobjective genetic algorithm (GA) to design reliable two-node connected telecommunication networks. Because the exact calculation of the reliability of a network is NP-hard, network designers have been reluctant to use network ... Keywords: decision theory, genetic algorithms, heuristics, multiple criteria, networks, reliability, simulation

Abdullah Konak; Alice E. Smith

2011-07-01T23:59:59.000Z

38

On the energy hole problem of nonuniform node distribution in wireless sensor networks  

E-Print Network (OSTI)

Abstract — In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy in wireless sensor networks, which aims to avoid the energy hole around the sink. We find that in a circular sensor network with a nonuniform node distribution and constant data reporting, the unbalanced energy depletion among the nodes in the whole network is unavoidable. This is because although all the inner nodes have used up their energy simultaneously, the outmost part of the network may still have energy left. In spite of this fact, a suboptimal energy efficiency among the inner parts of the network is possible if the number of nodes increases with geometric proportion from the outer parts to the inner ones. In our proposed nonuniform node distribution strategy, the ratio between the node densities of the adjacent (i+1)th corona and the ith corona is equal to (2i ? 1)/q(2i +1), where q is the geometric proportion mentioned above. We also present a routing algorithm with this node distribution strategy. Simulation experiments demonstrate that when the network lifetime has ended, the nodes in the inner parts of the network achieve nearly balanced energy depletion, and only less than 10 % of the total energy is wasted. I.

Xiaobing Wu; Guihai Chen

2006-01-01T23:59:59.000Z

39

Power management in energy harvesting sensor networks  

E-Print Network (OSTI)

Power management is an important concern in sensor networks, because a tethered energy infrastructure is not available and an obvious concern is to use the available battery energy efficiently. However, in some of the sensor networking applications, an additional facility is available to ameliorate the energy problem: harvesting energy from the environment. Certain considerations in using an energy harvesting source are fundamentally different from that in using a battery because, rather than a limit on the maximum energy, it has a limit on the maximum rate at which the energy can be used. Further, the harvested energy availability typically varies with time in a nondeterministic manner. While a deterministic metric such as residual battery suffices to characterize the energy availability in the case of batteries, a more sophisticated characterization may be required for a harvesting source. Another issue that becomes important in networked systems with multiple harvesting nodes is that different nodes may have different harvesting opportunity. In a distributed application, the same end-user performance may be achieved using different workload allocations, and resultant energy consumptions, at multiple nodes. In this case it is important to align the workload allocation with the energy availability at the harvesting nodes. We consider the above issues in power management for energy harvesting sensor networks. We develop abstractions to characterize the complex time varying nature of such sources with analytically tractable models and use them to address key design issues. We also develop distributed methods to efficiently use harvested energy and test these both in simulation and experimentally on an energy harvesting sensor network, prototyped for this work.

Aman Kansal; Jason Hsu; Sadaf Zahedi; Mani B Srivastava

2006-01-01T23:59:59.000Z

40

An Energy-Efficient Cooperative Node Selction Scheme in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

In this paper, we propose a novel cooperative node selection scheme in wireless sensor networks that operate in energy-constrained environment. This scheme can obtain higher energy efficiency than the traditional cooperative transmission, which only ... Keywords: cooperative node selection, energy effiency, wireless sensor networks

Yu Zhang; Yueming Cai; Wendong Yang; Youyun Xu

2009-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Community detection algorithm based on centrality and node distance in scale-free networks  

Science Conference Proceedings (OSTI)

In this paper, we present a method for detecting community structures based on centrality value and node distance. Many real world networks possess a scale-free property and this property makes community detection difficult especially on algorithms that ... Keywords: centrality value, community detection, node distance, scale-free network

Sorn Jarukasemratana; Tsuyoshi Murata; Xin Liu

2013-05-01T23:59:59.000Z

42

Basic Tradeoffs for Energy Management in Rechargeable Sensor Networks  

E-Print Network (OSTI)

As many sensor network applications require deployment in remote and hard-to-reach areas, it is critical to ensure that such networks are capable of operating unattended for long durations. Consequently, the concept of using nodes with energy replenishment capabilities has been gaining popularity. However, new techniques and protocols must be developed to maximize the performance of sensor networks with energy replenishment. Here, we analyze limits of the performance of sensor nodes with limited energy, being replenished at a variable rate. We provide a simple localized energy management scheme that achieves a performance close to that with an unlimited energy source, and at the same time keeps the probability of complete battery discharge low. Based on the insights developed, we address the problem of energy management for energy-replenishing nodes with finite battery and finite data buffer capacities. To this end, we give an energy management scheme that achieves the optimal utility asymptotically while kee...

Srivastava, Rahul

2010-01-01T23:59:59.000Z

43

A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks  

Science Conference Proceedings (OSTI)

Abstract: To know the location of nodes plays an important role in many current and envisioned wireless sensor network applications. In this framework, we consider the problem of estimating the locations of all the nodes of a network, based on noisy ... Keywords: Multiobjective evolutionary algorithms, Node localization, Range measurements, Stochastic optimization, Wireless sensor networks

Massimo Vecchio; Roberto López-Valcarce; Francesco Marcelloni

2012-07-01T23:59:59.000Z

44

Architecture of Wireless Multimedia Mesh Network Nodes for Longwall Coal Mine Automation  

Science Conference Proceedings (OSTI)

Wireless multimedia mesh network is used for longwall coal mine face to transmit signal of data, voice and video in real time with the development of modern coal mine. The performance of the backhaul network especially it’s throughput is the essential ... Keywords: architecturet, mesh network nodes, longwall coal mine, 3-radio

Xiaolong Feng; Jiansheng Qian

2010-06-01T23:59:59.000Z

45

The development of a wireless sensor network sensing node utilising adaptive self-diagnostics  

Science Conference Proceedings (OSTI)

In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequent and expensive. Furthermore, for long-term deployments in excess of a year, ...

Hai Li; Mark C. Price; Jonathan Stott; Ian W. Marshall

2007-09-01T23:59:59.000Z

46

The design of sustainable wireless sensor network node using solar energy and phase change memory  

Science Conference Proceedings (OSTI)

Sustainability of wireless sensor network (WSN) is crucial to its economy and efficiency. While previous works have focused on solving the energy source limitation through solar energy harvesting, we reveal in this paper that sensor node's lifespan could ...

Ping Zhou, Youtao Zhang, Jun Yang

2013-03-01T23:59:59.000Z

47

An optimization framework for the energy management of carrier ethernet networks with Multiple Spanning Trees  

Science Conference Proceedings (OSTI)

We propose an energy management framework to optimize the energy consumption of networks using the Multiple Spanning Tree Protocol such as Carrier Grade Ethernet networks. The objective is to minimize the energy consumption of nodes and links while considering ... Keywords: Carrier Grade Ethernet, Green networking, Network design, Routing optimization, Spanning Trees, Traffic engineering

Antonio Capone; Daniele Corti; Luca Gianoli; Brunilde Sansó

2012-11-01T23:59:59.000Z

48

Fast recovery from dual-link or single-node failures in IP networks using tunneling  

Science Conference Proceedings (OSTI)

This paper develops novel mechanisms for recovering from failures in IP networks with proactive backup path calculations and Internet Protocol (IP) tunneling. The primary scheme provides resilience for up to two link failures along a path. The highlight ... Keywords: IP fast reroute, failure recovery, independent trees, multiple-link failure, network protection, node failure

Shrinivasa Kini; Srinivasan Ramasubramanian; Amund Kvalbein; Audun Fosselie Hansen

2010-12-01T23:59:59.000Z

49

TinyNode: a comprehensive platform for wireless sensor network applications  

Science Conference Proceedings (OSTI)

We introduce the TinyNode platform for wireless sensor networks. Supporting both research and industrial deployments, the platform offers communication ranges that exceed current platforms by a factor of 3 to 5, while consuming similar energy. It comes ... Keywords: embedded systems, wireless sensor networks

Henri Dubois-Ferrière; Laurent Fabre; Roger Meier; Pierre Metrailler

2006-04-01T23:59:59.000Z

50

SECTOR: secure tracking of node encounters in multi-hop wireless networks  

Science Conference Proceedings (OSTI)

In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be used notably to prevent wormhole attacks (without requiring any clock synchronization), ... Keywords: mobile networks, mobility, positioning, security, security associations

Srdjan ?apkun; Levente Buttyán; Jean-Pierre Hubaux

2003-10-01T23:59:59.000Z

51

Transmission Capacity of Wireless Ad Hoc Networks with Energy Harvesting Nodes  

E-Print Network (OSTI)

Transmission capacity of an ad hoc wireless network is analyzed when each node of the network harvests energy from nature, e.g. solar, wind, vibration etc. Transmission capacity is the maximum allowable density of nodes, satisfying a per transmitter-receiver rate, and an outage probability constraint. Energy arrivals at each node are assumed to follow a Bernoulli distribution, and each node stores energy using an energy buffer/battery. For ALOHA medium access protocol (MAP), optimal transmission probability that maximizes the transmission capacity is derived as a function of the energy arrival distribution. Game theoretic analysis is also presented for ALOHA MAP, where each transmitter tries to maximize its own throughput, and symmetric Nash equilibrium is derived. For CSMA MAP, back-off probability and outage probability are derived in terms of input energy distribution, thereby characterizing the transmission capacity.

Vaze, Rahul

2012-01-01T23:59:59.000Z

52

A wireless sensor network design tool to support building energy management  

Science Conference Proceedings (OSTI)

The physical location of sensor nodes strongly influences the performance of the network from the perspective of accurate data sensing and reliable communication. Therefore deployment planning can be regarded as an essential stepping stone to producing ... Keywords: building management system, heterogeneous wireless network infrastructure, industry foundation classes, wireless sensor network design

Antony Guinard; Alan McGibney; Dirk Pesch

2009-11-01T23:59:59.000Z

53

Broadcast routing in wireless sensor networks with dynamic power management and multi-coverage backbones  

Science Conference Proceedings (OSTI)

In a wireless sensor network (WSN), nodes are power constrained. As a consequence, protocols must be energy efficient to prolong the network lifetime while keeping some quality-of-service (QoS) requirements. In WSNs, most protocols resort to the broadcast ... Keywords: Battery capacity recovery, Battery model, Dynamic power management, Multi-coverage backbones, Topology control, Wireless sensor networks

Paulo Sérgio Sausen; Marco Aurélio Spohn; Angelo Perkusich

2010-03-01T23:59:59.000Z

54

Survey Paper: A survey of MAC layer solutions to the hidden node problem in ad-hoc networks  

Science Conference Proceedings (OSTI)

Ad-hoc networks suffer from the problem of hidden nodes (terminals), which leads to severe degradation of network throughput. This survey gives a comprehensive overview of Medium Access Control (MAC) protocols which directly or indirectly address this ... Keywords: Hidden node problem, MAC layer, Protocol classification, Protocol comparison

Katarzyna Kosek-Szott

2012-05-01T23:59:59.000Z

55

NERSC's Data Transfer Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Nodes Data Transfer Nodes Data Transfer Nodes Overview The data transfer nodes are NERSC servers dedicated to performing transfers between NERSC data storage resources such as HPSS and the NERSC Global Filesystem (NGF), and storage resources at other sites including the Leadership Computing Facility at ORNL (Oak Ridge National Laboratory). These nodes are being managed (and monitored for performance) as part of a collaborative effort between ESnet, NERSC, and ORNL to enable high performance data movement over the high-bandwidth 10Gb ESnet wide-area network (WAN). Restrictions In order to keep the data transfer nodes performing optimally for data transfers, we request that users restrict interactive use of these systems to tasks that are related to preparing data for transfer or are directly

56

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

57

Energy research network management workshop  

Science Conference Proceedings (OSTI)

This report contains presentations on computer network management. The list of presentations are: ESNET Steering Committee; Site Access Coordinator Group; Magnetic Fusion Energy; HEPNET Review Committee; High Energy Physics Technical Coordinating Committee; Energy Research DECnet Working Group; A Research and Development Strategy for High Performance Computing; Compare Functionality of DECNET, MFENET, TCP/IP; Video Movie Making Using The LBL/MFE Experimental Link; Research in Distributed Computing over Long Haul Networks; Performance Improvements and Transport Protocols; HRC Report; Panel Discussion: ESNET Management Issues; NMFECC Operations Summary; Large Systems Overview File Storage and POSIX Interface; User Support Services; Overview of the MFENET II; and Access to Supercomputers at FSU Hardware, Software Status, and Remote Access.

Not Available

1988-06-01T23:59:59.000Z

58

Problems with providing QoS in EDCA ad-hoc networks with hidden and exposed nodes  

Science Conference Proceedings (OSTI)

In this paper we investigate the problem of providing QoS within IEEE 802.11 EDCA ad-hoc networks. Our study shows that a strong unfairness in medium access between certain nodes may appear. It also shows that the possible unfairness is dependent on ... Keywords: EDCA, QoS, ad-hoc, hidden and exposed nodes

Katarzyna Kosek

2009-04-01T23:59:59.000Z

59

Timing Synchronization and Node Localization in Wireless Sensor Networks: Efficient Estimation Approaches and Performance Bounds  

E-Print Network (OSTI)

Wireless sensor networks (WSNs) consist of a large number of sensor nodes, capable of on-board sensing and data processing, that are employed to observe some phenomenon of interest. With their desirable properties of flexible deployment, resistance to harsh environment and lower implementation cost, WSNs envisage a plethora of applications in diverse areas such as industrial process control, battle- field surveillance, health monitoring, and target localization and tracking. Much of the sensing and communication paradigm in WSNs involves ensuring power efficient transmission and finding scalable algorithms that can deliver the desired performance objectives while minimizing overall energy utilization. Since power is primarily consumed in radio transmissions delivering timing information, clock synchronization represents an indispensable requirement to boost network lifetime. This dissertation focuses on deriving efficient estimators and performance bounds for the clock parameters in a classical frequentist inference approach as well as in a Bayesian estimation framework. A unified approach to the maximum likelihood (ML) estimation of clock offset is presented for different network delay distributions. This constitutes an analytical alternative to prior works which rely on a graphical maximization of the likelihood function. In order to capture the imperfections in node oscillators, which may render a time-varying nature to the clock offset, a novel Bayesian approach to the clock offset estimation is proposed by using factor graphs. Message passing using the max-product algorithm yields an exact expression for the Bayesian inference problem. This extends the current literature to cases where the clock offset is not deterministic, but is in fact a random process. A natural extension of pairwise synchronization is to develop algorithms for the more challenging case of network-wide synchronization. Assuming exponentially distributed random delays, a network-wide clock synchronization algorithm is proposed using a factor graph representation of the network. Message passing using the max- product algorithm is adopted to derive the update rules for the proposed iterative procedure. A closed form solution is obtained for each node's belief about its clock offset at each iteration. Identifying the close connections between the problems of node localization and clock synchronization, we also address in this dissertation the problem of joint estimation of an unknown node's location and clock parameters by incorporating the effect of imperfections in node oscillators. In order to alleviate the computational complexity associated with the optimal maximum a-posteriori estimator, two iterative approaches are proposed as simpler alternatives. The first approach utilizes an Expectation-Maximization (EM) based algorithm which iteratively estimates the clock parameters and the location of the unknown node. The EM algorithm is further simplified by a non-linear processing of the data to obtain a closed form solution of the location estimation problem using the least squares (LS) approach. The performance of the estimation algorithms is benchmarked by deriving the Hybrid Cramer-Rao lower bound (HCRB) on the mean square error (MSE) of the estimators. We also derive theoretical lower bounds on the MSE of an estimator in a classical frequentist inference approach as well as in a Bayesian estimation framework when the likelihood function is an arbitrary member of the exponential family. The lower bounds not only serve to compare various estimators in our work, but can also be useful in their own right in parameter estimation theory.

Ahmad, Aitzaz 1984-

2012-12-01T23:59:59.000Z

60

Cell outage management in LTE networks  

Science Conference Proceedings (OSTI)

Cell outage management is a functionality aiming to automatically detect and mitigate outages that occur in radio networks due to unexpected failures. We envisage that future radio networks autonomously detect an outage based on measurements, from e.g., ...

M. Amirijoo; L. Jorguseski; T. Kürner; R. Litjens; M. Neuland; L. C. Schmelz; U. Türke

2009-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Distributed data management in a minicomputer network: the SEEDIS experience  

Science Conference Proceedings (OSTI)

This paper describes distributed data management aspects of SEEDIS (Socio-Economic Environmental Demographic Information System). SEEDIS is an experimental system for the retrieval, analysis, and display of geographically linked data. SEEDIS operates on nine computers in a nationwide network. Users at any location select and retrieve all data in the same way, regardless of whether they are stored locally or at a remote location. The network implementation has been substantially modified during 1983. New enhancements include: local caching of data files to improve efficiency; linking to an automatic tape library (ATL) to make larger volumes of data accessible; node independence to facilitate automatic sharing of data among autonomous SEEDIS installations without the need for central control; improvements providing robust operation despite unreliable network connections; and automatic recording of all cache transactions for subsequent statistical analysis.

Merrill, D.; McCarthy, J.; Gey, F.; Holmes, H.

1982-10-07T23:59:59.000Z

62

Joint energy management and resource allocation in rechargeable sensor networks  

Science Conference Proceedings (OSTI)

Energy harvesting sensor platforms have opened up a new dimension to the design of network protocols. In order to sustain the network operation, the energy consumption rate cannot be higher than the energy harvesting rate, otherwise, sensor nodes will ...

Ren-Shiou Liu; Prasun Sinha; Can Emre Koksal

2010-03-01T23:59:59.000Z

63

Power management in energy harvesting sensor networks  

Science Conference Proceedings (OSTI)

Power management is an important concern in sensor networks, because a tethered energy infrastructure is usually not available and an obvious concern is to use the available battery energy efficiently. However, in some of the sensor networking applications, ... Keywords: Adaptive duty cycling, Heliomote, energy neutrality, lifetime, power management

Aman Kansal; Jason Hsu; Sadaf Zahedi; Mani B. Srivastava

2007-09-01T23:59:59.000Z

64

Information-based self-organization of sensor nodes of a sensor network  

DOE Patents (OSTI)

A sensor node detects a plurality of information-based events. The sensor node determines whether at least one other sensor node is an information neighbor of the sensor node based on at least a portion of the plurality of information-based events. The information neighbor has an overlapping field of view with the sensor node. The sensor node sends at least one communication to the at least one other sensor node that is an information neighbor of the sensor node in response to at least one information-based event of the plurality of information-based events.

Ko, Teresa H. (Castro Valley, CA); Berry, Nina M. (Tracy, CA)

2011-09-20T23:59:59.000Z

65

Ontology-Based Network Management: Study Cases and Lessons Learned  

Science Conference Proceedings (OSTI)

Ontology based network management has recently evolved from a theoretical proposal to a more mature technology. As such, it is now being applied in many research projects in a number of different network management and security scenarios. This application ... Keywords: Autonomic management, Lessons learned, Network monitoring, Network security, OWL, Ontology-based network management, SWRL, Study case

Jorge E. López De Vergara; Antonio Guerrero; Víctor A. Villagrá; Julio Berrocal

2009-09-01T23:59:59.000Z

66

Tcl/Tk, Tkined, and Network Management  

E-Print Network (OSTI)

ing with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission. Request permissions from Jerrid Hamann, at jhamann@cs.tamu.edu. iv Abstract The importance of network management has increased over the last decade as present networks have become critical for the success of many organizations. Network management software is designed to cope with problems from the size and complexity and heterogeneity of today's multi-protocol networks. My semester project for the Department of Engineering Technology, Telecommunications division, was to investigate Schonwalder and Langendorfer's Tcl research, learn their network management tools, including Tkined and Scotty, and customize this tool for monitoring equipment within the Department of Engineering Technology and the Department of Computer Science network. My goals for this project included: ffl Tcl/Tk Learn the Tcl language and the Tk Toolkit ffl Tkined Lea...

Jerrid Hamann; Submitted To Dr. Pierre Catala; The Tk Toolkit

1996-01-01T23:59:59.000Z

67

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

68

A Robust and Flexible Design for GCEP Unattended Online Enrichment Monitoring: An OLEM Collection Node Network  

SciTech Connect

Oak Ridge National Laoratory (ORNL) has engineered an on-line enrichment monitor (OLEM) to continuously measure U-235 emissions from the UF6 gas flowing through a unit header pipe of a gas centrifuge enrichment plant (GCEP) as a component of the International Atomic Energy Agency s (IAEA) new generation of technology to support enrichment plant safeguards1. In contrast to other enrichment monitoring approaches, OLEM calibrates and corrects for the pressure and temperature dependent UF6 gas-density without external radiation sources by using the inherent unit header pipe pressure dynamics and combining U-235 gamma-ray spectrometery using a shielded NaI detector with gas pressure and temperature data near the spectrum measurement point to obtain the enrichment of the gas as a function of time. From a safeguards perspective, OLEM can provide early detection of a GCEP being misused for production of highly enriched uranium, but would not detect directly the isolation and use of a cascade within the production unit to produce HEU. OLEM may also reduce the number of samples collected for destructive assay and, if coupled with load cell monitoring, could support isotope mass balance verification and unattended cylinder verification. The earlier paper presented OLEM as one component along with shared load cells and unattended cylinder verification, in the IAEA emering toolbox for unattended instruments at GCEPs1 and described the OLEM concept and how previous modeling studies and field measurements helped confirm the viability of a passive on-line enrichment monitor for meeting IAEA objectives and to support the development of performance targets. Phase I of the United States Support Program (USSP) OLEM project completed a preliminary hardware, software and communications design; phase II will build and test field prototypes in controlled laboratory settings and then at an operational facility. That paper also discussed many of the OLEM collection node commercial off the shelf (COTS) components and summarized the OLEM collection node data security provisions. This paper will discuss a secure and redundant network of OLEM collection nodes, auxiliary detection units and supporting junction boxes distributed throughout a facility for monitoring enrichment on product, feed and tails unit header pipes; the purpose and capability of the built-in Electronic Optical Sealing System (EOSS) network gateway; and a network approach for obtaining reliable and authenticated pressure measurements.

Younkin, James R [ORNL; March-Leuba, Jose A [ORNL; Garner, James R [ORNL

2013-01-01T23:59:59.000Z

69

Simplifying and speeding the management of intra-node cache coherence  

DOE Patents (OSTI)

A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Phillip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Yorktown Heights, NY)

2012-04-17T23:59:59.000Z

70

Robust Controls for Network Revenue Management  

Science Conference Proceedings (OSTI)

Revenue management models traditionally assume that future demand is unknown but can be described by a stochastic process or a probability distribution. Demand is, however, often difficult to characterize, especially in new or nonstationary markets. ... Keywords: network, regret, revenue management, robust optimization, yield management

Georgia Perakis; Guillaume Roels

2010-01-01T23:59:59.000Z

71

Tera-node Network Technology (TASK 4) Network Infrastructure Activities (NIA) final report  

SciTech Connect

The TNT project developed software technologies in scalable personal telecommunications (SPT), Reservation Protocol 2 (RSVP2), Scalable Computing Infrastructure (SCOPE), and Network Infrastructure Activities (NIA). SPT = developed many innovative protocols to support the use of videoconferencing applications on the Internet. RSVP2 = developed a new reference model and further standardization of RSVP. SCOPE = developed dynamic resource discovery techniques and distributed directory services in support of resource allocation for large distributed systems and computations. NIA = provided policy, operational, and support to the transitioning Internet.

Postel, John; Bannister, Joe

2000-03-15T23:59:59.000Z

72

Topology management in ad hoc networks  

Science Conference Proceedings (OSTI)

The efficiency of a communication network depends not only on its control protocols, but also on its topology. We propose a distributed topology management algorithm that constructs and maintains a backbone topology based on a minimal dominating set ... Keywords: ad hoc networks, connected dominating set, minimum dominating set

Lichun Bao; J. J. Garcia-Luna-Aceves

2003-06-01T23:59:59.000Z

73

Special Issue "Underwater Sensor Nodes and Underwater Sensor Networks" A special issue of Sensors (ISSN 1424-8220)  

E-Print Network (OSTI)

Special Issue "Underwater Sensor Nodes and Underwater Sensor Networks" A special issue of Sensors (ISSN 1424-8220) Website: http://www.mdpi.com/journal/sensors/special_issues/underwater_sens Journal prediction, oil monitoring and so on. This special issue tries to collect the recent advances on underwater

Chen, Min

74

A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes  

Science Conference Proceedings (OSTI)

This article presents three versions of a novel MAC protocol for IEEE 802.11 ad-hoc networks called Busy Signal-based Mechanism turned On (BusySiMOn) (This is an extended version of our conference paper: [15]). The key idea of the proposed solution is ... Keywords: EDCA, Hidden nodes, MAC protocol, QoS, Wireless communications

Katarzyna Kosek-Szott; Marek Natkaniec; Andrzej R. Pach

2013-08-01T23:59:59.000Z

75

Stream traffic management over an ATM passive optical network  

Science Conference Proceedings (OSTI)

Keywords: ATM traffic management, fibre-in-the-loop, passive optical network (PON), service disciplines

Maurice Gagnaire; Sašo Stojanovski

2000-05-01T23:59:59.000Z

76

Information Model for Policy-Based Network Security Management  

Science Conference Proceedings (OSTI)

Policy Based Network Management (PBNM) for network security has been paid much attention as a solution to consistent and unified management of security systems including IDS (Intrusion Detection System) and Firewall. In this paper, we define NSPIM (Network ...

Sook-Yeon Kim; Myung-Eun Kim; Kiyoung Kim; Jongsoo Jang

2002-01-01T23:59:59.000Z

77

Embedding global barrier and collective in torus network with each node combining input from receivers according to class map for output to senders  

DOE Patents (OSTI)

Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computer program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.

Chen, Dong; Coteus, Paul W; Eisley, Noel A; Gara, Alan; Heidelberger, Philip; Senger, Robert M; Salapura, Valentina; Steinmacher-Burow, Burkhard; Sugawara, Yutaka; Takken, Todd E

2013-08-27T23:59:59.000Z

78

Management of electric vehicle battery charging in distribution networks.  

E-Print Network (OSTI)

??This thesis investigated the management of electric vehicle battery charging in distribution networks. Different electric vehicle fleet sizes and network locations were considered. The energy… (more)

Grau, Iñaki

2012-01-01T23:59:59.000Z

79

Network-Driven Demand Side Management Website | Open Energy Informatio...  

Open Energy Info (EERE)

Side Management Website Jump to: navigation, search Name Network-Driven Demand Side Management Website Abstract This task of the International Energy Agency is a broad,...

80

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

HydroNode: an underwater sensor node prototype for monitoring hydroelectric reservoirs  

Science Conference Proceedings (OSTI)

The research of underwater sensor networks (UWSNs) is gaining attention due to its possible applications in many scenarios, such as ecosystem preservation, disaster prevention, oil and gas exploration and freshwater reservoirs management. The main elements ... Keywords: hydroelectric, monitoring, reservoirs, underwater sensor networks, underwater sensor node

Luiz F. M. Vieira; Marcos A. M. Vieira; David Pinto; José Augusto M. Nacif; Sadraque S. Viana; Alex B. Vieira

2012-11-01T23:59:59.000Z

82

A virtual ad hoc network testbed  

Science Conference Proceedings (OSTI)

Testing of applications for ad hoc networks poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that ... Keywords: MANETs, SITL, VAN, emulation, hybrid testbed, mobile ad hoc networks, mobile networks, network management, shadow nodes, simulation, software-in-, the-loop, virtual ad hoc networks, virtual machines, virtual networks, virtualisation

Alex Poylisher; Constantin Serban; John Lee; Tai-Chuan Lu; Ritu Chadha; Cho-Yu Jason Chiang; Robert Orlando; Kimberly Jakubowski

2010-07-01T23:59:59.000Z

83

The placement-configuration problem for intrusion detection nodes in wireless sensor networks  

Science Conference Proceedings (OSTI)

The deployment and configuration of a distributed network intrusion detection system (NIDS) in a large Wireless Sensor Network (WSN) is an enormous challenge. A reduced number of devices equipped with detection capabilities have to be placed on strategic ...

Juan E. Tapiador, John A. Clark

2013-10-01T23:59:59.000Z

84

Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks  

Science Conference Proceedings (OSTI)

The wireless mesh network is a new emerging broadband technology providing the last-mile Internet access for mobile users by exploiting the advantage of multiple radios and multiple channels. The throughput improvement of the network relies heavily on ... Keywords: Channel assignment, Multiple channels, Multiple radios, Particle swarm optimization algorithm, Wireless mesh networks

Hongju Cheng; Naixue Xiong; Athanasios V. Vasilakos; Laurence Tianruo Yang; Guolong Chen; Xiaofang Zhuang

2012-07-01T23:59:59.000Z

85

A study on SDH/OTN integrated network management method  

Science Conference Proceedings (OSTI)

An efficient management method for the Optical Transport Network (OTN) and Synchronous Digital Hierarchy (SDH) integrated network is described. We propose layer boundary section by focusing on the connection terminal point function on the OTN layer and, ... Keywords: OTN, SDH, integrated management, overlay-network

Kei Karato; Shun Yamamoto; Tomoyoshi Kataoka; Yukihide Yana; Yuzo Fujita

2009-09-01T23:59:59.000Z

86

Service and Network Management Interworking in Future Wireless Systems  

Science Conference Proceedings (OSTI)

The need for seamless communications in future wireless networks imposes the development of distributed management systems, in which we can distinguish between different business entities, the Service and Network Providers. Such a highly dynamic environment ...

V. Tountopoulos; Vera Stavroulaki; Panagiotis Demestichas; Nikolas Mitrou; Michael E. Theologou

2002-05-01T23:59:59.000Z

87

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

88

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

89

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

90

A Trustworthy Mobile Agent Infrastructure for Network Management  

E-Print Network (OSTI)

Koliousis,A.K. Sventek,J.S. The Tenth IFIP/IEEE International Symposium on Integrated Network Management 2007 (IM'07) pp 383-390 IEEE

Koliousis, A.K.

91

Solar Energy Collection and Management for Networked Infomechanical Systems (NIMS)  

E-Print Network (OSTI)

Networked Sensing Solar Energy Collection and Management forProposed Solution: Solar Energy Harvesting Why is Solarbeing recharged • Solar energy harvesting and storage allow

2003-01-01T23:59:59.000Z

92

Evaluating The Performance Of Mobile Agents In Network Management  

E-Print Network (OSTI)

Currently, most network management systems are centralized and therefore, they can not scale when the size or the complexity of the network increases. This paper aims to investigate mobile agent scalability in network management, in order to nd when mobile agents improve the management efficiency. We compare mobile agent performance with SNMP one in several simulations. Results show that the mobile agent performs better when the number of managed network elements ranges between two bounds and that the mobile agent is less sensitive to changes on a general topology.

Marcelo Gonçalves Rubinstein; Otto Carlos Muniz Bandeira Duarte; Marcelo Gon#alves Rubinstein; Otto Carlos Muniz B; Eira Duarte

1999-01-01T23:59:59.000Z

93

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and JBOSS. Addthis Related Articles V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering...

94

Distributed MAC protocol for networks with multipacket reception capability and spatially distributed nodes  

E-Print Network (OSTI)

The physical layer of future wireless networks will be based on novel radio technologies such as Ultra-Wideband (UWB) and Multiple-Input Multiple-Output (MIMO). One of the important capabilities of such technologies is the ...

Celik, Guner Dincer

2007-01-01T23:59:59.000Z

95

Optimal SISO and MIMO Spectral Efficiency to Minimize Hidden-Node Network Interference  

E-Print Network (OSTI)

In this letter, the optimal spectral efficiency for a given message size that minimizes the probability of causing disruptive interference for ad hoc wireless networks or cognitive radios is investigated. Implicitly, the ...

Lincoln Laboratory; Bliss, Daniel W.; Bliss, Daniel W.

96

Wireless sensor network node with asynchronous architecture and vibration harvesting micro power generator  

Science Conference Proceedings (OSTI)

This paper presents recent advances in the development of a microsystem designed to be part of a wireless sensor network. This microsystem is developed with two particular technologies: asynchronous circuits and ambient energy harvesting power generator. ...

Yasser Ammar; Aurélien Buhrig; Marcin Marzencki; Benoît Charlot; Skandar Basrour; Karine Matou; Marc Renaudin

2005-10-01T23:59:59.000Z

97

Energy Management in Wireless Sensor Networks with Energy-hungry Sensors  

E-Print Network (OSTI)

In recent years, the number of wireless sensor network deployments for real life applications has rapidly increased. Still, the energy problem remains one of the major barrier somehow preventing the complete exploitation of this technology. Sensor nodes are typically powered by batteries with a limited lifetime and, even when additional energy can be harvested from the external environment (e.g., through solar cells or piezo-electric mechanisms), it remains a limited resource to be consumed judiciously. Efficient energy management is thus a key requirement for a credible design of a wireless sensor network. Most energy management strategies proposed in the literature assume that data acquisition consumes significantly less energy than their transmission. Unfortunately, this assumption does not hold in a number of practical applications where the power consumption of the sensing activity may be comparable or even greater than that of the radio. In this context, effective energy management strategies should include policies for an efficient use of energy-hungry sensors, which become one of the main components affecting the network lifetime. In this paper, we survey the main approaches for efficient energy management in sensor networks with energy-hungry sensors.

Cesara Alippi; Mario Di Francesco; Manuel Roveri; Mario Di Francesco

2009-01-01T23:59:59.000Z

98

Large engineering project risk management using a Bayesian belief network  

Science Conference Proceedings (OSTI)

This paper presents a scheme for large engineering project risk management using a Bayesian belief network and applies it to the Korean shipbuilding industry. Twenty-six different risks were deduced from expert interviews and a literature review. A survey ... Keywords: Bayesian belief network, Risk management in large engineering projects, Shipbuilding industry

Eunchang Lee; Yongtae Park; Jong Gye Shin

2009-04-01T23:59:59.000Z

99

Using Hy+ for network management and distributed debugging  

Science Conference Proceedings (OSTI)

A network manager managing a computer network or a programmer attempting to understand and debug a distributed program both must deal with large volumes of data. Visualization is widely believed to help in these and similar tasks. We contend that visualization ...

Mariano P. Consens; Masum Z. Hasan; Alberto O. Mendelzon

1993-10-01T23:59:59.000Z

100

A modular middleware for high-level dynamic network management  

Science Conference Proceedings (OSTI)

In addition to the control and supervision of components and connections, network management middlewares are required to enhance reliability and efficiency of distributed systems. In this paper, we describe a modular and distributed middleware architecture ... Keywords: ant algorithms, intelligent middleware, network management, swarm intelligence

Amos Brocco; Béat Hirsbrunner; Michèle Courant

2007-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

A privilege management system for a secure network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege ... Keywords: CEBAF, Chinese Institute of High Energy Physics, Continuous Electron Beam Accelerator Facility, DICCE project, Distributed Informatics Computing and Collaborative Environments project, ESnet, Internet, Old Dominion University, US Department of Energy's Energy Science Network, World Wide Web based interfaces, X-windows, authentication, authorisation, authorization, computer network management, design, distributed computing environment networks, distributed information, implementation, network interfaces, privilege management system, secure network

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

102

A new two level hierarchy structuring for node partitioning in ad hoc networks  

Science Conference Proceedings (OSTI)

A big challenge in designing a distributed application is the partitioning which consists of optimizing the system component inter-communication. In this paper we introduce a new approach of Ad Hoc network group formation based on two level hierarchy ... Keywords: communication, distributed system, graph partitioning, group formation, partitioning

Benaouda Nacéra; Guyennet Hervé; Hammad Ahmed; Mostefai Mohammed

2010-03-01T23:59:59.000Z

103

Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes  

Science Conference Proceedings (OSTI)

The problem of content delivery with a required QoS is currently one of the most important. In ad-hoc networks it is IEEE 802.11 EDCA which tries to face this problem. This paper describes several EDCA line topology configurations with mixed priorities ... Keywords: EDCA, QoS, hidden and exposed nodes, simulations

Katarzyna Kosek; Marek Natkaniec; Luca Vollero

2009-07-01T23:59:59.000Z

104

Definitions of Managed Objects for Synchronous Optical Network (SONET) Linear Automatic Protection Switching (APS) Architectures  

Science Conference Proceedings (OSTI)

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular, it defines objects for managing networks using Synchronous Optical Network (SONET) linear Automatic ...

J. Kuhfeld; J. Johnson; M. Thatcher

2003-03-01T23:59:59.000Z

105

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let...

106

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

107

Information Capacity of Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

Sensor nodes with energy harvesting sources are gaining popularity due to their ability to improve the network life time and are becoming a preferred choice supporting 'green communication'. We study such a sensor node with an energy harvesting source and compare various architectures by which the harvested energy is used. We find its Shannon capacity when it is transmitting its observations over an AWGN channel and show that the capacity achieving energy management policy is the same as the throughput optimal policy. We also obtain the capacity for the system with energy inefficiencies in storage and an achievable rate when energy conserving sleep-wake modes are supported.

Rajesh, R

2010-01-01T23:59:59.000Z

108

Network partitioning and self-sizing methods for QoS management with autonomic characteristics  

Science Conference Proceedings (OSTI)

The increasing complexity, heterogeneity and unpredictability of networks make the task of managing these systems highly complex. The autonomic computing paradigm brings innovative solutions to the network management area with new adaptable and "clever" ... Keywords: LSPs, MPLS, autonomic computing, bandwidth allocation, computational complexity, network management, network partitioning, quality of service, self-sizing networks

Romildo Martins Da Silva Bezerra; Joberto Sérgio Barbosa Martins

2009-09-01T23:59:59.000Z

109

Similarity management in phonebookcentric social networks  

E-Print Network (OSTI)

In the past years many social network implementations have come to existence. There is not one network but many, and the user-base of these networks is different. Connecting the users of the separate networks is currently unsolved and seducing new users to existing systems becomes harder and harder as the users are not willing to join too many systems and build up their contact base from scratch each time. In this paper we propose a solution for the problem of finding existing contacts in a new system. An implementation of the described algorithm is also illustrated. Utilizing the algorithm in existing or new social networks can efficiently reduce the time needed for the users to find their friends in a newly joined network. 1.

Péter Ekler; Zoltán Ivánfi; Kristóf Aczél

2009-01-01T23:59:59.000Z

110

An architecture for context aware management  

Science Conference Proceedings (OSTI)

Military networks are subject to frequent changes due to hostile activities, movement of forces, weather conditions, terrain, etc. In order to function optimally, the network nodes must be able to rapidly adapt to the changes in the environment. Traditionally, ... Keywords: ad hoc network, context aware management, core ad hoc network, policy management

Catharina Candolin; Hannu H. Kari

2003-10-01T23:59:59.000Z

111

ElementNodeIterator  

Science Conference Proceedings (OSTI)

... iter=element->node_iterator(); !iter.end(); ++iter) { Node *node = iter.node(); // do something ... node returns a pointer to the iterator's current Node . ...

2013-08-23T23:59:59.000Z

112

PRESTO: feedback-driven data management in sensor networks  

Science Conference Proceedings (OSTI)

This paper presents PRESTO, a novel two-tier sensor data management architecture comprising proxies and sensors that cooperate with one another for acquiring data and processing queries. PRESTO proxies construct time-series models of observed trends ... Keywords: data management, model-driven push, sensor networks, time-series models

Ming Li; Deepak Ganesan; Prashant Shenoy

2009-08-01T23:59:59.000Z

113

Study of location management for next generation personal communication networks  

Science Conference Proceedings (OSTI)

The main target of location management is to maintain location of users while minimizing the system operation. The process consists of location update, paging, and database consideration. The location update and paging manages the user-network interaction ... Keywords: centralized database (CDB), distributed database (DDB), location area scheme, location update, timer-based update strategy, velocity paging (VP)

Teerapat Sanguankotchakorn; Panuvit Wibullanon

2005-03-01T23:59:59.000Z

114

A generic architecture for autonomic service and network management  

Science Conference Proceedings (OSTI)

As the Internet evolves into an all-IP communication infrastructure, a key issue to consider is that of creating and managing IP-based services with efficient resource utilization in a scalable, flexible, and automatic way. In this paper, we present ... Keywords: Autonomic service management, Bandwidth sharing, DiffServ/MPLS networks, Quality of service, Service level agreement

Yu Cheng; Ramy Farha; Myung Sup Kim; Alberto Leon-Garcia; James Won-Ki Hong

2006-11-01T23:59:59.000Z

115

Energy efficient sensor node implementations  

Science Conference Proceedings (OSTI)

In this paper, we discuss a low power embedded sensor node architecture we are developing for distributed sensor network systems deployed in a natural environment. In particular, we examine the sensor node for energy efficient processing-at-the-sensor. ... Keywords: acoustic, distributed sensor network (dsn), dsp, fpga, seismic, vehicle classification, video

Jan R. Frigo; Eric Y. Raby; Sean M. Brennan; Christophe Wolinski; Charles Wagner; Francois Charot; Edward Rosten; Vinod K. Kulathumani

2010-02-01T23:59:59.000Z

116

A File Location, Replication, and Distribution System for Network Information to Aid Network Management  

E-Print Network (OSTI)

This thesis demonstrates and evaluates the design, architecture, and implementation of a file location, replication, and distribution system built with the objective of managing information in an Internet network. The ...

Cheng, Tiffany

2010-09-22T23:59:59.000Z

117

A file location, replication, and distribution system for network information to aid network management  

E-Print Network (OSTI)

This thesis demonstrates and evaluates the design, architecture, and implementation of a file location, replication, and distribution system built with the objective of managing information in an Internet network. The ...

Cheng, Tiffany (Tiffany R.)

2010-01-01T23:59:59.000Z

118

Agent-based policy-enabled network management architecture for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

We describe in this paper a novel design of a network management architecture that incorporates both agent and policy technologies. The conceptual model, main components, and various transports employed in this architecture are discussed. We believe ...

Ritu Chadha; Cho-Yu Jason Chiang; Mike Little; Sunil Samtani

2003-10-01T23:59:59.000Z

119

Network Management and Performance Monitoring at SLAC  

E-Print Network (OSTI)

Subjectively, the ultimate measurers of system performance are the users and their perceptions of the performance of their networked applications. The performance of a system is affected by the physical network plant (routers, bridges, hubs, etc.) as well as by every "computer " and peripheral device that is attached to it, and the software running on the computers and devices. Performance monitoring of a network must therefore include computer systems and services monitoring and well as monitoring of the physical network plant. This paper will describe how this challenge has been tackled at SLAC, and how, via the World Wide Web 1,2 , this information is made available for quick perusal by concerned personnel and users. INTRODUCTION The ultimate measure of system performance is the perception of the users. The users' perception is generally based on the response time to various commands they enter at their keyboards. This maybe any command from a print command, the submission of a l...

Logg And; C. A. Logg; R. L. A. Cottrell

1995-01-01T23:59:59.000Z

120

Sinoatrial node  

NLE Websites -- All DOE Office Websites (Extended Search)

NA Date: NA Question: What is the force that acts upon the sinoatrial node in the heart that makes the sinoatrial node send out the electrical charge that causes the heart to...

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

KALwEN: a new practical and interoperable key management scheme for body sensor networks  

Science Conference Proceedings (OSTI)

Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made. ... Keywords: body area networks, body sensor networks, healthcare, key management, security

Yee Wei Law; Giorgi Moniava; Zheng Gong; Pieter Hartel; Marimuthu Palaniswami

2011-11-01T23:59:59.000Z

122

A Re-Engineering, Methodology for CooperativeManagement of Enterprise Networks  

Science Conference Proceedings (OSTI)

With the increasing implementation by networked mission-critical applications, an enterprise network is becoming the lifeline of an organization. Massive investments are being made in the modernization of enterprise networks of diverse service organizations, ... Keywords: CSCW, ENTERPRISE NETWORKS, MANAGEMENT PROCESSES, NETWORK AND SYSTEMS MANAGEMENT, REENGINEERING

Pradeep Ray; Michael Fry; Bhumip Khasnabish

1999-03-01T23:59:59.000Z

123

Radiation detection and situation management by distributed sensor networks  

Science Conference Proceedings (OSTI)

Detection of radioactive materials in an urban environment usually requires large, portal-monitor-style radiation detectors. However, this may not be a practical solution in many transport scenarios. Alternatively, a distributed sensor network (DSN) could complement portal-style detection of radiological materials through the implementation of arrays of low cost, small heterogeneous sensors with the ability to detect the presence of radioactive materials in a moving vehicle over a specific region. In this paper, we report on the use of a heterogeneous, wireless, distributed sensor network for traffic monitoring in a field demonstration. Through wireless communications, the energy spectra from different radiation detectors are combined to improve the detection confidence. In addition, the DSN exploits other sensor technologies and algorithms to provide additional information about the vehicle, such as its speed, location, class (e.g. car, truck), and license plate number. The sensors are in-situ and data is processed in real-time at each node. Relevant information from each node is sent to a base station computer which is used to assess the movement of radioactive materials.

Jan, Frigo [Los Alamos National Laboratory; Mielke, Angela [Los Alamos National Laboratory; Cai, D Michael [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

124

Belgium east loop active network management (Smart Grid Project) | Open  

Open Energy Info (EERE)

Belgium east loop active network management (Smart Grid Project) Belgium east loop active network management (Smart Grid Project) Jump to: navigation, search Project Name Belgium east loop active network management Country Belgium Coordinates 50.148746°, 4.086914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.148746,"lon":4.086914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

125

Revenue Management in a Dynamic Network Environment  

E-Print Network (OSTI)

. Typical applications include sequential reservations for an airline network, hotel, or car rental service an airline (hotel, car rental) net- work composed of l legs (pairs of consecutive days for hotels, car : Rj is the fare category of class j, which utilizes aij units of resource (leg) i. In this way, 0041

Bertsimas, Dimitris

126

CONGESTION MANAGEMENT ALLOCATION IN MULTIPLE TRANSACTION NETWORKS  

E-Print Network (OSTI)

the nondiscriminatory transmission charges for each transaction's usage of the network. We illustrate the workings in the rapid disintegration of the well-entrenched vertically integrated structure of the electric industry of transactions. In the new competitive electricity market environment, the transmission system takes on a common

Gross, George

127

The Use of Context-Aware Policies and Ontologies to Facilitate Business-Aware Network Management  

Science Conference Proceedings (OSTI)

The purpose of autonomic networking is to manage the business and technical complexity of networked components and systems. However, existing network management data has no link to business concepts. This makes it very difficult to ensure that services ... Keywords: Context, Ontology-based management, Policy management, Semantic reasoning

John Strassner; Sven Meer; Declan O'Sullivan; Simon Dobson

2009-09-01T23:59:59.000Z

128

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

129

Open problems in network-aware data management in exa-scale computing and terabit networking era  

Science Conference Proceedings (OSTI)

Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, ... Keywords: data-intensive, distributed computing, high-bandwidth networks, network-aware tools, resource provisioning

Mehmet Balman; Surendra Byna

2011-11-01T23:59:59.000Z

130

Power flow management of microgrid networks using model predictive control  

Science Conference Proceedings (OSTI)

In this paper, we present a power flow management method for a network of cooperating microgrids within the context of a smart grid by formulating the problem in a model predictive control framework. In order to reliably and economically provide the ... Keywords: Microgrid, Model predictive control, Renewable energy sources, Smart grid, Storage devices

A. Hooshmand; H. A. Malki; J. Mohammadpour

2012-09-01T23:59:59.000Z

131

Social Networking for Emergency Management and Public Safety  

SciTech Connect

On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

2010-08-31T23:59:59.000Z

132

Managing vendor relations: a case study of two HPC network issues  

Science Conference Proceedings (OSTI)

High performance computing requires fast networks to move large amounts of data between compute nodes and disk storage. For a variety of reasons, however, the fast speeds achieved by bleeding edge network technology tend to come along with a higher risk ...

Loren Jan Wilson

2010-11-01T23:59:59.000Z

133

Knowledge-based mobility management for personal agents in the all-mobile network  

Science Conference Proceedings (OSTI)

The paper deals with mobility management in the all-mobile network where mobile and intelligent software agents represent the users in the network and support terminal, user and service mobility. A mobility management model, suitable for the agent's ...

Ignac Lovrek; Vjekoslav Sinkovic

2008-12-01T23:59:59.000Z

134

Network Security Management for Transmission Systems  

Science Conference Proceedings (OSTI)

The electric power grid is increasingly dependent on information technology and telecommunication infrastructures.   While great benefits will result from this influx of technology, a holistic and granular awareness of all elements of the information infrastructure supporting a control subsystem will be critical to ensure long term reliability and security. The management of this information infrastructure requires connectivity and analytics to support both IT and OT assets in a unified ...

2012-12-31T23:59:59.000Z

135

Node-Capacitated Ring Routing  

Science Conference Proceedings (OSTI)

We consider the node-capacitated routing problem in an undirected ring network along with its fractional relaxation, the node-capacitated multicommodity flow problem. For the feasibility problem, Farkas' lemma provides a characterization for general ... Keywords: half-integral flow, multicommodity flow, ring routing

AndrÁs Frank; Bruce Shepherd; Vivek Tandon; Zoltán Végh

2002-05-01T23:59:59.000Z

136

A comprehensive solution to ATM network planning and bandwidth management using Genetic Algorithm  

Science Conference Proceedings (OSTI)

Wireless Asynchronous Transfer Mode (ATM) is fast becoming an option in the telecommunication area and consequently there is a renewed interest in developing broadband integrated service of digital network technologies namely ATM. In order to ... Keywords: ATM networks, ATM planning, GAs, asynchronous transfer mode, bandwidth management, genetic algorithms, network design, network planning, optimisation, passive optical networks, wireless ATM

Susmi Routray; Arun Mohan Sherry; B. V. R. Reddy

2008-03-01T23:59:59.000Z

137

Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?  

E-Print Network (OSTI)

Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters blindly broadcast without knowledge of the surrounding nodes, two fundamental design parameters are the node transmission probability and the transmission spectral efficiency. In this paper these parameters are selected to maximize end-to-end performance, characterized by the product of transmitter density, hop distance and rate. Due to the intractability of the problem as stated, an approximation function is examined which proves reasonably accurate. Our results show how the above design parameters should be selected based on inherent system parameters such as the path loss exponent and the noise level.

Blomer, Joseph

2010-01-01T23:59:59.000Z

138

Active time scheduling for rechargeable sensor networks  

Science Conference Proceedings (OSTI)

Recent progress in energy harvesting technologies made it possible to build sensor networks with rechargeable nodes which target an indefinitely long operation. In these networks, the goal of energy management is to allocate the available energy such ... Keywords: Energy harvesting, Rechargeable, Sensor network

Volodymyr Pryyma; Damla Turgut; Ladislau Bölöni

2010-03-01T23:59:59.000Z

139

Power management and power control in wireless networks  

E-Print Network (OSTI)

With the proliferation of portable computing platforms and small wireless devices, wireless networks have received more and more attention as a means for providing data communications among devices regardless of their physical locations. However, due to the slow advancement in battery technology, battery power continues to be a constrained resource in wireless networks and thus energy conservation remains to be an important issue. In this book chapter, we provide a taxonomy of power management and power control algorithms and protocols for wireless networks. We start with a description of energy consumption characteristics of wireless devices, and identify the power consumed in the wireless transmitters essentially consists of two parts: power consumed by the radio electronic and power consumed in the RF output. To save power, one can either turn off the radio electronic and put wireless devices into the power saving mode at appropriate times, or adjust the RF output power (and hence the wireless transmission range) subject to maintaining network connectivity and bi-directionality. The former techniques are termed as power management, while the latter power

Rong Zheng; Jennifer C. Hou; Ning Li

2004-01-01T23:59:59.000Z

140

Open transport switch: a software defined networking architecture for transport networks  

Science Conference Proceedings (OSTI)

There have been a lot of proposals to unify the control and management of packet and circuit networks but none have been deployed widely. In this paper, we propose a simple programmable architecture that abstracts a core transport node into a programmable ... Keywords: optical networks, otn, sdn, transport networks, virtualization

Abhinava Sadasivarao, Sharfuddin Syed, Ping Pan, Chris Liou, Andrew Lake, Chin Guok, Inder Monga

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Active Network Management (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Management (Smart Grid Project) Management (Smart Grid Project) Jump to: navigation, search Project Name Active Network Management Country United Kingdom Coordinates 55.378052°, -3.435973° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":55.378052,"lon":-3.435973,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

142

uRbAn: A Multipath Routing based Architecture with Energy and Mobility Management for Quality of Service Support in Mobile Ad hoc Networks  

E-Print Network (OSTI)

Designing a wireless node that supports quality of service (QoS) in a mobile ad hoc network is a challenging task. In this paper, we propose an architecture of a wireless node that may be used to form a mobile ad hoc network that supports QoS. We discuss the core functionalities required for such a node and how those functionalities can be incorporated. A feature of our architecture is that the node has the ability to utilize multiple paths, if available, for the provision of QoS. However, in the absence of multiple paths it can utilize the resources provided by a single path between the source and the destination. We follow a modular approach where each module is expanded iteratively. We compare the features of our architecture with the existing architectures proposed in the literature. Our architecture has provisions of energy and mobility management and it can be customized to design a system-on-chip (SoC).

Abbas, Ash Mohammad

2011-01-01T23:59:59.000Z

143

Wireless Sensors and Networks for Advanced Energy Management  

SciTech Connect

Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modeling investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.

Hardy, J.E.

2005-05-06T23:59:59.000Z

144

Quasi-parallel network applications in real-time distribution management system  

Science Conference Proceedings (OSTI)

In modern distribution management systems (DMSs), the real-time calculation of the network's state plays an important role for the operation of the network. High sophisticated algorithms for the estimation and calculation of the system's ...

Izudin Dzafic; Hans-Theo Neisius

2012-03-01T23:59:59.000Z

145

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

146

Traffic Management and Net Neutrality in Wireless Networks  

E-Print Network (OSTI)

with desired network operation in wireless networks than inwireless devices have a greater ability to negatively interfere with desired network operation

Jordan, Scott

2011-01-01T23:59:59.000Z

147

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

148

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

149

Compute Node MD3000 Storage Array  

E-Print Network (OSTI)

Compute Node MD3000 Storage Array Dell 2950 Head Node 24-Port Switch Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node Compute Node 24-Port Switch Dell 2950

Weber, David J.

150

A Clean Slate 4D Approach to Network Control and Management  

E-Print Network (OSTI)

A Clean Slate 4D Approach to Network Control and Management Albert Greenberg, Gisli Hjalmtysson on this crucially important and intellectually challenging area. Categories and Subject Descriptors C.2.1 [Network Architecture and Design]: Packet Switching Net- works; C.2.2 [Network Protocols]: Routing Protocols; C.2

Xie, Geoffrey

151

Wireless networking security: open issues in trust, management, interoperation and measurement  

Science Conference Proceedings (OSTI)

The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques ... Keywords: interoperation, management, measurement, network security, open security, trust, wireless networks, wireless security

Joseph B. Evans; Weichao Wang; Benjamin J. Ewy

2006-09-01T23:59:59.000Z

152

Security data extraction from IEC 61850 ACSI models for network and system management  

Science Conference Proceedings (OSTI)

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, ... Keywords: IEC 61850, IEC 62351, network and system management, power grid security, smart grid security

Chung-Hyo Kim; Moon-Seok Choi; Seong-Ho Ju; Yong-Hun Lim; Jong-Mock Baek

2011-08-01T23:59:59.000Z

153

Energy Management System for an Hybrid Electric Vehicle, Using Ultracapacitors and Neural Networks  

E-Print Network (OSTI)

Energy Management System for an Hybrid Electric Vehicle, Using Ultracapacitors and Neural Networks management system for hybrid electric vehicles (HEV), using neural networks (NN), was developed and tested, similar in shape and size to a Chevrolet S-10, which was converted to an electric vehicle

Rudnick, Hugh

154

Formal validation of automated policy refinement in the management of network security systems  

Science Conference Proceedings (OSTI)

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy ... Keywords: Formal validation, Model-based management, Network security, Policy based management, Security policies

João Porto de Albuquerque; Heiko Krumm; Paulo Lício de Geus

2010-04-01T23:59:59.000Z

155

Integrating service discovery with routing and session management for ad-hoc networks  

Science Conference Proceedings (OSTI)

In this paper, we propose GSR: a new routing and session management protocol for ad-hoc networks as an integral part of a service discovery infrastructure. Traditional approaches place routing at a layer below service discovery. While this distinction ... Keywords: Ad-hoc networks, Routing, Service discovery, Service-centric routing, Session management

Dipanjan Chakraborty; Anupam Joshi; Yelena Yesha

2006-03-01T23:59:59.000Z

156

A Reputation Model Based on Behavior Trust in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Trust management has an important significance on the reliable operation and safety guarantee in Wireless Sensor Networks(WSNs). Previous works were implemented by exchanging key among neighboring sensors. Considering that in many cases, the sensor nodes’ ...

Ming-Zheng Zhou; Yi Zhang; Jun Wang; Sen-Yan Zhao

2009-09-01T23:59:59.000Z

157

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

158

Application of Artificial Neural Networks to Complex Groundwater Management Problems  

SciTech Connect

As water quantity and quality problems become increasingly severe, accurate prediction and effective management of scarcer water resources will become critical. In this paper, the successful application of artificial neural network (ANN) technology is described for three types of groundwater prediction and management problems. In the first example, an ANN was trained with simulation data from a physically based numerical model to predict head (groundwater elevation) at locations of interest under variable pumping and climate conditions. The ANN achieved a high degree of predictive accuracy, and its derived state-transition equations were embedded into a multiobjective optimization formulation and solved to generate a trade-off curve depicting water supply in relation to contamination risk. In the second and third examples, ANNs were developed with real-world hydrologic and climate data for different hydrogeologic environments. For the second problem, an ANN was developed using data collected for a 5-year, 8-month period to predict heads in a multilayered surficial and limestone aquifer system under variable pumping, state, and climate conditions. Using weekly stress periods, the ANN substantially outperformed a well-calibrated numerical flow model for the 71-day validation period, and provided insights into the effects of climate and pumping on water levels. For the third problem, an ANN was developed with data collected automatically over a 6-week period to predict hourly heads in 11 high-capacity public supply wells tapping a semiconfined bedrock aquifer and subject to large well-interference effects. Using hourly stress periods, the ANN accurately predicted heads for 24-hour periods in all public supply wells. These test cases demonstrate that the ANN technology can solve a variety of complex groundwater management problems and overcome many of the problems and limitations associated with traditional physically based flow models.

Coppola, Emery [NOAH LLC. (United States)], E-mail: noah.llc@mail.com; Poulton, Mary [University of Arizona, Department of Mining and Geological Engineering (United States); Charles, Emmanuel [U.S. Geological Survey (United States); Dustman, John [Summit EnviroSolutions (United States); Szidarovszky, Ferenc [University of Arizona, Department of Systems and Industrial Engineering (United States)

2003-12-15T23:59:59.000Z

159

Proposal of service management system for multimedia network environment  

Science Conference Proceedings (OSTI)

In a multimedia network environment, the network connection is required to support real-time data transmission and flexible architecture. IEEE 1394, a high performance serial bus that guarantees real-time streaming and supports Plug & Play, would be ... Keywords: IEEE 1394, multimedia network, network configuration, plug & play, service discovery

Atsunobu Takagi; Takahiro Koita; Kenya Sato

2007-03-01T23:59:59.000Z

160

Hopper Login Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Login Nodes Login Nodes Login Nodes Login Node Quick Facts When you ssh to hopper.nersc.gov, you are connecting to a "login node." Login nodes are used to edit files, compile codes, and submit job scripts to the batch system to run on the "compute nodes." Hopper has 12 login nodes (this is largely transparent to users). 4 quad-core AMD 2.4 GHz Opteron processers (16 cores total) on 8 of the login nodes 4 8-core AMD 2.0 GHz Opteron processors (32 cores total) on 4 of the login nodes. Each login node has 128 GB of memory. The login nodes sit behind a load balancer. New connections are assigned to a login node on a round robin fashion with the exception that if you've connected to Hopper recently, the load balancer will attempt to put you on the same login node as your previous connection.

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Wireless Sensor Network for Advanced Energy Management Solutions  

Science Conference Proceedings (OSTI)

Eaton has developed an advanced energy management solution that has been deployed to several Industries of the Future (IoF) sites. This demonstrated energy savings and reduced unscheduled downtime through an improved means for performing predictive diagnostics and energy efficiency estimation. Eaton has developed a suite of online, continuous, and inferential algorithms that utilize motor current signature analysis (MCSA) and motor power signature analysis (MPSA) techniques to detect and predict the health condition and energy usage condition of motors and their connect loads. Eaton has also developed a hardware and software platform that provided a means to develop and test these advanced algorithms in the field. Results from lab validation and field trials have demonstrated that the developed advanced algorithms are able to detect motor and load inefficiency and performance degradation. Eaton investigated the performance of Wireless Sensor Networks (WSN) within various industrial facilities to understand concerns about topology and environmental conditions that have precluded broad adoption by the industry to date. A Wireless Link Assessment System (WLAS), was used to validate wireless performance under a variety of conditions. Results demonstrated that wireless networks can provide adequate performance in most facilities when properly specified and deployed. Customers from various IoF expressed interest in applying wireless more broadly for selected applications, but continue to prefer utilizing existing, wired field bus networks for most sensor based applications that will tie into their existing Computerized Motor Maintenance Systems (CMMS). As a result, wireless technology was de-emphasized within the project, and a greater focus placed on energy efficiency/predictive diagnostics. Commercially available wireless networks were only utilized in field test sites to facilitate collection of motor wellness information, and no wireless sensor network products were developed under this project. As an outgrowth of this program, Eaton developed a patented energy-optimizing drive control technology that is complementary to a traditional variable frequency drives (VFD) to enable significant energy savings for motors with variable torque applications, such as fans, pumps, and compressors. This technology provides an estimated energy saving of 2%-10% depending on the loading condition, in addition to the savings obtained from a traditional VFD. The combination of a VFD with the enhanced energy-optimizing controls will provide significant energy savings (10% to 70% depending on the load and duty cycle) for motors that are presently connected with across the line starters. It will also provide a more favorable return on investment (ROI), thus encouraging industries to adopt VFDs for more motors within their facilities. The patented technology is based on nonintrusive algorithms that estimate the instantaneous operating efficiency and motor speed and provide active energy-optimizing control of a motor, using only existing voltage and current sensors. This technology is currently being commercialized by Eaton’s Industrial Controls Division in their next generation motor control products. Due to the common nonintrusive and inferential nature of various algorithms, this same product can also include motor and equipment condition monitoring features, providing the facility owner additional information to improve process uptime and the associated energy savings. Calculations estimated potential energy savings of 261,397GWh/Yr ($15.7B/yr), through retrofitting energy-optimizing VFDs into existing facilities, and incorporating the solution into building equipment sold by original equipment manufacturers (OEMs) and installed by mechanical and electrical contractors. Utilizing MCSA and MPSA for predictive maintenance (PM) of motors and connected equipment reduces process downtime cost and the cost of wasted energy associated with shutting down and restarting the processes. Estimated savings vary depending on the industry segment and equi

Peter J. Theisen; Bin Lu, Charles J. Luebke

2009-09-23T23:59:59.000Z

162

MANAGING THE NATIONAL ROAD NETWORK MAINTENANCE IN SPAIN Vctor Gmez Fras  

E-Print Network (OSTI)

, then to establish a maintenance policy. Finally, the Management System calculates a maintenance plan, detailingMANAGING THE NATIONAL ROAD NETWORK MAINTENANCE IN SPAIN Víctor Gómez Frías GETINSA (Spain), vgomez technical, economic and administrative management models. The Subdirectorate of Maintenance and Operation

Paris-Sud XI, Université de

163

Mobile identity management system in heterogeneous wireless networks  

Science Conference Proceedings (OSTI)

Heterogeneous wireless networks increasingly encroach on our lives. Various technologies and mobile applications more often than usual are now used by mobile users. Intensive development of mobile networks not only sets new standards for radio, but increasingly ...

?Ukasz Kucharzewski; Zbigniew Kotulski

2011-01-01T23:59:59.000Z

164

Wireless mesh network security: A traffic engineering management approach  

Science Conference Proceedings (OSTI)

The wireless mesh network (WMN) is an emerging multihop, heterogeneous, easily scalable and low cost network. The architecture of the WMN is a connectionless-oriented, mobile and dynamic traffic of routed packets. The mesh infrastructure environment ... Keywords: IPSec, MPLS, Security, Traffic engineering, VPN, Wireless mesh networks

Okechukwu E. Muogilim; Kok-Keong Loo; Richard Comley

2011-03-01T23:59:59.000Z

165

Design and test of nodes for field information acquisition based on WUSN  

Science Conference Proceedings (OSTI)

The wireless sensor network technology was researched. Some wireless underground sensor network nodes and a sink node based on embedded technology and RF technology were designed innovatively. WUSN node consists of sensor, the processor, wireless communication ... Keywords: MSP430, WUSN, depth, field information acquisition, frequency, sink node

Xiaoqing Yu; Pute Wu; Zenglin Zhang

2011-10-01T23:59:59.000Z

166

Distributed Management of High-Layer Protocols and Network Services through a Programmable Agent-Based Architecture  

Science Conference Proceedings (OSTI)

This paper proposes an architecture for distributed management of upper layer protocols and network services called Trace. Based on the IETF Script MIB, the architecture provides mechanisms for the delegation of management tasks to mid-level managers, ...

Luciano Paschoal Gaspary; Luis Felipe Balbinot; Roberto Storch; Fabricio Wendt; Liane M. Rockenbach Tarouco

2001-07-01T23:59:59.000Z

167

Intercell radio resource management through network coordination for IMT-advanced systems  

Science Conference Proceedings (OSTI)

In IMT-Advanced systems, a cross-layer approach coupling network coordination and radio resource managements enables mitigation of intercell interference and throughput improvement of cell-edge users. To facilitate coordination among base stations, we ...

Young-June Choi; Narayan Prasad; Sampath Rangarajan

2010-02-01T23:59:59.000Z

168

Capacity control in network revenue management : clustering and risk-aversion  

E-Print Network (OSTI)

Network revenue management is the practice of using optimal decision policies to increase revenues by controlling limited quantities of multiple resources' availability and prices over finite time. It is widely practiced ...

Park, Joongwoo Brian

2010-01-01T23:59:59.000Z

169

The Use of a Hopfield Neural Network in Solving the Mobility Management Problem  

Science Conference Proceedings (OSTI)

This work presents a new approach to solve the location management problem by using the location areas approach. Hopfield Neural Network is used in this work to find the optimal configuration of location areas in a mobile network. Toward this end, the ...

Javid Taheri; Albert Y. Zomaya

2004-07-01T23:59:59.000Z

170

DevoFlow: scaling flow management for high-performance networks  

Science Conference Proceedings (OSTI)

OpenFlow is a great concept, but its original design imposes excessive overheads. It can simplify network and traffic management in enterprise and data center environments, because it enables flow-level control over Ethernet switching and provides global ... Keywords: data center, flow-based networking, switch design

Andrew R. Curtis; Jeffrey C. Mogul; Jean Tourrilhes; Praveen Yalagandula; Puneet Sharma; Sujata Banerjee

2011-08-01T23:59:59.000Z

171

Energy estimator for weather forecasts dynamic power management of wireless sensor networks  

Science Conference Proceedings (OSTI)

Emerging Wireless Sensor Networks (WSN) consist of spatially distributed autonomous sensors. Although an embedded battery has limited autonomy, most WSNs outperform this drawback by harvesting ambient energy from the environment. Nevertheless, this external ... Keywords: design tools, dynamic power management, weather forecasts, wireless sensor networks

Nicolas Ferry; Sylvain Ducloyer; Nathalie Julien; Dominique Jutel

2011-09-01T23:59:59.000Z

172

Multisensor Module for Networked Infomechanical Systems  

E-Print Network (OSTI)

Wireless networks links also include interfaces to distributed mote networks. • Energy for MultiSensor node operation

Jason Gordon; Kris Porter; Lisa Shirachi; Rachel Scollans; Victor Chen; William Kaiser

2005-01-01T23:59:59.000Z

173

Energy harvesting sensor nodes: Survey and implications  

E-Print Network (OSTI)

Sensor networks with battery-powered nodes can seldom simultaneously meet the design goals of lifetime, cost, sensing reliability and sensing and transmission coverage. Energy-harvesting, converting ambient energy to electrical energy, has emerged as an alternative to power sensor nodes. By exploiting recharge opportunities and tuning performance parameters based on current and expected energy levels, energy harvesting sensor nodes have the potential to address the conflicting design goals of lifetime and performance. This paper surveys various aspects of energy harvesting sensor systems — architecture, energy sources and storage technologies and examples of harvesting-based nodes and applications. The study also discusses the implications of recharge opportunities on sensor node operation and design of sensor network solutions. 1

Sujesha Sudevalayam; Purushottam Kulkarni

2008-01-01T23:59:59.000Z

174

IDEA: integrated distributed energy awareness for wireless sensor networks  

Science Conference Proceedings (OSTI)

Energy in sensor networks is a distributed, non-transferable resource. Over time, differences in energy availability are likely to arise. Protocols like routing trees may concentrate energy usage at certain nodes. Differences in energy harvesting arising ... Keywords: optimization, resource distribution, resource management, wireless sensor networks

Geoffrey Werner Challen; Jason Waterman; Matt Welsh

2010-06-01T23:59:59.000Z

175

Energy conservation in wireless sensor networks: A survey  

Science Conference Proceedings (OSTI)

In the last years, wireless sensor networks (WSNs) have gained increasing attention from both the research community and actual users. As sensor nodes are generally battery-powered devices, the critical aspects to face concern how to reduce the energy ... Keywords: Energy efficiency, Power management, Survey, Wireless sensor networks

Giuseppe Anastasi; Marco Conti; Mario Di Francesco; Andrea Passarella

2009-05-01T23:59:59.000Z

176

Condition based management of gas turbine engine using neural networks.  

E-Print Network (OSTI)

??This research work is focused on the development of the hybrid neural network model to asses the gas turbine’s compressor health. Effects of various gas… (more)

Muthukumar, Krishnan.

2008-01-01T23:59:59.000Z

177

Evaluating I/O aware network management for scientific workflows on networked clouds  

Science Conference Proceedings (OSTI)

This paper presents a performance evaluation of scientific workflows on networked cloud systems with particular emphasis on evaluating the effect of provisioned network bandwidth on application I/O performance. The experiments were run on ExoGENI, a ... Keywords: I/O performance, networked clouds, performance evaluation, performance monitoring, scientific workflows

Anirban Mandal, Paul Ruth, Ilya Baldin, Yufeng Xin, Claris Castillo, Mats Rynge, Ewa Deelman

2013-11-01T23:59:59.000Z

178

How Evolving Network Access and Network Management Technologies are Redefining the Competitive Wireless Markets  

Science Conference Proceedings (OSTI)

This paper examines some of the key problems users encounter when accessing current generation wireless networks. Using a case study of a hypothetical user, the authors explore the emerging services and the new broadband wireless network technologies ... Keywords: Autonomic Communications, Broadband Wireless Access Technologies, Cognitive Wireless Networks, Short and Long-Term Service Contracts, Two-Sided Markets, User-Centric Services

Fernando Beltrán; Jairo A. Gutiérrez; José Luis Melús

2011-07-01T23:59:59.000Z

179

Thermal Modeling, Characterization and Management of On-chip Networks  

E-Print Network (OSTI)

Due to the wire delay constraints in deep submicron technology and increasing demand for on-chip bandwidth, networks are becoming the pervasive interconnect fabric to connect processing elements on chip. With ever-increasing power density and cooling costs, the thermal impact of onchip networks needs to be urgently addressed.

Li Shang; Li-shiuan Peh; Amit Kumar; Niraj K. Jha

2004-01-01T23:59:59.000Z

180

Energy packet networks: adaptive energy management for the cloud  

Science Conference Proceedings (OSTI)

In the presence of limitations in the availability of energy for data centres, especially in dense urban areas, a novel system that we call an Energy Packet Network is discussed as a means to provide energy on demand to Cloud Computing servers. ... Keywords: cloud computing, energy packet networks, energy provisioning on demand, smart grid

Erol Gelenbe

2012-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Wireless Sensor Node Placement Using Hybrid Genetic Programming and Genetic Algorithms  

Science Conference Proceedings (OSTI)

The ease of use and re-configuration in a wireless network has played a key role in their widespread growth. The node deployment problem deals with an optimal placement strategy of the wireless nodes. This paper models a wireless sensor network, consisting ... Keywords: Genetic Algorithms, Genetic Programming, Hierarchical Genetic Algorithms, Node Deployment, Wireless Sensor Networks Optimization

Arpit Tripathi; Pulkit Gupta; Aditya Trivedi; Rahul Kala

2011-04-01T23:59:59.000Z

182

A flexible building management framework based on wireless sensor and actuator networks  

Science Conference Proceedings (OSTI)

Future buildings will be constantly monitored and managed through intelligent systems that allow having information about the building health, keeping a good comfort level for the building inhabitants and optimizing the energy spent. Despite many WSN ... Keywords: Building management systems, Domain-specific framework, Sensor programming, Wireless sensor and actuator networks

G. Fortino; A. Guerrieri; G. M. P. O'Hare; A. Ruzzelli

2012-11-01T23:59:59.000Z

183

Building a Flexible Energy Management System with LonWorks Control Network  

Science Conference Proceedings (OSTI)

To effectively improve the efficiency of energy supply, quantification is required to determine its significance in our daily lives. Building an energy management system to monitor and acquire information such as energy supply and environmental factors ... Keywords: LonWorks, Control network, Energy management system, Database

Ching-Biau Tzeng; Tzuu-Shaang Wey; Sheng-Hsiung Ma

2008-11-01T23:59:59.000Z

184

Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks  

Science Conference Proceedings (OSTI)

Energy consumption is one of the most important parameters for evaluation of a scheme proposed for WSNs because of their resource constraint nature. Comprehensive comparative analysis of proposed reputation-based trust management schemes of WSNs from ... Keywords: reputation, sensor networks, trust evaluation, trust management

Riaz Ahmed Shaikh; Young-Koo Lee; Sungyoung Lee

2009-02-01T23:59:59.000Z

185

Using VMware VCenter lab manager in undergraduate education for system administration and network security  

Science Conference Proceedings (OSTI)

We have developed and managed a virtual laboratory environment by deploying the VMware vCenter Lab Manager and the VMware vSphere vCenter on a load-balanced cluster of eight ESX 3.5 servers and a storage area network of 10.8 Tera bytes. This system has ... Keywords: education, hands-on, lab manager, laboratory experiments, system administration, virtualization

Xinli Wang; Guy C. Hembroff; Rick Yedica

2010-10-01T23:59:59.000Z

186

Data Transfer Nodes Yield Results!  

NLE Websites -- All DOE Office Websites (Extended Search)

DTN DTN Data Transfer Nodes Yield Results August 1, 2011 | Tags: Accelerator Science, Data Transfer, ESnet Linda Vu, +1 510 495 2402, lvu@lbl.gov The ability to reliably move and share data around the globe is essential to scientific collaboration, that's why three Department of Energy (DOE) Scientific Computing Centers-Argonne and Oak Ridge Leadership Computing Facilities, and the National Energy Research Scientific Computing Center (NERSC)-have teamed up to focus on optimizing wide area network (WAN) transfers. This ongoing effort began several years ago when each site deployed dedicated transfer nodes (DTNs), optimized for carrying data between the DOE facilities. Today, engineers from each site continue to meet regularly with DOE's Energy Sciences Network staff (ESnet) to develop strategies

187

A Trustworthy Mobile Agent Infrastructure for Network Management  

E-Print Network (OSTI)

Koliousis,A. Sventek,J.S. Proceedings of the IFIP/IEEE Symposium on Integrated Management, Munich, Germany, May 2007

Koliousis, A.; Sventek, J.S.

188

Hopper Compute Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Compute Nodes Compute Nodes Compute Nodes MC-proc.png Compute Node Configuration 6,384 nodes 2 twelve-core AMD 'MagnyCours' 2.1-GHz processors per node (see die image to the right and schematic below) 24 cores per node (153,216 total cores) 32 GB DDR3 1333-MHz memory per node (6,000 nodes) 64 GB DDR3 1333-MHz memory per node (384 nodes) Peak Gflop/s rate: 8.4 Gflops/core 201.6 Gflops/node 1.28 Peta-flops for the entire machine Each core has its own L1 and L2 caches, with 64 KB and 512KB respectively One 6-MB L3 cache shared between 6 cores on the Magny-Cours processor Four DDR3 1333-MHz memory channels per twelve-core 'MagnyCours' processor Compute Node Software By default the compute nodes run a restricted low-overhead operating system optimized for high performance computing called "Cray Linux Environment"

189

Applying physical-layer network coding in wireless networks  

Science Conference Proceedings (OSTI)

A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. ...

Shengli Zhang; Soung Chang Liew

2010-01-01T23:59:59.000Z

190

User Centric Policy Management in Online Social Networks  

Science Conference Proceedings (OSTI)

Online social networking sites are experiencing tremendous user growth with hundreds of millions of active users. As a result, there is a tremendous amount of user profile data online, e.g., name, birth date, etc. Protecting this data is a challenge. ...

Mohamed Shehab; Gorrell Cheek; Hakim Touati; Anna C. Squicciarini; Pau-Chen Cheng

2010-07-01T23:59:59.000Z

191

Resource management policies for fixed relays in cellular networks  

Science Conference Proceedings (OSTI)

Mobile stations in the cell boundary experience poor spectral efficiency due to the path loss and interference from adjacent cells. Therefore, satisfying QoS requirements of each MS at the cell boundary has been an important issue. To resolve this spectral ... Keywords: Cellular networks, Fixed relay, Path selection, Resource reuse, Spectral efficiency

Won-Hyoung Park; Saewoong Bahk

2009-03-01T23:59:59.000Z

192

Quantifying And Managing The Influence Of Maintenance Actions On The Survivability Of Mesh-Restorable Networks  

E-Print Network (OSTI)

of "roll to protection" in rings. The basic methods can be adapted for other maintenance models or models of the restoration process or adapted to handle multiple maintenance scenarios. The work is aimed at understanding and managing the effects of maintenance in a mesh-restorable network and ultimately providing new operational and design capabilities for future mesh-based network planning and operations systems. I. Motivation and Background One of the motivations for mesh-restorable networking is the greater capacity efficiency of mesh networks relative to ring-based transport networks. The capacity efficiency comes from the more direct routing of working paths, the need for less spare capacity for restoration, and the avoidance of "stranded capacity" effects in rings where one or more ring spans may exhaust while other spans of the ring have valuable but unusable remaining working capacity. Of course capacity efficiency is not the only consideration in a choice of n

Wayne D. Grover; Matthieu Clouqueur; Thuthuy Bach

2001-01-01T23:59:59.000Z

193

PDSF Interactive Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Interactive (login) Nodes Interactive (login) Nodes Interactive (login) Nodes There are 4 interactive nodes at PDSF, pdsf[1-4].nersc.gov, that should be accessed via ssh to pdsf.nersc.gov. These are the gateways to accessing the rest of PDSF. Users can submit batch jobs as well as view and manipulate their files and directories from the interactive nodes. The configuration of the interactive nodes is shown in the table below. Processor Clock Speed (GHz) Architecture Cores Total Memory (GB) Scratch Space (GB) Intel Xeon X5650 2.67 x86_64 12 47 184 Because these nodes are shared by many users anything disruptive you might do affects not only your work but their work, too. Please take a look at the Best Practices page for guidance about what you should and should not do on the interactive nodes.

194

PDSF Compute Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Compute Nodes Compute Nodes Compute Nodes There are currently 2632 nodes available on PDSF. The compute (batch) nodes at PDSF are heterogenous, reflecting the periodic procurement of new nodes (and the eventual retirement of old nodes). From the user's perspective they are essentially all equivalent except that some have more memory per job slot. If your jobs have memory requirements beyond the default maximum of 1.1GB you should specify that in your job submission and the batch system will run your job on an appropriate node. See Submitting jobs for more information. Processor Clock Speed (GHz) Architecture Cores Available Memory (GB) Scratch (GB/core) Job Slots Quad Intel 2.2 lx24-amd64 8 23.4 10 8 QuadCore AMD/Intel 2.1 lx24-amd64 8 15.6 10 8 6 Core Intel 2.3 lx24-amd64 12 47.0 10 12

195

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager (NCM) database CVE-2012-4614. Impact: A remote user can connect to the target database. A local user can obtain passwords. Solution: The vendor has issued a fix (9.1)....

196

Forecasting for airline network revenue management : revenue and competitive impacts  

E-Print Network (OSTI)

Airline revenue management entails protecting enough seats for late-booking, high-fare passengers while still selling seats which would have otherwise gone empty at discounted fares to earlier-booking customers. In the ...

Zickus, Jeffrey S.

1998-01-01T23:59:59.000Z

197

Reliable networks with unreliable sensors  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) deployed in hostile environments suffer from a high rate of node failure. We investigate the effect of such failure rate on network connectivity. We provide a formal analysis that establishes the relationship between node ...

Srikanth Sastry; Tsvetomira Radeva; Jianer Chen; Jennifer L. Welch

2011-01-01T23:59:59.000Z

198

Managing Power Consumption in Networks on Chips Tajana Simunic  

E-Print Network (OSTI)

terminals [12,13] force the transition to a low power state as soon as a component becomes idle behavior. In addition to transitioning components into low-power states during idle times, power manager of transition from the idle state, through the other power states and then back into the idle state can

Simunic, Tajana

199

Bounds on coverage time and node density for multi-modality sensing  

Science Conference Proceedings (OSTI)

In wireless sensor networks, nodes may employ multiple sensing modalities to improve the robustness of covering a region. Multi-modality coverage requires that every point in the region be covered by at least one node for each sensing modality. In this ... Keywords: Coverage, Multi-modality sensing, Network lifetime, Node density

Sandeep Kour Ahuja; Shrinivasa Kini; Srinivasan Ramasubramanian

2009-09-01T23:59:59.000Z

200

Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are increasingly being used in applications where the communication between nodes needs to be protected from eavesdropping and tampering. Such protection is typically provided using techniques from symmetric key cryptography. ... Keywords: Energy efficient key distribution, Key management, Key refreshment, Sensor network security, Symmetric cryptography

Issa Khalil; Saurabh Bagchi; Ness Shroff

2007-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

An Empirical Analysis of Semantic Techniques Applied to a Network Management Classification Problem  

Science Conference Proceedings (OSTI)

Semantic technologies are increasingly being employed to integrate, relate and classify heterogeneous data from various problem domains. To date, however, little empirical analysis has been carried out to help identify the benefits and limitations of ... Keywords: OWL, SWRL, SPARQL, axioms, rules, queries, network performance management

Aidan Boran; Ivan Bedini; Christopher J. Matheus; Peter F. Patel-Schneider; Stefan Bischof

2012-12-01T23:59:59.000Z

202

A Cell Based Dynamic Spectrum Management Scheme with Interference Mitigation for Cognitive Networks  

Science Conference Proceedings (OSTI)

Future wireless systems are expected to be characterized by the coexistence of different radio access technologies (RATs) resulting in complex heterogeneous wireless environments. In parallel with this, the tremendous demand for spectrum has ... Keywords: Bargaining patience, Cognitive networks, Dynamic spectrum management, Game theory, Inter-system interference, Profit

Vanbien Le; Zhiyong Feng; Didier Bourse; Ping Zhang

2009-04-01T23:59:59.000Z

203

Novel optical-fiber network management system in central office using RFID and LED navigation technologies  

Science Conference Proceedings (OSTI)

Optical IP services such as FTTH have been growing rapidly, leading to an urgent need to manage the optical fiber network from the central office. We have developed an optical-fiber distribution facility called an IDM. However, the changing FTTH environment ... Keywords: FTTH, RFID, automatic navigation system, human error

Masaki Waki; Shigenori Uruno; Yoshitaka Enomoto; Yuji Azuma

2009-09-01T23:59:59.000Z

204

Energy Management Framework Designed for Autonomous Electric Vehicle with Sensor Networks Navigation  

Science Conference Proceedings (OSTI)

Cyber-physical systems (CPS) have emerged as a cutting edge technology for next-generation industrial applications, and are undergoing rapid development and inspiring numerous application domains. This article presents an innovative CPS application for ... Keywords: cyber-physical systems, wireless sensor networks, energy management, energy-efficient design, autonomous electric vehicle

Hui Suo, Jiafu Wan, Di Li, Caifeng Zou

2012-10-01T23:59:59.000Z

205

Dual home agent (DHA)-based location management scheme in integrated cellular-WLAN networks  

Science Conference Proceedings (OSTI)

For seamless integration of cellular and wireless local area network (WLAN) systems, we introduce a dual home agent (DHA)-based location management. The DHA maintains the location information both in the cellular and WLAN systems, and therefore unnecessary ... Keywords: Cellular-WLAN integration, Dual home agent (DHA), Mobile IP, Performance analysis

Sangheon Pack; Wonjun Lee

2008-12-01T23:59:59.000Z

206

A Self-Adaptive Spectrum Management Middleware for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The vision of the Internet of Things, wherein everyday objects are embedded with smart wireless sensor devices, is making these sensor devices increasingly pervasive. As the density of their deployment in overlapping or adjacent areas increases, the ... Keywords: Mediaaccess control, Spectrum management, Wireless sensor networks

Robert Thompson; Gang Zhou; Lei Lu; Sudha Krishnamurthy; Hover Dong; Xin Qi; Yantao Li; Matthew Keally; Zhen Ren

2013-01-01T23:59:59.000Z

207

Network  

NLE Websites -- All DOE Office Websites (Extended Search)

network - launched in November 2012. The network was built in collaboration with Internet2, an advanced network, which connects the nation's research universities. Leveraging...

208

Network coding: an instant primer  

Science Conference Proceedings (OSTI)

Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. There are two ... Keywords: network coding

Christina Fragouli; Jean-Yves Le Boudec; Jörg Widmer

2006-01-01T23:59:59.000Z

209

Power/energy estimator for designing WSN nodes with ambient energy harvesting feature  

Science Conference Proceedings (OSTI)

Wireless Sensor Networks (WSNs) consist of spatially distributed autonomous sensors to cooperatively monitor physical conditions. Thus, the node battery autonomy is critical. To outperform it, most WSNs rely on the harvesting capability. As nodes can ...

Nicolas Ferry; Sylvain Ducloyer; Nathalie Julien; Dominique Jutel

2011-01-01T23:59:59.000Z

210

Information Theoretic Adaptive Tracking of Epidemics in Complex Networks  

E-Print Network (OSTI)

Adaptively monitoring the states of nodes in a large complex network is of interest in domains such as national security, public health, and energy grid management. Here, we present an information theoretic adaptive tracking and sampling framework that recursively selects measurements using the feedback from performing inference on a dynamic Bayesian Network. We also present conditions for the existence of a network specific, observation dependent, phase transition in the updated posterior of hidden node states resulting from actively monitoring the network. Since traditional epidemic thresholds are derived using observation independent Markov chains, the threshold of the posterior should more accurately model the true phase transition of a network. The adaptive tracking framework and epidemic threshold should provide insight into modeling the dynamic response of the updated posterior to active intervention and control policies while monitoring modern complex networks.

Harrington, Patrick L

2013-01-01T23:59:59.000Z

211

Secure localization with phantom node detection  

Science Conference Proceedings (OSTI)

In an adversarial environment, various kinds of attacks become possible if malicious nodes could claim fake locations that are different from their physical locations. In this paper, we propose a secure localization mechanism that detects existence of ... Keywords: Decentralized algorithm, Localization, Location verification, Secure localization, Sensor networks, Speculative algorithm

Joengmin Hwang; Tian He; Yongdae Kim

2008-09-01T23:59:59.000Z

212

The SysMES Framework: System Management for Networked Embedded Systems and Clusters  

E-Print Network (OSTI)

Automated system management for large distributed and heterogeneous environments is a common challenge in modern computer sciences. Desired properties of such a management system are, among others, a minimal dependency on human operators for problem recognition and solution, adaptability to increasing loads, fault tolerance and the flexibility to integrate new management resources at runtime. Existing tools address parts of these requirements however there is no single integrated framework which possesses all mentioned characteristics. SysMES was developed as an integrated framework for automated monitoring and management of networked devices. In order to achieve the requirements of scalability and fault tolerance, a fully distributed and decentralized architecture has been chosen. The framework comprises a monitoring module, a rule engine and an executive module for the execution of actions. A formal language has been defined which allows administrators to define complex spatial and temporal rule conditions ...

Lara Martinez, Camilo Ernesto

213

Criticality condition for information floating with random walk of nodes  

Science Conference Proceedings (OSTI)

In an opportunistic content sharing system referred to as floating content, information is copied between mobile nodes upon node encounters inside an area which is called the anchor zone. We study the conditions under which information can be sustained ... Keywords: Opportunistic networking, Random walk, Transport equation

Jorma Virtamo; Esa Hyytiä; Pasi Lassila

2013-02-01T23:59:59.000Z

214

Program on Technology Innovation: Network Management Technology Applied to Power Plant Instrumentation, Control, and Maintenance  

Science Conference Proceedings (OSTI)

Generic solutions developed for the information technology and telecommunications (IT-Telco) fields can benefit power plants willing to modernize instrumentation and control (I&C) equipment and maintenance tasks to take advantage of the expanded functionality of new technologies. This report investigates the applicability of generic network management products to help streamline power plant I&C and maintenance practices. Because of the competitive pressures of a large and expanding marketplace, such gene...

2005-07-25T23:59:59.000Z

215

Flexible Network Attached Storage using Remote DMA  

E-Print Network (OSTI)

We propose to make nodes in a cluster double as compute nodes and network attached storage (NAS) nodes. This allows for a flexible and customizable storage system as the NAS control software is handled by regular workstations. The nodes can still be efficient compute nodes if networks with remote DMA capabilities are used, as such networks remove the processor from the data forwarding loop. We demonstrate this through measurements of a prototype implementation.

Jørgen S. Hansen

2001-01-01T23:59:59.000Z

216

Smart Radio Spectrum Management for Cognitive Radio  

E-Print Network (OSTI)

Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. In this work, a fuzzy logic based system for spectrum management is proposed where the radio can share unused spectrum depending on some parameters like distance, signal strength, node velocity and availability of unused spectrum. The system is simulated and is found to give satisfactory results.

Bhattacharya, Partha Pratim; Gera, Rishita; Agarwal, Anjali

2011-01-01T23:59:59.000Z

217

Secure multidimensional range queries in sensor networks  

Science Conference Proceedings (OSTI)

Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which ... Keywords: multidimensional range query, security, sensor networks,

Rui Zhang; Jing Shi; Yanchao Zhang

2009-05-01T23:59:59.000Z

218

Solar Energy Harvesting for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The commercially available sensor nodes are battery-driven devices. A number of nodes together constitute a network. As days proceed, the batteries used in the nodes lose their charge and subsequently get isolated from the network. Many energy harvesting ... Keywords: Energy Harvest, Recharging Circuitry, Batteries, Low Power Design, MICAz sensor nodes

P. T. V. Bhuvaneswari; R. Balakumar; V. Vaidehi; P. Balamuralidhar

2009-07-01T23:59:59.000Z

219

A network hierarchical feedback system for Taiwanese universities based on the integration of total quality management and innovation  

Science Conference Proceedings (OSTI)

An increasing number of Taiwanese universities are improving operational performance through innovation and total quality management (TQM). In addition, the National Quality Award (NQA), which is based on TQM, is now used to evaluate quality performance ... Keywords: Decision-making trial and evaluation laboratory (DEMATEL), Fuzzy analytical hierarchical process (FAHP), Fuzzy analytical network process (FANP), Gray relational analysis (GRA), Network hierarchical feedback system (NHFS)

Jui-Kuei Chen; I-Shuo Chen

2012-08-01T23:59:59.000Z

220

VANS Role in the Advanced Network Infrastructure  

E-Print Network (OSTI)

network operations, maintenance, and management is becominggoing network management, maintenance, and modification. Innetwork monitoring management, and maintenance operations

Sprafkin, Jeffrey P.

1992-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Design of reliable SONET feeder networks  

Science Conference Proceedings (OSTI)

We address the physical SONET network design problem of selecting stackable, unidirectional rings connecting central office nodes (COs) and remote nodes (RNs). This problem frequently arises in designing feeder transport networks to support centralized ... Keywords: Communications, Heuristic, Integer Programming

June S. Park; Byung Ha Lim; Larry J. Leblanc

2007-03-01T23:59:59.000Z

222

Mutual Exclusion on Multihop, Mobile Wireless Networks  

Science Conference Proceedings (OSTI)

The system considered in this paper is a mobile wireless network, commonly known as an ad hoc network. Mobile nodes in this dynamic topology function both as processors and routers to provide communication between nodes which are not within wireless ...

Jennifer Walter; Savita Kini

1997-12-01T23:59:59.000Z

223

Delay of intrusion detection in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper we consider sensor networks for intrusion detection, such that node deployment, node failures and node behavior result in coverage gaps and a fraction of disconnected nodes in an otherwise dense and well-connected network. We focus on the ... Keywords: delay, intrusion detection, percolation, sensor networks

Olivier Dousse; Christina Tavoularis; Patrick Thiran

2006-05-01T23:59:59.000Z

224

Emergence of collective action and environmental networking in relation to radioactive waste management  

SciTech Connect

This paper explores the relationship between the national environmental movement and nuclear technology in relation to a local emergent group. The historical development of nuclear technology in this conutry has followed a path leading to continued fear and mistrust of waste management by a portion of the population. At the forefront of opposition to nuclear technology are people and groups endorsing environmental values. Because of the antinuclear attitudes of environmentalists and the value orientation of appropriate technologists in the national environmental movement, it seems appropriate for local groups to call on these national groups for assistance regarding nuclear-related issues. A case study is used to illustrate how a local action group, once integrated into a national environmental network, can become an effective, legitimate participant in social change. The formation, emergence, mobilization, and networking of a local group opposed to a specific federal radioactive waste management plan is described based on organizational literature. However, inherent contradictions in defining the local versus national benefits plus inherent problems within the environmental movement could be acting to limit the effectiveness of such networks. 49 refs.

Williams, R.G.; Payne, B.A.

1985-01-01T23:59:59.000Z

225

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

226

A Computational Approach to the Real Option Management of Network Contracts for Natural Gas Pipeline Transport Capacity  

Science Conference Proceedings (OSTI)

Commodity merchants use real option models to manage their operations. A central element of such a model is its underlying operating policy. We focus on network contracts for the transport capacity of natural gas pipelines, specific energy conversion ... Keywords: Monte Carlo simulation, capacity valuation, commodity and energy conversion assets, energy-related operations, heuristics, math programming, natural gas pipelines, operations management practice, operations management/finance interface, petroleum/natural gas industries, real options, sensitivities, spread options

Nicola Secomandi; Mulan X. Wang

2012-07-01T23:59:59.000Z

227

NodeMD: diagnosing node-level faults in remote wireless sensor systems  

Science Conference Proceedings (OSTI)

Software failures in wireless sensor systems are notoriously difficult to debug. Resource constraints in wireless deployments substantially restrict visibility into the root causes of node-level system and application faults. At the same time, the high ... Keywords: deployment, diagnosis, software fault, wireless sensor networks

Veljko Krunic; Eric Trumpler; Richard Han

2007-06-01T23:59:59.000Z

228

Securing network access in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ... Keywords: elliptic curve cryptography, security, sensor networks

Kun Sun; An Liu; Roger Xu; Peng Ning; Douglas Maughan

2009-03-01T23:59:59.000Z

229

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring.  

E-Print Network (OSTI)

??Energy harvesting sensor nodes reduce the need for post- deployment physical human interaction by using environmental power and wireless communication; however, they must adapt performance… (more)

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

230

Deploying a Wireless Sensor Network on an Active Volcano  

Science Conference Proceedings (OSTI)

Augmenting heavy and power-hungry data collection equipment with lighter, smaller wireless sensor network nodes leads to faster, larger deployments. Arrays comprising dozens of wireless sensor nodes are now possible, allowing scientific studies that ... Keywords: wireless sensor networks, sensor network applications, sensor network nodes, volcano research

Geoffrey Werner-Allen; Konrad Lorincz; Matt Welsh; Omar Marcillo; Jeff Johnson; Mario Ruiz; Jonathan Lees

2006-03-01T23:59:59.000Z

231

The n-hop multilateration primitive for node localization problems  

Science Conference Proceedings (OSTI)

The recent advances in MEMS, embedded systems and wireless communication technologies are making the realization and deployment of networked wireless microsensors a tangible task. In this paper we study node localization, a component technology that ... Keywords: ad-hoc localization, distributed localization, sensor networks

Andreas Savvides; Heemin Park; Mani B. Srivastava

2003-08-01T23:59:59.000Z

232

Best signal quality in cellular networks: asymptotic properties and applications to mobility management in small cell networks  

Science Conference Proceedings (OSTI)

The quickly increasing data traffic and the user demand for a full coverage of mobile services anywhere and anytime are leading mobile networking into a future of small cell networks. However, due to the high-density and randomness of small cell networks, ...

Van Minh Nguyen; François Baccelli; Laurent Thomas; Chung Shue Chen

2010-01-01T23:59:59.000Z

233

Spatial Networks  

E-Print Network (OSTI)

Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated to the length of edges which in turn has dramatic effects on the topological structure of these networks. We will expose thoroughly the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spa...

Barthelemy, Marc

2010-01-01T23:59:59.000Z

234

China: A Rising Scientific (Super-)Power & a Node Embedded in the Global Scientific  

E-Print Network (OSTI)

China: A Rising Scientific (Super-)Power & a Node Embedded in the Global Scientific Network Cong Cao, Ph.D. University of Nottingham Cong.cao@nottingham.ac.uk #12;· China as a Rising Scientific) #12;The Global Scientific Network (25 nations, 2004) #12;· China as a Node Embedded in the Global

Rambaut, Andrew

235

Beat Gebistorf Interconnection of Di erent Network Architectures  

E-Print Network (OSTI)

The future of the Internet is unknown, even more as the currently existing mechanisms are a wonky foundation for the requirements of modern users: Huge e orts have to be taken to manage all participating nodes and to enable the attachment of upcoming network patterns like sensor nodes or delay tolerant networks. The ANA (Autonomic Network Architectures) project tries to introduce a solution to the known problems by handling the protocol stack in a more exible way. The ultimate goal of the ANA project is to design and develop a novel network architecture that enables exible, dynamic, and fully autonomic formation of network nodes as well as whole networks. In this semester thesis a new functional block of the ANA protocol stack was implemented which is able to connect the Internet Protocol world with a network equipped with Field Based Service Discovery. The Internet Protocol builds the central protocol of the current Internet whereas Field Based Service Discovery is a novel protocol adequate for service handling in mobile ad hoc networks. Therefore the implemented functional block builds

Professor Prof; Dr. Bernhard Plattner

2008-01-01T23:59:59.000Z

236

Graceful network state migrations  

Science Conference Proceedings (OSTI)

A significant fraction of network events (such as topology or route changes) and the resulting performance degradation stem from premeditated network management and operational tasks. This paper introduces a general class of Graceful Network State Migration ... Keywords: communication system operations and management, computer network management, network maintenance, network upgrade

Saqib Raza; Yuanbo Zhu; Chen-Nee Chuah

2011-08-01T23:59:59.000Z

237

Multiple crossbar network: A switched high-speed local network  

SciTech Connect

The Multiple Crossbar Network (MCN) is a prototype High-Speed Local Network at the Los Alamos National Laboratory. It will interconnect supercomputers, network servers and workstations from various commercial vendors. The MCN can also serve as a backbone for message traffic between local area networks. The MCN is a switched local network of switching nodes called Cross-Point Stars (CPs). Hosts and CPs are connected by 800-Mbit/s (100-Mbyte/s) point-to-point ANSI High-Speed Channels. CPs include RISC-based network protocol processors called Crossbar Interfaces and a switching core called the Crossbar Switch. Protocols include physical, data link, intranet, and network access functionality. Various internet and transport protocols are intended to run above the MCN protocol suite. A network management and simple naming service is also included within the Los Alamos Network Architecture. Immediate applications include visualization. The MCN is intended to also serve as a framework for multicomputer applications. 36 refs., 10 figs.

Hoebelheinrich, R.; Thomsen, R.

1989-01-01T23:59:59.000Z

238

Health Insurance Portability and Accountability Act-Compliant Ocular Telehealth Network for the Remote Diagnosis and Management of Diabetic Retinopathy  

SciTech Connect

In this article, we present the design and implementation of a regional ocular telehealth network for remote assessment and management of diabetic retinopathy (DR), including the design requirements, network topology, protocol design, system work flow, graphics user interfaces, and performance evaluation. The Telemedical Retinal Image Analysis and Diagnosis Network is a computer-aided, image analysis telehealth paradigm for the diagnosis of DR and other retinal diseases using fundus images acquired from primary care end users delivering care to underserved patient populations in the mid-South and southeastern United States.

Li, Yaquin [University of Tennessee, Knoxville (UTK); Karnowski, Thomas Paul [ORNL; Tobin Jr, Kenneth William [ORNL; Giancardo, Luca [ORNL; Garg, Seema [University of North Carolina; Fox, Karen [Delta Health Alliance; Chaum, Edward [University of Tennessee, Knoxville (UTK)

2011-01-01T23:59:59.000Z

239

Architecture Exploration Based on Tasks Partitioning Between Hardware, Software and Locality for a Wireless Vision Sensor Node  

Science Conference Proceedings (OSTI)

Wireless Vision Sensor Networks WVSNs is an emerging field which consists of a number of Visual Sensor Nodes VSNs. Compared to traditional sensor networks, WVSNs operates on two dimensional data, which requires high bandwidth and high energy consumption. ... Keywords: Hardware/Software Partitioning, Image Processing, Reconfigurable Architecture, Vision Sensor Node, Wireless Vision Sensor Networks

Muhammad Imran; Khursheed Khursheed; Abdul Waheed Malik; Naeem Ahmad; Mattias O'Nils; Najeem Lawal; Benny Thörnberg

2012-04-01T23:59:59.000Z

240

Vehicle Detection by Sensor Network Nodes  

E-Print Network (OSTI)

frequency. Table 4.2: ? and ? Ground truth (# of vehicles)truth (# of vehicles) Detection result (# of vehicles) Tabletruth ( of vehicles) Detection result ( of vehicles) Table

Ding, Jiagen; Cheung, Sing-Yiu; Tan, Chin-woo; Varaiya, Pravin

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Sinoatrial Node of the Heart  

NLE Websites -- All DOE Office Websites (Extended Search)

Sinoatrial Node of the Heart Name: Lance Status: student Age: 12 Location: NA Country: NA Date: NA Question: What is sinoatrial node and how does it affect the heart? Replies:...

242

SA Node of the Heart  

NLE Websites -- All DOE Office Websites (Extended Search)

SA Node of the Heart Name: Amy Location: NA Country: NA Date: NA Question: How does the SA node of the heart produce charges and how do the charges develop? Also what ions are...

243

Distributed energy-efficient hierarchical clustering for wireless sensor networks  

Science Conference Proceedings (OSTI)

Since nodes in a sensor network have limited energy, prolonging the network lifetime and improving scalability become important. In this paper, we propose a distributed weight-based energy-efficient hierarchical clustering protocol (DWEHC). Each node ...

Ping Ding; JoAnne Holliday; Aslihan Celik

2005-06-01T23:59:59.000Z

244

Electrical Power Savings in Pump and Compressor Networks via Load Management  

E-Print Network (OSTI)

Large industrial plants commonly use multiple parallel units in pump and compressor networks for improved reliability. Sometimes, installed equipment capacity can far exceed actual requirements. This excess capacity can be translated into energy cost savings through “optimum load management”. A key decision parameter in determining the operating policy is the Trigger Point at which to switch from N units to N+1, and vice versa. The Trigger Point is defined as the actual flow rate at which the switching is made to the “ideal” (generally maximum) flow rate at which the switching should be made. At the plant under study, the implicit Trigger Point was generally found to be around 85%, probably because this made it easy to have a smooth transition during the switching operation. A number of pumping and compression networks were analyzed to determine what the potential savings would be if this trigger point were increased to 90 or 95%. The savings potential was found to range from 0 to 23%, with an average of 4.4%. Our study demonstrated that by tightening up operating policies to make sure that the minimum number of machines is being run, significant cost savings are possible with zero capital investment, and negligible sacrifice in operating flexibility or reliability. This paper describes the methodology used, as well as representative results from our study.

Kumana, J. D.; Aseeri, A. S.

2005-01-01T23:59:59.000Z

245

Clustering strategies for improving the lifetime of two-tiered sensor networks  

Science Conference Proceedings (OSTI)

In hierarchical sensor networks, sensor nodes are arranged in clusters, and higher-powered relay nodes can be used as cluster heads. Due to the limited transmission range and battery power of the nodes, it is important to develop techniques that minimize ... Keywords: Clustering, Energy-efficient, Relay nodes, Sensor networks, Two-tiered sensor networks

Ataul Bari; Arunita Jaekel; Subir Bandyopadhyay

2008-09-01T23:59:59.000Z

246

PROCEEDINGS OF FOURTH BERKELEY CONFERENCE ON DISTRIBUTED DATA MANAGEMENT AND COMPUTER NETWORKS.  

E-Print Network (OSTI)

packet switching for local computer networks. Comm. of theaddressing capabilities for computer networks. Proe. IEEE,InternatIonal Conference on,Computer CommunIcatIon, August

Hall, Dennis

2011-01-01T23:59:59.000Z

247

A Framework for Assessing the Net Benefits of Home Area Networks to Enable Demand Response  

Science Conference Proceedings (OSTI)

EPRI conducted an analysis to provide insight into the value of a Home Area Network (HAN) to a household. A HAN accommodates the flow of information to and from network nodes each associated with a device or element of the households electric system and devices. This collectivization of household devices facilitates managing the whole house load under demand response program protocols, and provides opportunities for additional payments to the household. EPRI conducted an analysis to see if the added stre...

2010-12-31T23:59:59.000Z

248

Network load-aware content distribution in overlay networks  

Science Conference Proceedings (OSTI)

Massive content distribution on overlay networks stresses both the server and the network resources because of the large volumes of data, relatively high bandwidth requirement, and many concurrent clients. While the server limitation can be circumvented ... Keywords: Content distribution networks, Hypercube, Node selection, Overlay networks, Peer-to-peer networks, Server selection

Seung Chul Han; Ye Xia

2009-01-01T23:59:59.000Z

249

On the structure of elimination trees for Bayesian network inference  

Science Conference Proceedings (OSTI)

We present an optimization to elimination tree inference in Bayesian networks through the use of unlabeled nodes, or nodes that are not labeled with a variable from the Bayesian network. Through the use of these unlabeled nodes, we are able to restructure ... Keywords: Bayesian networks, inference, offline computation

Kevin Grant; Keilan Scholten

2010-11-01T23:59:59.000Z

250

Neighbor Selection Game in Wireless Ad Hoc Networks  

Science Conference Proceedings (OSTI)

In wireless ad hoc networks, there is no infrastructure to enforce cooperation between nodes. As a result, nodes may act selfishly when running network protocols to conserve their energy resources as much as possible. In this paper, we consider the "neighbor ... Keywords: Energy efficiency, Game theory, Neighbor selection, Selfish nodes, Wireless ad hoc networks

Sajjad Zarifzadeh; Nasser Yazdani

2013-05-01T23:59:59.000Z

251

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring  

E-Print Network (OSTI)

Chapter 4. System Energy and Task Management . . 1. Systemof the energy and task management used on systems, a WSNChapter 4 System Energy and Task Management In contrast to

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

252

Decentralized, adaptive resource allocation for sensor networks  

Science Conference Proceedings (OSTI)

This paper addresses the problem of resource allocation in sensor networks. We are concerned with how to allocate limited energy, radio bandwidth, and other resources to maximize the value of each node's contribution to the network. Sensor networks present ...

Geoffrey Mainland; David C. Parkes; Matt Welsh

2005-05-01T23:59:59.000Z

253

Thorough Analysis of IEEE 802.11 EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes  

Science Conference Proceedings (OSTI)

In this paper the authors present a simulation study of five different ring networks with hidden and exposed nodes in which the IEEE 802.11 EDCA function is used as the MAC protocol. The presented analysis is crucial for understanding how the theoretically ... Keywords: Ad-hoc, QoS provisioning, exposed nodes, hidden nodes

Katarzyna Kosek; Marek Natkaniec; Luca Vollero

2009-07-01T23:59:59.000Z

254

Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes  

E-Print Network (OSTI)

Wireless networks with energy harvesting battery powered nodes are quickly emerging as a viable option for future wireless networks with extended lifetime. Equally important to their counterpart in the design of energy harvesting radios are the design principles that this new networking paradigm calls for. In particular, unlike wireless networks considered up to date, the energy replenishment process and the storage constraints of the rechargeable batteries need to be taken into account in designing efficient transmission strategies. In this work, we consider such transmission policies for rechargeable nodes, and identify the optimum solution for two related problems. Specifically, the transmission policy that maximizes the short term throughput, i.e., the amount of data transmitted in a finite time horizon is found. In addition, we show the relation of this optimization problem to another, namely, the minimization of the transmission completion time for a given amount of data, and solve that as well. The tra...

Tutuncuoglu, Kaya

2010-01-01T23:59:59.000Z

255

Mobility-assisted minimum connected cover in a wireless sensor network  

Science Conference Proceedings (OSTI)

All properties of mobile wireless sensor networks (MWSNs) are inherited from static wireless sensor networks (WSNs) and meanwhile have their own uniqueness and node mobility. Sensor nodes in these networks monitor different regions of an area of interest ... Keywords: Energy-aware selection method, Minimum connected sensor cover set, Mobile wireless sensor networks, Redundant node, Relocation

Ahmed M. Khedr; Walid Osamy

2012-07-01T23:59:59.000Z

256

PROCEEDINGS OF THE THIRD BERKELEY WORKSHOP ON DISTRIBUTED DATA MANAGEMENT AND COMPUTER NETWORKS  

E-Print Network (OSTI)

machine of the CYCLADES Computer network", IFIP Congress,End Encryption in Secure Computer Networks". USAF ElectronicTechn. Rpt. CCA-77-09, Computer Corp. of America, (Dec.

Authors, Various

2011-01-01T23:59:59.000Z

257

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring  

E-Print Network (OSTI)

1. Energy Harvesting . . . . . . . . .2. Task Scheduling in Energy Harvesting WSNs 3. DataSensor Networks . . 2. Energy Harvesting . . . . . . . . 3.

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

258

Network regression with predictive clustering trees  

Science Conference Proceedings (OSTI)

Network data describe entities represented by nodes, which may be connected with (related to) each other by edges. Many network datasets are characterized by a form of autocorrelation, where the value of a variable at a given node depends on the values ... Keywords: Autocorrelation, Network data, Predictive clustering trees, Regression inference

Daniela Stojanova; Michelangelo Ceci; Annalisa Appice; Sašo DžEroski

2012-09-01T23:59:59.000Z

259

Trends in Energy Management Technology: BCS Integration Technologies - Open Communications Networking  

E-Print Network (OSTI)

223. Trends in Energy Management Technology CBE/UC BerkeleyTrends in Energy Management Technology CBE/UC Berkeley FEMP/p. 6. Trends in Energy Management Technology CBE/UC Berkeley

Webster, Tom

2002-01-01T23:59:59.000Z

260

An integrated framework for warehouse management using wireless sensor networks and decision support systems  

Science Conference Proceedings (OSTI)

Storage Warehouse managers face diverse challenges in operating and managing a warehouse. Problems range from capacity-planning and inventory management of stored goods, loss or damage of stored goods due to weather changes, pest infestation and improper ...

Punit Ahluwalia; Anand Ramachandran

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Natural networks  

E-Print Network (OSTI)

Scale-free and non-computable characteristics of natural networks are found to result from the least-time dispersal of energy. To consider a network as a thermodynamic system is motivated since ultimately everything that exists can be expressed in terms of energy. According to the variational principle, the network will grow and restructure when flows of energy diminish energy differences between nodes as well as relative to nodes in surrounding systems. The natural process will yield scale-free characteristics because the nodes that contribute to the least-time consumption of free energy preferably attach to each other. Network evolution is a path-dependent and non-deterministic process when there are two or more paths to consume a common source of energy. Although evolutionary courses of these non-Hamiltonian systems cannot be predicted, many mathematical functions, models and measures that characterize networks can be recognized as appropriate approximations of the thermodynamic equation of motion that has been derived from statistical physics of open systems.

Tuomo Hartonen; Arto Annila

2011-06-21T23:59:59.000Z

262

Energy Adaptation Techniques to Optimize Data Delivery in Store-and-Forward Sensor Networks  

E-Print Network (OSTI)

nodes in a sensor network often have widely varying energy profiles due to the amount of data that nodes will have different energy profiles. Due to variations in the hard- ware, manufacturing processes, node placement, and node data requirements, the energy profile of two nodes can vary drastically

Martonosi, Margaret

263

CEMA: Comfort Control and Energy Management Algorithms for Use in Residential Spaces Through Wireless Sensor Networks .  

E-Print Network (OSTI)

??In recent years, many strides have been achieved in the area of Wireless Sensor Networks (WSNs), which is leading to constant innovations in the types… (more)

Henry, Rami F.Z.

2010-01-01T23:59:59.000Z

264

A strategy for the management of energy losses in a local electricity distribution network.  

E-Print Network (OSTI)

??This dissertation contains a strategy to minimize the non-technical electrical energy losses in an electrical distribution network. In order to develop the strategy, a model… (more)

Fourie, Johannes Wilhelmus

2006-01-01T23:59:59.000Z

265

Efficient Production Optimization Using Flow Network Models  

E-Print Network (OSTI)

Reservoir simulation is an important tool for decision making and field development management. It enables reservoir engineers to predict reservoir production performance, update an existing model to reproduce monitoring data, assess alternative field development scenarios and design robust production optimization strategies by taking into account the existing uncertainties. A big obstacle in automating model calibration and production optimization approaches is the massive computation required to predict the response of real reservoirs under proposed changes in the model inputs. To speed up reservoir response predictions without compromising accuracy, fast surrogate models have been proposed. These models are either derived by preserving the physics of the involved processes (e.g. mass balance equations) to provide reliable long-range predictions or are developed based solely on statistical relations, in which case they can only provide short-range predictions due to the absence of the physical processes that govern the long-term behavior of the reservoir. We present an alternative solution that combines the advantages of both statistics-based and physics-based methods by deriving the flow predictions in complex two-dimensional models from one-dimensional flow network models. The existing injection/production wells in the original model form the nodes or vertices of the flow network. Each pair of wells (nodes) in the flow network is connected using a one-dimensional numerical simulation model; hence, the entire reservoir is reduced to a connected network of one-dimensional simulation models where the coupling between the individual one-dimensional models is enforced at the nodes where network edges intersect. The proposed flow network model provides a useful and fast tool for characterizing inter-well connectivity, estimating drainage volume between each pair of wells, and predicting reservoir production over an extended period of time for optimization purposes. We estimate the parameters of the flow network model using a robust training approach to ensure that the flow network model reproduces the response of the original full model under a wide range of development strategies. This step helps preserve the flow network model's predictive power during the production optimization when development strategies can change at different iterations. The robust networks training and the subsequent production optimization iterations are computationally efficient as they are performed with the faster flow network model. We demonstrate the effectiveness and applicability of our proposed flow network modeling approach to rapid production optimization using two-phase waterflooding simulations in synthetic and benchmark models.

Lerlertpakdee, Pongsathorn

2012-08-01T23:59:59.000Z

266

Model-based compression in wireless ad hoc networks  

Science Conference Proceedings (OSTI)

We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes determines network topology. As opposed to encoding individual node locations, ... Keywords: compression, modeling, routing protocols, routing tables, sensor networks, trajectory

Milenko Drinic; Darko Kirovski; Miodrag Potkonjak

2003-11-01T23:59:59.000Z

267

AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks  

Science Conference Proceedings (OSTI)

Among the leading reference implementations of the Software Defined Networking (SDN) paradigm is the OpenFlow framework, which decouples the control plane into a centralized application. In this paper, we consider two aspects of OpenFlow that pose security ... Keywords: control plane saturation attack, openflow, security and resilience, software-defined network (sdn)

Seungwon Shin, Vinod Yegneswaran, Phillip Porras, Guofei Gu

2013-11-01T23:59:59.000Z

268

Radio access network power management considering radio over fiber technique for 4G mobile system  

Science Conference Proceedings (OSTI)

Radio over fiber technique was suggested as excelent candidates for 4G radio access network considering large number mobile users. With higher number of base stations, a microwave link presents more disadvantages across base stations in relation to power ... Keywords: 4G mobile system, fiber dispersion, power manaegment, radio access network, radio over fiber

Jalal J. Hamad Ameen; Widad Ismail; Sevia M. Idrus

2011-03-01T23:59:59.000Z

269

Use of environmental sensors and sensor networks to develop water and salinity budgets for seasonal wetland real-time water quality management  

Science Conference Proceedings (OSTI)

Management of river salt loads in a complex and highly regulated river basin such as the San Joaquin River Basin of California presents significant challenges for current Information Technology. Computer-based numerical models are used as a means of ... Keywords: Environmental decision support, Forecasting, Salt management, Sensor networks, Sensors, Water quality

Nigel W. T. Quinn; Ricardo Ortega; Patrick J. A. Rahilly; Caleb W. Royer

2010-09-01T23:59:59.000Z

270

Review: The impact of agricultural activities on water quality: A case for collaborative catchment-scale management using integrated wireless sensor networks  

Science Conference Proceedings (OSTI)

The challenge of improving water quality is a growing global concern, typified by the European Commission Water Framework Directive and the United States Clean Water Act. The main drivers of poor water quality are economics, poor water management, agricultural ... Keywords: Agricultural activities, Catchment, Collaborative, Water quality monitoring and management, Wireless sensor networks

Huma Zia, Nick R. Harris, Geoff V. Merrett, Mark Rivers, Neil Coles

2013-08-01T23:59:59.000Z

271

Radio Planning of Energy-Aware Cellular Networks  

E-Print Network (OSTI)

Nov 3, 2010 ... Keywords: green networking, wireless, network design, coverage, network management, energy saving. Category 1: Applications -- OR and ...

272

Bayesian Belief Network (BBN)-based advisory system development for steam generator replacement project management  

E-Print Network (OSTI)

The growing need for improved project management technique points to the usefulness of a knowledge-base advisory system to help project managers understand current and future project status and optimize decisions based ...

Kim, Dohyoung, 1970-

2002-01-01T23:59:59.000Z

273

DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle  

Science Conference Proceedings (OSTI)

In this paper, we present a buffer management scheme called Dynamic Resource Allocation (DRA) that provides TCP traffic control guarantees to VCs carrying multiple dynamic discard thresholds (Multiple Dynamic Thresholds-MDT) over a wireless CDMA ATM ... Keywords: Buffer management, CDMA, Dynamic resource management, Large deviation principle, QoS, Wireless ATM

M. S. Obaidat; C. Ben Ahmed; N. Boudriga

2003-05-01T23:59:59.000Z

274

Managing data for evaluating trust in unstructured peer-to-peer networks  

Science Conference Proceedings (OSTI)

Managing data is a problem of particular importance in trust model of peer-to-peer environments where one frequently encounters unknown agents. Existing methods for data management, which are based on DHT or Random Selection, can not apply well in the ... Keywords: managing data, peer-to-peer, reputation, trust

Zhitang Li; Huaiqing Lin; Chuiwei Lu; Yejiang Zhang

2008-05-01T23:59:59.000Z

275

An Intercommunication Home Energy Management System with Appliance Recognition in Home Network  

Science Conference Proceedings (OSTI)

In present days there are wide varieties of household electric appliances along with different power consumption habits of consumers, making identifying electric appliances without presetting difficulty. This paper introduces smart appliance management ... Keywords: appliance recognition, home energy management, smart appliance management system

Ying-Xun Lai; Joel José Rodrigues; Yueh-Min Huang; Hong-Gang Wang; Chin-Feng Lai

2012-02-01T23:59:59.000Z

276

Managing time, part 2  

Science Conference Proceedings (OSTI)

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Peter J. Denning; Ritu Raj

2011-09-01T23:59:59.000Z

277

Making Science Useful to Decision Makers: Climate Forecasts, Water Management, and Knowledge Networks  

Science Conference Proceedings (OSTI)

Moving from climate science to adaptive action is an immense challenge, especially in highly institutionalized sectors such as water resources. Knowledge networks are valuable strategies to put climate information to use. They overcome barriers ...

David L. Feldman; Helen M. Ingram

2009-10-01T23:59:59.000Z

278

Tank Waste Information Network System (TWINS) FY 2001 Data Management Plan  

SciTech Connect

The mission of Tank Waste Information Network System (TWINS) is to provide system users with quality tank data and information when needed, in the form needed and at a reasonable cost.

ADAMS, M.R.

2000-06-12T23:59:59.000Z

279

Strategic management for large engineering projects : the stakeholder value network approach  

E-Print Network (OSTI)

A critical element of the challenges and opportunities for today's large engineering projects are associated with the multi-type and networked relationships between these projects and their various stakeholders. This ...

Feng, Wen, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

280

Creating and Managing a High Performance Knowledge-Sharing Network: The Toyota Case  

E-Print Network (OSTI)

This study offers a detailed case study of how Toyota facilitates interorganizational knowledge transfers among within its production network. In particular, we identiify and examine six key institutionalized knowledge ...

Dyer, Jeffrey

2002-07-10T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Energy-aware network coding circuit and system design  

E-Print Network (OSTI)

Network Coding (NC) has been shown to provide several advantages in communication networks in terms of throughput, data robustness and security. However, its applicability to networks with resource constrained nodes, like ...

Angelopoulos, Georgios, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

282

Network Security for Substation Automation Systems  

Science Conference Proceedings (OSTI)

The protection of critical infrastructure against electronic and communication network based attacks becomes more and more important. This work investigates the threat of network-based attacks on substations, the nodes of the electric power grid. Three ...

Martin Naedele; Dacfey Dzung; Michael Stanimirov

2001-09-01T23:59:59.000Z

283

Epidemic Propagation In Overlaid Wireless Networks  

SciTech Connect

Witb tbe emergence of computer worms tbat can spread over air interfaces, wireless ad boc and sensor networks can be vulnerable to node compromises even if the deployed network is not connected to the backbone. Depending on the physical topology of the wireless network, even a single infected node can compromise the whole network. In this work, epidemic (e.g., worm) propagation in a static wireless network is studied, where a number of inCected mobile nodes are injected over the existing network. It is shown that the epidemic spread threshold and size depend on the physical topology of the underlying static wireless network as well as the mobility model employed by the infected mobile nodes. More specifically, results show that in a Cully-connected static wirelessnctwork targeted attacks are more effective, wbereas Cor a random topology random attacks can be sufficient to compromise the whole network.

Yanmaz, Evsen [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

284

Bootstrapping a hop-optimal network in the weak sensor model  

Science Conference Proceedings (OSTI)

Sensor nodes are very weak computers that get distributed at random on a surface. Once deployed, they must wake up and form a radio network. Sensor network bootstrapping research thus has three parts: One must model the restrictions on sensor nodes; ... Keywords: Ad hoc network, contention resolution, maximal independent set, radio network, random geometric graphs, sensor network, weak sensor model

Martin Farach-Colton; Rohan J. Fernandes; Miguel A. Mosteiro

2009-10-01T23:59:59.000Z

285

Localization and sensing applications in the Pushpin Computer Network  

E-Print Network (OSTI)

The utility and purpose of a node in a wireless sensor network is intimately tied to the physical space in which it is distributed. As such, it is advantageous under most circumstances for a sensor node to know its position. ...

Broxton, Michael Joseph

2005-01-01T23:59:59.000Z

286

Probabilistic data collection protocols for energy harvesting wireless sensor networks  

Science Conference Proceedings (OSTI)

Energy harvesting from ambient energy sources including solar and vibration has been studied as a candidate for powering next generation wireless sensor networks. However, energy harvesting is unstable to supply a sensor node with energy, and a node ...

Masaya Yoshida; Tomoya Kitani; Masaki Bandai; Takashi Watanabe; Pai H. Chou; Winston K. G. Seah

2012-11-01T23:59:59.000Z

287

PicoCube: a 1 cm3 sensor node powered by harvested energy  

Science Conference Proceedings (OSTI)

The PicoCube is a 1 cm3 sensor node using harvested energy as its source of power. Operating at an average of only 6uW for a tirepressure application, the PicoCube represents a modular and integrated approach to the design of nodes for wireless ... Keywords: active antennas, advanced packaging, energy harvesting, energy management, intelligent sensors, low power

Yuen-Hui Chee; Mike Koplow; Michael Mark; Nathan Pletcher; Mike Seeman; Fred Burghardt; Dan Steingart; Jan Rabaey; Paul Wright; Seth Sanders

2008-06-01T23:59:59.000Z

288

Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes  

Science Conference Proceedings (OSTI)

Optimizing energy consumption is a key objective in designing wireless sensor nodes. It has been shown earlier [1] that the node energy is strongly influenced by the modulation and the error correcting code (ECC) used. The utility of using ECC from an ... Keywords: block codes, communication systems, energy management, modulation, reed-solomon codes

Sonali Chouhan; Ranjan Bose; M. Balakrishnan

2009-10-01T23:59:59.000Z

289

Clustering incorporating shortest paths identifies relevant modules in functional interaction networks  

Science Conference Proceedings (OSTI)

Many biological systems can be modeled as networks. Hence, network analysis is of increasing importance to systems biology. We describe an evolutionary algorithm for selecting clusters of nodes within a large network based upon network topology together ...

Jennifer Hallinan; Matthew Pocock; Stephen Addinall; David A. Lydall; Anil Wipat

2009-03-01T23:59:59.000Z

290

Utility Optimal Scheduling in Energy Harvesting Networks  

E-Print Network (OSTI)

In this paper, we show how to achieve close-to-optimal utility performance in energy harvesting networks with only finite capacity energy storage devices. In these networks, nodes are capable of harvesting energy from the environment. The amount of energy that can be harvested is time varying and evolves according to some probability law. We develop an \\emph{online} algorithm, called the Energy-limited Scheduling Algorithm (ESA), which jointly manages the energy and makes power allocation decisions for packet transmissions. ESA only has to keep track of the amount of energy left at the network nodes and \\emph{does not require any knowledge} of the harvestable energy process. We show that ESA achieves a utility that is within $O(\\epsilon)$ of the optimal, for any $\\epsilon>0$, while ensuring that the network congestion and the required capacity of the energy storage devices are \\emph{deterministically} upper bounded by bounds of size $O(1/\\epsilon)$. We then also develop the Modified-ESA algorithm (MESA) to ac...

Huang, Longbo

2010-01-01T23:59:59.000Z

291

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring  

E-Print Network (OSTI)

Formulation of the Energy Constraint Problem ILP Formulationde?nes the energy and task management problem for a wirelesssolutions to the energy and time constraint problems are too

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

292

Management of building energy consumption and energy supply network on campus scale.  

E-Print Network (OSTI)

??Building portfolio management on campus and metropolitan scale involves decisions about energy retrofits, energy resource pooling, and investments in shared energy systems, such as district… (more)

Lee, Sang Hoon

2012-01-01T23:59:59.000Z

293

Attacking the Kad network  

Science Conference Proceedings (OSTI)

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow ... Keywords: Kad, P2P, attack, security

Peng Wang; James Tyra; Eric Chan-Tin; Tyson Malchow; Denis Foo Kune; Nicholas Hopper; Yongdae Kim

2008-09-01T23:59:59.000Z

294

Networked Aquatic Sampling System  

E-Print Network (OSTI)

system for field operation • Wireless 802.11b based networkOperation • Continuous real time data acquisition and logging of pertinent environmental parameters • WirelessOperation • Network of 10 static nodes and 1 robotic boat • AODV based ad-hoc 802.11b wireless

2005-01-01T23:59:59.000Z

295

Modeling s-t Path Availability to Support Disaster Vulnerability Assessment of Network Infrastructure  

E-Print Network (OSTI)

The maintenance of system flow is critical for effective network operation. Any type of disruption to network facilities (arcs/nodes) potentially risks loss of service, leaving users without access to important resources. It is therefore an important goal of planners to assess infrastructures for vulnerabilities, identifying those vital nodes/arcs whose debilitation would compromise the most source-sink (s-t) interaction or system flow. Due to the budgetary limitations of disaster management agencies, protection/fortification and planning for the recovery of these vital infrastructure facilities is a logical and efficient proactive approach to reducing worst-case risk of service disruption. Given damage to a network, evaluating the potential for flow between s-t pairs requires assessing the availability of an operational s-t path. Recent models proposed for identifying infrastructure vital to system flow have relied on enumeration of all s-t paths to support this task. This paper proposes an alternative model...

Matisziw, Timothy C

2010-01-01T23:59:59.000Z

296

Proceedings of the sixth Berkeley workshop on distributed data management and computer networks  

SciTech Connect

A distributed data base management system allows data to be stored at multiple locations and to be accessed as a single unified data base. In this workshop, seventeen papers were presented which have been prepared separately for the energy data base. These items deal with data transfer, protocols and management. (GHT)

Various Authors

1982-01-01T23:59:59.000Z

297

Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes  

Science Conference Proceedings (OSTI)

In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simple and, most of all, popular line topology network can be degraded by the ... Keywords: IEEE 802.11e, ad-hoc, hidden and exposed nodes

Katarzyna Kosek; Marek Natkaniec; Andrzej R. Pach

2008-09-01T23:59:59.000Z

298

Thorough analysis of 802.11e star topology scenarios in the presence of hidden nodes  

Science Conference Proceedings (OSTI)

In this paper the authors present a simulation study of two 802.11e network scenarios. The presented analysis is not only novel but most of all crucial for understanding how a theoretically simple star topology network can be degraded by the presence ... Keywords: IEEE 802.11e, QoS, hidden nodes

Katarzyna Kosek; Marek Natkaniec; Luca Vollero

2008-05-01T23:59:59.000Z

299

Community response grids: E-government, social networks, and effective emergency management  

Science Conference Proceedings (OSTI)

This paper explores the concept of developing community response grids (CRGs) for community emergency response and the policy implications of such a system. CRGs make use of the Internet and mobile communication devices, allowing residents and responders ... Keywords: Community response grid, E-government, Emergency response, Mobile communications, Public policy, Social networks

Paul T. Jaeger; Ben Shneiderman; Kenneth R. Fleischmann; Jennifer Preece; Yan Qu; Philip Fei Wu

2007-11-01T23:59:59.000Z

300

Managing fast mobility in wireless multi-hop networks with LISP  

Science Conference Proceedings (OSTI)

The Locator/ID Separation Protocol (LISP) has been developped in recent years in order to solve the scalability issues the current Internet Architecture is facing. Differently from the current addressing system, where end-systems' identifier and location ... Keywords: LISP, mobility, wireless multi-hop networks

Marc F. Almirall; Luigi Iannone; Ruben Merz

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

QoS management in trunk-and-branch switched Ethernet networks  

Science Conference Proceedings (OSTI)

A likely architecture for the future broadband access network will consist of a trunk-and-branch topology, with very high bandwidth trunks (e.g., 1-10 Gb/s), connected to high-bandwidth drops (or branches) to homes and businesses. A multihop switched ...

K. Rege; S. Dravida; S. Nanda; S. Narayan; J. Strombosky; M. Tandon; D. Gupta

2002-12-01T23:59:59.000Z

302

Using a Wireless Sensors Network in the Sustainable Management of African Palm Oil Solid Waste  

Science Conference Proceedings (OSTI)

All human activities have an impact in the environment in which we live. Nowadays, the industrial gases emission is considered as one of the main causes for worsening greenhouse effect. The African Palm agro industry in Ecuador is no stranger to this ... Keywords: compost, production science, solid waste, wireless sensors network, wireless communication technologies

Mauro Jimenez, Alejandra Jimenez, Pablo Lozada, Santiago Jimenez, Cristhy Jimenez

2013-04-01T23:59:59.000Z

303

Performance Evaluation of Dynamic and Static Bandwidth Management Methods for ATM Networks  

E-Print Network (OSTI)

and Information Sciences Laboratory Department of Electrical Engineering and Computer Science University of Kansas bandwidth calculations it is possible to monitor current or predicted network usage. Users characteristics such as delay, loss, and throughput. The user may get better QoS (higher throughput, lower loss

Kansas, University of

304

An examination of electronic file transfer between host and microcomputers for the AMPMODNET/AIMNET (Army Material Plan Modernization Network/Acquisition Information Management Network) classified network environment  

Science Conference Proceedings (OSTI)

This report presents the results of investigation and testing conducted by Oak Ridge National Laboratory (ORNL) for the Project Manager -- Acquisition Information Management (PM-AIM), and the United States Army Materiel Command Headquarters (HQ-AMC). It concerns the establishment of file transfer capabilities on the Army Materiel Plan Modernization (AMPMOD) classified computer system. The discussion provides a general context for micro-to-mainframe connectivity and focuses specifically upon two possible solutions for file transfer capabilities. The second section of this report contains a statement of the problem to be examined, a brief description of the institutional setting of the investigation, and a concise declaration of purpose. The third section lays a conceptual foundation for micro-to-mainframe connectivity and provides a more detailed description of the AMPMOD computing environment. It gives emphasis to the generalized International Business Machines, Inc. (IBM) standard of connectivity because of the predominance of this vendor in the AMPMOD computing environment. The fourth section discusses two test cases as possible solutions for file transfer. The first solution used is the IBM 3270 Control Program telecommunications and terminal emulation software. A version of this software was available on all the IBM Tempest Personal Computer 3s. The second solution used is Distributed Office Support System host electronic mail software with Personal Services/Personal Computer microcomputer e-mail software running with IBM 3270 Workstation Program for terminal emulation. Test conditions and results are presented for both test cases. The fifth section provides a summary of findings for the two possible solutions tested for AMPMOD file transfer. The report concludes with observations on current AMPMOD understanding of file transfer and includes recommendations for future consideration by the sponsor.

Hake, K.A.

1990-11-01T23:59:59.000Z

305

Exploiting network-based approaches for understanding gene regulation and function  

E-Print Network (OSTI)

to their target genes, controlled by their cis-regulatory elements, form a complex and directional network of interactions. In contrast, functional linkage networks constructed in function prediction pipelines typically comprise of undirected networks where all... in the network that pass through a node of interest – the higher the number of paths that pass through a node, the more important it is. Average path length Average length of the shortest paths between all pairs of nodes in the network. Closeness Closeness...

Janga, Sarath Chandra

2010-07-06T23:59:59.000Z

306

70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Package  

Science Conference Proceedings (OSTI)

A comprehensive program of textbook, lab manual and software, this Microsoft Official Academic Course provides everything students need to build the knowledge and skills necessary to configure, manage, and troubleshoot a Microsoft Windows Server 2003 ...

Microsoft Official Academic Course

2010-02-01T23:59:59.000Z

307

Technology Diffusion in Communication Networks  

E-Print Network (OSTI)

In the rich and growing literature on diffusion and cascade effects in social networks, it is assumed that a node's actions are influenced only by its immediate neighbors in the social network. However, there are other contexts in which this highly-local view of influence is not applicable. The diffusion of technologies in communication networks is one important example; here, a node's actions should also be influenced by remote nodes that it can communicate with using the new technology. We propose a new model of technology diffusion inspired by the networking literature on this topic. Given the communication network $G(V,E)$, we assume that node $u$ activates (i.e. deploys the new technology) when it is adjacent to a connected component of active nodes in $G$ of size exceeding node $u$'s threshold $\\theta(u)$. We focus on an algorithmic problem that is well understood in the context of social networks, but thus far has only heuristic solutions in the context of communication networks: determining the smalle...

Goldberg, Sharon

2012-01-01T23:59:59.000Z

308

Data sampling control, compression and query in sensor networks  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks have very limited storage capacity, computing ability and battery power. Node failure and communication link disconnection occur frequently, which means weak services of the network layer. Sensed data is inaccurate which ... Keywords: data accuracy, data compression, data sampling, energy efficiency, power limitation, query, sampling frequency control, sensor networks

Jinbao Li; Jianzhong Li

2007-04-01T23:59:59.000Z

309

Map: medial axis based geometric routing in sensor networks  

Science Conference Proceedings (OSTI)

One of the challenging tasks in the deployment of dense wireless networks (like sensor networks) is in devising a routing scheme for node to node communication. Important consideration includes scalability, routing complexity, quality of communication ... Keywords: medial axis, routing, sensor networks, system design

Jehoshua Bruck; Jie Gao; Anxiao Jiang

2007-12-01T23:59:59.000Z

310

Forward correction and fountain codes in delay-tolerant networks  

Science Conference Proceedings (OSTI)

Delay-tolerant ad hoc networks leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are out of range of each other. To decrease delivery delay, the information to be delivered ... Keywords: delay-tolerant networks (DTNs), forward correction, fountain codes, mobile ad hoc networks

Eitan Altman; Francesco De Pellegrini

2011-02-01T23:59:59.000Z

311

Fast track article: Reliable networks with unreliable sensors  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) deployed in hostile environments suffer from a high rate of node failure. We investigate the effect of such failure rate on network connectivity. We provide a formal analysis that establishes the relationship between node ... Keywords: Connectivity, Fault tolerance, Sensor network

Srikanth Sastry; Tsvetomira Radeva; Jianer Chen; Jennifer L. Welch

2013-04-01T23:59:59.000Z

312

Connectivity problem in wireless networks  

Science Conference Proceedings (OSTI)

We study the complexity of the following connectivity problem in wireless networks: for a given placement of n nodes in the plane, the goal is to compute a channel and power assignment that forms strongly connected communication structure spanning ...

Dariusz R. Kowalski; Mariusz A. Rokicki

2010-09-01T23:59:59.000Z

313

The interphase power controller: A new concept for managing power flow within AC networks  

SciTech Connect

The paper presents a new concept for controlling the flow of power within AC networks. The application is based on the series connection of impedances between different phases of the two (synchronous) subnetworks to be interconnected, hence its name: the Interphase Power Controller (IPC). The IPC acts as a current source with the following characteristics: the power flow is nearly constant (within 10%) for a wide range ([+-]25[degree]) of angle between the two subnetworks; there is no significant short-circuit contribution from one network to the other; severe contingencies on one side of the IPC have negligible impact on the voltage of the other side; no harmonics are generated (because there is no control action). Other operating conditions (reduced power, reactive power generation or absorption) are possible by switching impedance components. In all cases, the IPC comprises only conventional elements (transformer, capacitors, reactors, and circuit breakers).

Brochu, J.; Pelletier, P.; Beauregard, F.; Morin, G. (Citeq, Varennes, Quebec (Canada))

1994-04-01T23:59:59.000Z

314

Networks in Cognitive Science  

E-Print Network (OSTI)

Networks of interconnected nodes have long played a key role in cognitive science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions or collaborations among scientists. Today, the inclusion of network theory into cognitive sciences, and the expansion of complex systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the cognitive sciences.

Baronchelli, Andrea; Pastor-Satorras, Romualdo; Chater, Nick; Christiansen, Morten H

2013-01-01T23:59:59.000Z

315

Wireless sensor networks for habitat monitoring  

Science Conference Proceedings (OSTI)

We provide an in-depth study of applying wireless sensor networks to real-world habitat monitoring. A set of system design requirements are developed that cover the hardware design of the nodes, the design of the sensor network, and the capabilities ... Keywords: environmental monitoring, habitat monitoring, low power systems, sensor network architecture, wireless sensor networks

Alan Mainwaring; David Culler; Joseph Polastre; Robert Szewczyk; John Anderson

2002-09-01T23:59:59.000Z

316

Zonal Rumor Routing for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Routing algorithms for wireless sensor networks are constrained by power, memory and computational resources. Rumor Routing algorithm for sensor networks spreads theinformation of an event to other nodes in the network, thus enabling queries to discover ... Keywords: Sensor Network, Routing, Wireless, Rumor Routing

Tarun Banka; Gagan Tandon; Anura P. Jayasumana

2005-04-01T23:59:59.000Z

317

Integrating Correlated Bayesian Networks Using Maximum Entropy  

Science Conference Proceedings (OSTI)

We consider the problem of generating a joint distribution for a pair of Bayesian networks that preserves the multivariate marginal distribution of each network and satisfies prescribed correlation between pairs of nodes taken from both networks. We derive the maximum entropy distribution for any pair of multivariate random vectors and prescribed correlations and demonstrate numerical results for an example integration of Bayesian networks.

Jarman, Kenneth D.; Whitney, Paul D.

2011-08-30T23:59:59.000Z

318

Subject bibliography of the PMA205 (Program Manager Air 205) Network Technical Library at Oak Ridge National Laboratory  

Science Conference Proceedings (OSTI)

The PMA205 (Program Manager Air 205) Network Technical Library at the Oak Ridge National Laboratory (ORNL) contains documents relating to US Department of Defense standards for computer-based training technology and training and American National Standards Institute international standards for user interfaces and Computer-Aided Acquisition and Logistic Support. The collection emphasizes supporting research in instructional system design, software engineering, user system interfaces, human factors engineering, and cognitive psychology as it differentiates between higher and lower cognitive tasking. The collection currently consists of about 670 documents of various types. These include military standards and specifications, reports, conference proceedings, dissertations, technical manuals, books, journal articles, and military instructions and directives. The documents have been added to the library as the result of literature searches and personal submission from team members. It is a selective collection and not a comprehensive one. A database, written in Procite/PC, contains the cataloged holdings of the library. Each record contains the bibliographic information and an abstract. The database provides access to information in the records by either full text searches using Boolean logic or individual field searching. One-word quick searches'' can be performed on the date, title, or author fields. The browsing capability for retrieved items is by full record or brief format. Search results can be read from the screen, printed to hard copy, or transferred to a disk file for later use. Disks containing the database and printed bibliographies are available to PMA205 network team members upon request.

Ayers, M.V.

1990-05-01T23:59:59.000Z

319

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SiNode Systems SiNode Systems National Clean Energy Business Plan Competition 2013 31 likes SiNode Systems Northwestern University SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process. SiNode seeks to change the landscape for lithium-ion batteries so they can meet the demands of a wide range of industries, from consumer electronics to electric vehicles. SiNode technology uses a composite of silicon nano-particles and porous graphene, developed by Dr. Harold H. Kung at Northwestern University. SiNode's anodes offer dramatic energy capacity increases (3200 mAh/g vs.

320

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SiNode Systems SiNode Systems National Clean Energy Business Plan Competition 2013 31 likes SiNode Systems Northwestern University SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process. SiNode seeks to change the landscape for lithium-ion batteries so they can meet the demands of a wide range of industries, from consumer electronics to electric vehicles. SiNode technology uses a composite of silicon nano-particles and porous graphene, developed by Dr. Harold H. Kung at Northwestern University. SiNode's anodes offer dramatic energy capacity increases (3200 mAh/g vs.

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SiNode Systems SiNode Systems National Clean Energy Business Plan Competition 2013 31 likes SiNode Systems Northwestern University SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process. SiNode seeks to change the landscape for lithium-ion batteries so they can meet the demands of a wide range of industries, from consumer electronics to electric vehicles. SiNode technology uses a composite of silicon nano-particles and porous graphene, developed by Dr. Harold H. Kung at Northwestern University. SiNode's anodes offer dramatic energy capacity increases (3200 mAh/g vs.

322

Maximizing network lifetime based on transmission range adjustment in wireless sensor networks  

Science Conference Proceedings (OSTI)

In a wireless sensor network (WSN), the unbalanced distribution of communication loads often causes the problem of energy hole, which means the energy of the nodes in the hole region will be exhausted sooner than the nodes in other regions. This is a ... Keywords: Energy hole problem, Multi-objective optimization problem, NP hard, Wireless sensor networks

Chao Song; Ming Liu; Jiannong Cao; Yuan Zheng; Haigang Gong; Guihai Chen

2009-07-01T23:59:59.000Z

323

Switch for serial or parallel communication networks  

DOE Patents (OSTI)

A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

Crosette, Dario B. (DeSoto, TX)

1994-01-01T23:59:59.000Z

324

Switch for serial or parallel communication networks  

DOE Patents (OSTI)

A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

Crosette, D.B.

1994-07-19T23:59:59.000Z

325

Radio resource management for a mobile network with TD-CDMA  

Science Conference Proceedings (OSTI)

In the paper, we proposed a resource allocation method employing maximal compatible cliques to make use of channel bandwidth as efficiently as possible in a TD-CDMA system. Furthermore, the strength of beacon signals was also measured to decide whether ... Keywords: Hand-off, Maximal clique, Radio resource management, Resource reservation, TD-CDMA

Yin-Fu Huang; Tsung-Yi Chiu

2006-12-01T23:59:59.000Z

326

Demo Abstract: ThermoSense: Thermal Array Sensor Networks in Building Management  

E-Print Network (OSTI)

, and ventilation (HVAC) systems have two different points of control; temperature and ventila- Permission to make this occupancy information can be integrated with a real building management system in order to control of time in order to ensure the room can reach the appropriate tem- perature. A prediction model can

Cerpa, Alberto E.

327

A Dynamic Information Manager for Networked Monitoring of Large Power Systems  

Science Conference Proceedings (OSTI)

The Wide Area Measurement Systems (WAMS) project, a broad-based, multi-phase effort, has been focused on enhancing the reliability of interconnected power systems. This report documents the third phase of that effort, which addresses the management of the data and information that WAMS-related technologies provide.

1999-05-18T23:59:59.000Z

328

Power management of plug-in hybrid electric vehicles using neural network based trip modeling  

Science Conference Proceedings (OSTI)

The plug-in hybrid electric vehicles (PHEV), utilizing more battery power, has become a next-generation HEV with great promise of higher fuel economy. Global optimization charge-depletion power management would be desirable. This has so far been hampered ...

Qiuming Gong; Yaoyu Li; Zhongren Peng

2009-06-01T23:59:59.000Z

329

A comprehensive MIPv6 based mobility management simulation engine for the next generation network  

Science Conference Proceedings (OSTI)

Mobility management is one of the core requirements of the IPv6 based NGN to provide seamless handover services to mobile entities. In this regard, IETF has proposed protocols like Mobile IPv6 (MIPv6), Fast MIPv6 (FMIPv6) and Hierarchical MIPv6 (HMIPv6) ... Keywords: C++ discrete event simulation, CARD, FMIPv6, HMIPv6, MIPv6, OMNeT++, protocol simulation

Faqir Zarrar Yousaf; Christian Müller; Christian Wietfeld

2010-03-01T23:59:59.000Z

330

Enabling Long-Lived Sensor Networks Through Solar Energy Harvesting  

E-Print Network (OSTI)

Networks through Solar Energy Harvesting Jason Hsu, SadafPer formance Energy Harvesting Technologies System life andProblem Description: Energy harvesting enabled sensor nodes

Jason Hsu; Sadaf Zahedi; Jonathan Friedman; Aman Kansal; Vijay Raghunathan; Mani Srivastava

2005-01-01T23:59:59.000Z

331

Locating hardware faults in a data communications network of a parallel computer  

DOE Patents (OSTI)

Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

Archer, Charles J. (Rochester, MN); Megerian, Mark G. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-01-12T23:59:59.000Z

332

Information sharing in Quantum Complex Networks  

E-Print Network (OSTI)

We introduce the use of entanglement entropy as a tool for studying the amount of information shared between the nodes of quantum complex networks. By considering the ground state of a network of coupled quantum harmonic oscillators, we compute the information that each node has on the rest of the system. We show that the nodes storing the largest amount of information are not the ones with the highest connectivity, but those with intermediate connectivity thus breaking down the usual hierarchical picture of classical networks. We show both numerically and analytically that the mutual information characterizes the network topology. As a byproduct, our results point out that the amount of information available for an external node connecting to a quantum network allows to determine the network topology.

Cardillo, Alessio; Zueco, David; Gómez-Gardeñes, Jesús

2013-01-01T23:59:59.000Z

333

On the interdependence of routing and data compression in multi-hop sensor networks  

Science Conference Proceedings (OSTI)

We consider a problem of broadcast communication in a multi-hop sensor network, in which samples of a random field are collected at each node of the network, and the goal is for all nodes to obtain an estimate of the entire field within a prescribed ... Keywords: cross-layer interactions, multi-hop networks, routing, sensor networks, source coding

Anna Scaglione; Sergio D. Servetto

2002-09-01T23:59:59.000Z

334

Round complexity of leader election and gossiping in bidirectional radio networks  

Science Conference Proceedings (OSTI)

We consider the setting of ad hoc radio networks when the underlying network is bidirectional, the number of nodes in the network n is known and nodes can be assigned labels which are polynomially large in n. For this setting we present a protocol for ... Keywords: Bidirectional radio networks, Distributed computing, Gossiping, Leader election, Polynomially large labels

Shailesh Vaya

2013-05-01T23:59:59.000Z

335

Implications of link range and (In)stability on sensor network architecture  

Science Conference Proceedings (OSTI)

In this work, we consider sensor networks used for scientific instrumentation, where we have a set of nodes collecting data and relaying the same to a central base node. From the point of view of deploying such networks,we re-look at the design choices ... Keywords: 802.15.4 link range, link characteristics, network architecture, wireless sensor networks

Bhaskaran Raman; Kameswari Chebrolu; Naveen Madabhushi; Dattatraya Y. Gokhale; Phani K. Valiveti; Dheeraj Jain

2006-09-01T23:59:59.000Z

336

A hardware/software simulation environment for energy harvesting wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) consist of wirelessly communicating nodes with an autarkic power supply for each node. Typically, the consumable energy of these nodes is very limited. Energy harvesting systems (EHSs) can be used to extend the lifetime ... Keywords: energy harvesting, simulation environment, wireless sensor networks

Leander B. Hörmann; Philipp M. Glatz; Karima B. Hein; Christian Steger; Reinhold Weiss

2012-10-01T23:59:59.000Z

337

Opportunistic media access control and routing for delay-tolerant mobile ad hoc networks  

Science Conference Proceedings (OSTI)

In delay-tolerant mobile ad hoc networks, motion of network nodes, network sparsity and sporadic density can cause a lack of guaranteed connectivity. These networks experience significant link delay and their routing protocols must take a store-and-forward ... Keywords: Cross-layer adaptation design, Delay-tolerant network, Mobile ad hoc network, Opportunistic routing, Vehicular ad hoc network

Liang Dong

2012-11-01T23:59:59.000Z

338

Dedicated heterogeneous node scheduling including backfill scheduling  

DOE Patents (OSTI)

A method and system for job backfill scheduling dedicated heterogeneous nodes in a multi-node computing environment. Heterogeneous nodes are grouped into homogeneous node sub-pools. For each sub-pool, a free node schedule (FNS) is created so that the number of to chart the free nodes over time. For each prioritized job, using the FNS of sub-pools having nodes useable by a particular job, to determine the earliest time range (ETR) capable of running the job. Once determined for a particular job, scheduling the job to run in that ETR. If the ETR determined for a lower priority job (LPJ) has a start time earlier than a higher priority job (HPJ), then the LPJ is scheduled in that ETR if it would not disturb the anticipated start times of any HPJ previously scheduled for a future time. Thus, efficient utilization and throughput of such computing environments may be increased by utilizing resources otherwise remaining idle.

Wood, Robert R. (Livermore, CA); Eckert, Philip D. (Livermore, CA); Hommes, Gregg (Pleasanton, CA)

2006-07-25T23:59:59.000Z

339

Line-plane broadcasting in a data communications network of a parallel computer  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

Archer, Charles J. (Rochester, MN); Berg, Jeremy E. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-11-23T23:59:59.000Z

340

Efficient implementation of a multidimensional fast fourier transform on a distributed-memory parallel multi-node computer  

DOE Patents (OSTI)

The present in invention is directed to a method, system and program storage device for efficiently implementing a multidimensional Fast Fourier Transform (FFT) of a multidimensional array comprising a plurality of elements initially distributed in a multi-node computer system comprising a plurality of nodes in communication over a network, comprising: distributing the plurality of elements of the array in a first dimension across the plurality of nodes of the computer system over the network to facilitate a first one-dimensional FFT; performing the first one-dimensional FFT on the elements of the array distributed at each node in the first dimension; re-distributing the one-dimensional FFT-transformed elements at each node in a second dimension via "all-to-all" distribution in random order across other nodes of the computer system over the network; and performing a second one-dimensional FFT on elements of the array re-distributed at each node in the second dimension, wherein the random order facilitates efficient utilization of the network thereby efficiently implementing the multidimensional FFT. The "all-to-all" re-distribution of array elements is further efficiently implemented in applications other than the multidimensional FFT on the distributed-memory parallel supercomputer.

Bhanot, Gyan V. (Princeton, NJ); Chen, Dong (Croton-On-Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Sharing information for Q-learning-based network bandwidth estimation and network failure detection  

Science Conference Proceedings (OSTI)

Distributed bandwidth (bw) estimation for effective routing and network failure detection are essential in several networked applications. However, they are hard problems since the individual nodes (agents) do not have global knowledge about the network ... Keywords: Q-learning, bandwidth estimation, network failures

Partha S. Dutta; Nicholas R. Jennings; R. Jennings; Luc Moreau

2005-07-01T23:59:59.000Z

342

On the statistical detection of clusters in undirected networks  

Science Conference Proceedings (OSTI)

The goal of network clustering algorithms is to assign each node in a network to one of several mutually exclusive groups based upon the observed edge set. Of the network clustering algorithms widely available, most make the effort to maximize the modularity ... Keywords: Community structure detection, Hypothesis testing, Log-likelihood, Log-likelihood ratio, Network clustering, Undirected networks

Marcus B. Perry, Gregory V. Michaelson, M. Alan Ballard

2013-12-01T23:59:59.000Z

343

A compressive sensing-based reconstruction approach to network traffic  

Science Conference Proceedings (OSTI)

Traffic matrix in a network describes the end-to-end network traffic which embodies the network-level status of communication networks from origin to destination nodes. It is an important input parameter of network traffic engineering and is very crucial ...

Laisen Nie, Dingde Jiang, Zhengzheng Xu

2013-07-01T23:59:59.000Z

344

Information extraction with network centralities : finding rumor sources, measuring influence, and learning community structure  

E-Print Network (OSTI)

Network centrality is a function that takes a network graph as input and assigns a score to each node. In this thesis, we investigate the potential of network centralities for addressing inference questions arising in the ...

Zaman, Tauhid R

2011-01-01T23:59:59.000Z

345

Energy-Efficient Cooperative Routing in BER Constrained Multihop Networks  

E-Print Network (OSTI)

Abstract — Due to the limited energy supplies of nodes, in many applications like wireless sensor networks energy-efficiency is crucial for extending the lifetime of these networks. We study the routing problem for multihop wireless ad hoc networks based on cooperative transmission. The source node wants to transmit messages to a single destination. Other nodes in the network may operate as relay nodes. In this paper, we propose a cooperative multihop routing for the purpose of power savings, constrained on a required bit error rate (BER) at the destination. We derive analytical results for line and grid network topologies. It is shown that energy savings of 100 % are achievable in line and grid networks with a large number of nodes for BER =10 ?4 constraint at the destination. I.

Behrouz Maham; Mérouane Debbah; Are Hjørungnes

2010-01-01T23:59:59.000Z

346

Dynamic sensor tasking in heterogeneous, mobile sensor networks  

E-Print Network (OSTI)

Modern sensor environments often attempt to combine several sensors into a single sensor network. The nodes of this network are generally heterogeneous and may vary with respect to sensor complexity, sensor operational ...

Jones, Peter B. (Peter B.), S.M., Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

347

An energy efficient RF transceiver for wireless microsensor networks  

E-Print Network (OSTI)

A wireless microsensor network consists of a group of sensor nodes that are deployed remotely and used to relay sensing data to the end-user. Due to their remote deployment, large scale wireless sensor networks require a ...

Daly, Denis Clarke

2005-01-01T23:59:59.000Z

348

Broadcasting and transmission coordination for ad hoc and sensor networks  

Science Conference Proceedings (OSTI)

This thesis studies the performance benefit of coordination in wireless sensor networks (WSNs) and ad hoc networks (AHNs). WSNs are often comprised of a large number of inexpensive nodes with short battery life and limited communication and processing ...

Ananth V. Kini / Steven P. Weber

2008-01-01T23:59:59.000Z

349

Sharing information in time-division duplexing channels: a network coding approach  

E-Print Network (OSTI)

We study random linear network coding for time-division duplexing channels for sharing information between nodes. We assume a packet erasure channel with nodes that cannot transmit and receive information simultaneously. ...

Lucani, Daniel Enrique

350

Trimming the tree: tailoring adaptive huffman coding to wireless sensor networks  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, ...

Andreas Reinhardt; Delphine Christin; Matthias Hollick; Johannes Schmitt; Parag S. Mogre; Ralf Steinmetz

2010-02-01T23:59:59.000Z

351

S4: small state and small stretch routing protocol for large wireless sensor networks  

Science Conference Proceedings (OSTI)

Routing protocols for wireless sensor networks must address the challenges of reliable packet delivery at increasingly large scale and highly constrained node resources. Attempts to limit node state can result in undesirable worst-case routing performance, ...

Yun Mao; Feng Wang; Lili Qiu; Simon S. Lam; Jonathan M. Smith

2007-04-01T23:59:59.000Z

352

On the diversity-multiplexing tradeoff of multiuser amplify & forward multihop networks  

Science Conference Proceedings (OSTI)

We consider an amplify & forward multihop network with n single-antenna nodes in the source and destination stage each, as well as nR(l), l ? {1, . . . , L}, single-antenna relay nodes in the ...

Jörg Wagner; Armin Wittneben

2009-11-01T23:59:59.000Z

353

Network Coded Transmission of Fountain Codes over Cooperative Relay Networks  

E-Print Network (OSTI)

In this paper, a transmission strategy of fountain codes over cooperative relay networks is proposed. When more than one relay nodes are available, we apply network coding to fountain-coded packets. By doing this, partial information is made available to the destination node about the upcoming message block. It is therefore able to reduce the required number of transmissions over erasure channels, hence increasing the effective throughput. Its application to wireless channels with Rayleigh fading and AWGN noise is also analysed, whereby the role of analogue network coding and optimal weight selection is demonstrated.

Kurniawan, E; Yen, K; Chong, K F E

2010-01-01T23:59:59.000Z

354

Advanced mobile networking, sensing, and controls.  

SciTech Connect

This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

2005-03-01T23:59:59.000Z

355

Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node  

E-Print Network (OSTI)

Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node Vinay Joseph, Vinod Sharma in the energy buffer. We obtain energy management policies which minimize a linear combination of the mean queue energy management policies were identified which made the system work in energy neutral operation

Sharma, Vinod

356

Packet-Switched Optical Networks  

Science Conference Proceedings (OSTI)

In this article, we present a platform design for packet-switched OTDM networks operating at ultrafast bit-rates for modern multiprocessor interconnects. The design is implemented in a prototype 8-node transparent shuffle network. The flow control in ... Keywords: Communication system interfaces, signalling, synchronization, clock and data recovery, PLLs

Ben Y. Yu; Paul Toliver; Robert J. Runser; Kung-Li Deng; Deyu Zhou; Ivan Glesk; Paul R. Prucnal

1998-01-01T23:59:59.000Z

357

Navigation protocols in sensor networks  

Science Conference Proceedings (OSTI)

We develop distributed algorithms for adaptive sensor networks that respond to directing a target through a region of space. We model this problem as an online distributed motion planning problem. Each sensor node senses values in its perception space ... Keywords: Sensor networks, motes, navigation, potential field, robotics

Qun Li; Daniela Rus

2005-08-01T23:59:59.000Z

358

Centrality scaling in large networks  

E-Print Network (OSTI)

Betweenness centrality lies at the core of both transport and structural vulnerability properties of complex networks, however, it is computationally costly, and its measurement for networks with millions of nodes is near impossible. By introducing a multiscale decomposition of shortest paths, we show that the contributions to betweenness coming from geodesics not longer than L obey a characteristic scaling vs L, which can be used to predict the distribution of the full centralities. The method is also illustrated on a real-world social network of 5.5*10^6 nodes and 2.7*10^7 links.

Ercsey-Ravasz, Maria

2010-01-01T23:59:59.000Z

359

Network topology analysis.  

SciTech Connect

Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

Kalb, Jeffrey L.; Lee, David S.

2008-01-01T23:59:59.000Z

360

Modeling spatio-temporal network computations: a summary of results  

Science Conference Proceedings (OSTI)

Spatio-temporal network is defined by a set of nodes, and a set of edges, where the properties of nodes and edges may vary over time. Such networks are encountered in a variety of domains ranging from transportation science to sensor data analysis. Given ...

Betsy George; Shashi Shekhar

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Feature extraction for pulmonary crackle representation via wavelet networks  

Science Conference Proceedings (OSTI)

In this study, wavelet networks have been used to parameterize and quantify pulmonary crackles with an aim to depict the waveform with a small set of meaningful parameters. Complex Morlet wavelets are used at the nodes of both single and double-node ... Keywords: Crackle parameters, EM clustering, Lung sounds, Pulmonary crackles, Robustness to noise, Wavelet networks

Mete Yeginer; Yasemin P. Kahya

2009-08-01T23:59:59.000Z

362

An Underwater Sensor Network with Dual Communications, Sensing, and  

E-Print Network (OSTI)

An Underwater Sensor Network with Dual Communications, Sensing, and Mobility Carrick Detweiller an underwater sensor network with dual communication and sup- port for sensing and mobility. The nodes developed. We describe the hardware details of the underwater sensor node and the communication

Farritor, Shane

363

Reliable and efficient reprogramming in sensor networks  

Science Conference Proceedings (OSTI)

Retasking and remote programming of sensor networks is an essential functionality to make these networks practical and effective. As the availability of more capable sensor nodes increases and new functional implementations continue to be proposed, these ... Keywords: Broadcast, energy efficiency, minimum energy broadcast, reliable distribution, reprogramming, retasking, sensor networks

Chris Miller; Christian Poellabauer

2010-08-01T23:59:59.000Z

364

A new algorithm for gas network simulation  

Science Conference Proceedings (OSTI)

The simulation of natural gas networks has a growing importance for operators of networks. In this paper a new simulation algorithm based on the node potential analysis is presented. The approach is to evaluate analogies between electrical circuits and ... Keywords: algorithms, gas, modeling, networks, nonlinearities, simulation

Jens Rüdiger; Jurij Schiebelbein; Rainhart Lunderstädt; Joachim Horn

2006-02-01T23:59:59.000Z

365

Utility optimal scheduling in energy harvesting networks  

Science Conference Proceedings (OSTI)

In this paper, we show how to achieve close-to-optimal utility performance in energy harvesting networks with only finite capacity energy storage devices. In these networks, nodes are capable of harvesting energy from the environment. The amount ... Keywords: Lyapunov analysis, energy harvesting, queueing, stochastic network

Longbo Huang; Michael J. Neely

2011-05-01T23:59:59.000Z

366

Scale-Free Growing Networks and Gravity  

E-Print Network (OSTI)

We propose a possible relation between complex networks and gravity. Our guide in our proposal is the power-law distribution of the node degree in network theory and the information approach to gravity. The established bridge may allow us to carry geometric mathematical structures, which are considered in gravitational theories, to probabilistic aspects studied in the framework of complex networks and vice versa.

J. A. Nieto

2011-12-08T23:59:59.000Z

367

Building programmable routing service for sensor networks  

Science Conference Proceedings (OSTI)

Current routing services for sensor networks are application-specific. They are pre-configured into nodes, and thus have difficulty in adapting to different applications and network conditions. This paper describes a framework to build programmable routing ... Keywords: Energy saving, Parameterization, Programmable, Routing, Sensor networks

Yu He; Cauligi S. Raghavendra

2005-04-01T23:59:59.000Z

368

LUSTER: wireless sensor network for environmental research  

Science Conference Proceedings (OSTI)

Environmental wireless sensor network (EWSN) systems are deployed in potentially harsh and remote environments where inevitable node and communication failures must be tolerated. LUSTER---Light Under Shrub Thicket for Environmental Research---is a system ... Keywords: LiteTDMA, architecture, environmental science, implementation, mote, network protocol, storage, validation, wireless sensor network

L. Selavo; A. Wood; Q. Cao; T. Sookoor; H. Liu; A. Srinivasan; Y. Wu; W. Kang; J. Stankovic; D. Young; J. Porter

2007-11-01T23:59:59.000Z

369

Identifying failure in a tree network of a parallel computer  

DOE Patents (OSTI)

Methods, parallel computers, and products are provided for identifying failure in a tree network of a parallel computer. The parallel computer includes one or more processing sets including an I/O node and a plurality of compute nodes. For each processing set embodiments include selecting a set of test compute nodes, the test compute nodes being a subset of the compute nodes of the processing set; measuring the performance of the I/O node of the processing set; measuring the performance of the selected set of test compute nodes; calculating a current test value in dependence upon the measured performance of the I/O node of the processing set, the measured performance of the set of test compute nodes, and a predetermined value for I/O node performance; and comparing the current test value with a predetermined tree performance threshold. If the current test value is below the predetermined tree performance threshold, embodiments include selecting another set of test compute nodes. If the current test value is not below the predetermined tree performance threshold, embodiments include selecting from the test compute nodes one or more potential problem nodes and testing individually potential problem nodes and links to potential problem nodes.

Archer, Charles J. (Rochester, MN); Pinnow, Kurt W. (Rochester, MN); Wallenfelt, Brian P. (Eden Prairie, MN)

2010-08-24T23:59:59.000Z

370

Monitoring Energy Consumption In Wireless Sensor Networks  

E-Print Network (OSTI)

sequences of temperature maps. It is used to compare and evaluate beacon-less geographic routing algorithms information to divide the network into fixed square grids and nodes in each grid alternate between sleeping between dominating and dominated. ­ Transmission power control: The transmission power of the nodes

Turau, Volker

371

Phase response characteristics of sinoatrial node cells  

Science Conference Proceedings (OSTI)

In this work, the dynamic response of the sinoatrial node (SAN), the natural pacemaker of the heart, to short external stimuli is investigated using the Zhang et al. model. The model equations are solved twice for the central cell and for the peripheral ... Keywords: Cardiac models, Heart, Mathematical models, Phase resetting, Regional differences, Sinoatrial node, Three-dimensional phase transition curves

D. G. Tsalikakis; H. G. Zhang; D. I. Fotiadis; G. P. Kremmydas; ?. K. Michalis

2007-01-01T23:59:59.000Z

372

A new approach for integrated coverage and connectivity in wireless sensor networks  

Science Conference Proceedings (OSTI)

An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes while the remaining nodes stay active to provide continuous service. For the sensor network to operates successfully, the active ... Keywords: Connectivity, Coverage, Deployment, Sensor network

Seyed Hossein Khasteh; Saeed Bagheri Shouraki; Nima Hajiabdorahim; Ehsan Dadashnialehi

2012-12-01T23:59:59.000Z

373

A learning automata based scheduling solution to the dynamic point coverage problem in wireless sensor networks  

Science Conference Proceedings (OSTI)

The dynamic point coverage problem in wireless sensor networks is to detect some moving target points in the area of the network using as few sensor nodes as possible. One way to deal with this problem is to schedule sensor nodes in such a way that a ... Keywords: Dynamic point coverage, Learning automata, Scheduling, Wireless sensor network

M. Esnaashari; M. R. Meybodi

2010-10-01T23:59:59.000Z

374

Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks  

Science Conference Proceedings (OSTI)

A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They ... Keywords: cc2420 security, group key distribution, sensor network security

Morten Tranberg Hansen

2009-03-01T23:59:59.000Z

375

Energy-aware Gateway Selection for Increasing the Lifetime of Wireless Body Area Sensor Networks  

Science Conference Proceedings (OSTI)

A Wireless Body Area Sensor Network (WBASN) is composed of a set of sensor nodes, placed on, near or within a human body. WBASNs opt to continuously monitor the health conditions of individuals under medical risk, e.g., elders and chronically ill people, ... Keywords: Energy harvesting, Gateway selection algorithm, Network lifetime, Selective engagement of nodes, Wireless Body Area Sensor Networks (WBASN)

Cuneyt Bayilmis; Mohamed Younis

2012-06-01T23:59:59.000Z

376

Measuring air quality in city areas by vehicular wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper considers a micro-climate monitoring scenario, which usually requires deploying a large number of sensor nodes to capture environmental information. By exploiting vehicular sensor networks (VSNs), it is possible to equip fewer nodes on cars ... Keywords: Micro-climate monitoring, Opportunistic communication, Pervasive computing, Vehicular sensor network, Wireless sensor network

Shu-Chiung Hu; You-Chiun Wang; Chiuan-Yu Huang; Yu-Chee Tseng

2011-11-01T23:59:59.000Z

377

Quantum network coding for quantum repeaters  

E-Print Network (OSTI)

This paper considers quantum network coding, which is a recent technique that enables quantum information to be sent on complex networks at higher rates than by using straightforward routing strategies. Kobayashi et al. have recently showed the potential of this technique by demonstrating how any classical network coding protocol gives rise to a quantum network coding protocol. They nevertheless primarily focused on an abstract model, in which quantum resource such as quantum registers can be freely introduced at each node. In this work, we present a protocol for quantum network coding under weaker (and more practical) assumptions: our new protocol works even for quantum networks where adjacent nodes initially share one EPR-pair but cannot add any quantum registers or send any quantum information. A typically example of networks satisfying this assumption is {\\emph{quantum repeater networks}}, which are promising candidates for the implementation of large scale quantum networks. Our results thus show, for the...

Satoh, Takahiko; Imai, Hiroshi

2012-01-01T23:59:59.000Z

378

Mobile sensor network localization in harsh environments  

Science Conference Proceedings (OSTI)

The node localization problem in mobile sensor networks has recently received significant attention. Particle filters, adapted from robotics, have produced good localization accuracies in conventional settings, but suffer significantly when used in challenging ...

Harsha Chenji; Radu Stoleru

2010-06-01T23:59:59.000Z

379

Battery discharge characteristics of wireless sensor nodes: An experimental analysis  

E-Print Network (OSTI)

Abstract — Battery life extension is the principal driver for energy-efficient wireless sensor network (WSN) design. However, there is growing awareness that in order to truly maximize the operating life of battery-powered systems such as sensor nodes, it is important to discharge the battery in a manner that maximizes the amount of charge extracted from it. In spite of this, there is little published data that quantitatively analyzes the effectiveness with which modern wireless sensor nodes discharge their batteries, under different operating conditions. In this paper, we report on systematic experiments that we conducted to quantify the impact of key wireless sensor network design and environmental parameters on battery performance. Our testbed consists of MICA2DOT Motes, a commercial lithiumcoin battery, and a suite of techniques for measuring battery performance. We evaluate the extent to which known electrochemical phenomena, such as rate-capacity characteristics, charge recovery and thermal effects, can play a role in governing the selection of key WSN design parameters such as power levels, packet sizes, etc. We demonstrate that battery characteristics significantly alter and complicate otherwise well-understood trade-offs in WSN design. In particular, we analyze the non-trivial implications of battery characteristics on WSN power control strategies, and find that a battery-aware approach to power level selection leads to a 52 % increase in battery efficiency. We expect our results to serve as a quantitative basis for future research in designing battery-efficient sensing applications and protocols. I.

Chulsung Park; Kanishka Lahiri

2005-01-01T23:59:59.000Z

380

Multicasting in Large Wireless Networks: Bounds on the Minimum Energy per Bit  

E-Print Network (OSTI)

We consider scaling laws for maximal energy efficiency of communicating a message to all the nodes in a wireless network, as the number of nodes in the network becomes large. Two cases of large wireless networks are studied -- dense random networks and constant density (extended) random networks. In addition, we also study finite size regular networks in order to understand how regularity in node placement affects energy consumption. We first establish an information-theoretic lower bound on the minimum energy per bit for multicasting in arbitrary wireless networks when the channel state information is not available at the transmitters. Upper bounds are obtained by constructing a simple flooding scheme that requires no information at the receivers about the channel states or the locations and identities of the nodes. The gap between the upper and lower bounds is only a constant factor for dense random networks and regular networks, and differs by a poly-logarithmic factor for extended random networks. Further...

Jain, Aman; Verdu, Sergio

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Downhole drilling network using burst modulation techniques  

DOE Patents (OSTI)

A downhole drilling system is disclosed in one aspect of the present invention as including a drill string and a transmission line integrated into the drill string. Multiple network nodes are installed at selected intervals along the drill string and are adapted to communicate with one another through the transmission line. In order to efficiently allocate the available bandwidth, the network nodes are configured to use any of numerous burst modulation techniques to transmit data.

Hall; David R. (Provo, UT), Fox; Joe (Spanish Fork, UT)

2007-04-03T23:59:59.000Z

382

for distributed wireless sensor networks  

E-Print Network (OSTI)

MEMS technology is enabling the development of inexpensive, autonomous wireless sensor nodes with volumes ranging from cubic mm to several cubic cm. These tiny sensor nodes can form rapidly deployed, massive distributed networks to allow unobtrusive, spatially dense, sensing and communication. MEMS enable these devices by reducing both the volume and energy consumption of various components. This paper will review some of the wireless sensor nodes under development and applicable MEMS devices for small and efficient optical communication, micropower generation, and sensing. In addition, CMOS post-process micromachining will be discussed as a method of achieving low cost and high integration. 1.

Brett A. Warneke; Kristofer S. J. Pister

2002-01-01T23:59:59.000Z

383

Capturing Actor-level Dynamics of Longitudinal Networks  

Science Conference Proceedings (OSTI)

Study of the dynamics of longitudinal networks has already attracted enormous research interest. Although dynamics of networks can be captured both at network-level and node / actor-level, the latter has gained less attention in current literature. By ... Keywords: actor-level dynamics, static toopology, dynamic topology, topological analysis, longitudinal networks

Shahadat Uddin; Kon Shing Kenneth Chung; Mahendra Piraveenan

2012-08-01T23:59:59.000Z

384

WSN-inspired sleep protocols for heterogeneous LTE networks  

Science Conference Proceedings (OSTI)

The tremendous increase of the traffic demand in cellular networks imposes a massive densification of the traditional cellular infrastructure. The network architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed ... Keywords: cellular network, energy optimization, switch off mechanisms, topology control

Iulia Tunaru, Hervé Rivano, Fabrice Valois

2013-11-01T23:59:59.000Z

385

A New Commissioning and Deployment Method for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Sensor networks are deployed on various environments in order to collect sensing information in many cases. It is not easy to optimize program codes of all nodes due to the environmental variety of deployment of sensor networks. Therefore, commissioning ... Keywords: sensor network, commissioning, ZigBee, network deployment

Bong Wan Kim; Seong-Soon Joo

2009-10-01T23:59:59.000Z

386

A virtual infrastructure for large-scale wireless sensor networks  

Science Conference Proceedings (OSTI)

The primary goal of a wireless sensor network is to collect useful information from the network. Most wireless sensor networks are assumed that the number of nodes are very large and they should operate with confined resources. Consequently it is important ... Keywords: Data collection, Railroad, Topology, Wireless sensor networks

Jeong-Hun Shin; Daeyeon Park

2007-10-01T23:59:59.000Z

387

Flexible network wireless transceiver and flexible network telemetry transceiver  

DOE Patents (OSTI)

A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

Brown, Kenneth D. (Grain Valley, MO)

2008-08-05T23:59:59.000Z

388

A NETWORK PROCESSING NODE FOR LIGHT UNMANNED AIRCRAFT.  

E-Print Network (OSTI)

??Over the last decade, research into unmanned and autonomous vehicles has greatly increased. With applications ranging from science and exploration to humanitarian and military efforts,… (more)

Arrowsmith, Timothy William

2007-01-01T23:59:59.000Z

389

A framework for wireless sensor networks management for precision viticulture and agriculture based on IEEE 1451 standard  

Science Conference Proceedings (OSTI)

Precision viticulture (PV) and precision agriculture (PA) requires the acquisition and processing of a vast collection of data coming typically from large scale and heterogeneous sensor networks. Unfortunately, sensor integration is far from being simple ... Keywords: Gateway, IEEE 1451, IEEE 802.15.4, Precision agriculture, Precision viticulture, Wireless sensor networks

Miguel A. Fernandes, Samuel G. Matos, Emanuel Peres, Carlos R. Cunha, Juan A. LóPez, P. J. S. G. Ferreira, M. J. C. S. Reis, Raul Morais

2013-07-01T23:59:59.000Z

390

Networking RP @ DISI Fabrizio Granelli, Lab Coordinator  

E-Print Network (OSTI)

S and resource management Wireless mesh networks: WiFi, WiMax Cellular: transmission, protocols and network and management Distributed signaling Overlay to network mapping and cooperation Research Topics: Protocol Design-Layering Performance Improvement in Wireless Networks Congestion Control GRID & Overlay Networks Design of Wireless

Granelli, Fabrizio

391

Network Upgrade for the SLC: PEP II Network  

SciTech Connect

The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status information is included.

Crane, M.; Call, M.; Clark, S.; Coffman, F.; Himel, T.; Lahey, T.; Miller, E.; Sass, R.; /SLAC

2011-09-09T23:59:59.000Z

392

Maximum Availability Architecture Oracle Best Practices For High AvailabilityOracle White Paper—Configuring Oracle Management Agent to Manage Oracle Fail Safe  

E-Print Network (OSTI)

Setting up Oracle Management Agent and Oracle Fail Safe.............. 3 Step 1: Install a Management Agent on each cluster node............ 3

Executive Overview; Introduction Oracle; Fail Safe

2010-01-01T23:59:59.000Z

393

A framework for energy consumption based design space exploration for wireless sensor nodes  

E-Print Network (OSTI)

In wireless sensor networks due to the small transmission distances involved, the computation energy along with the radio energy determines the battery life. Energy consumption of error control codes (ECCs) is a complex function of the energy consumption in computing encoding-decoding, transmitting “redundant ” bits and energy saved by coding gain. This paper presents a methodology, which integrates computation and radio energy for searching an energy optimal ECC. Based on this methodology, a design space exploration framework and the energy model of sensor node have been developed. Exploration results show that the energy optimal ECC saves 15–58 % node energy for given parameters.

Sonali Chouhan; M. Balakrishnan; Ranjan Bose

2008-01-01T23:59:59.000Z

394

Tutorial T3 Traffic Engineering in IP/MPLS Networks  

E-Print Network (OSTI)

; Policing; Buffer management usec #12;Road Map · TE and QoS Management in IP (datagram) Networks: ­ Routing

Elwalid, Anwar

395

Outsourcing network functionality  

Science Conference Proceedings (OSTI)

This paper presents an architecture for adding functionality to networks via outsourcing. In this model, the enterprise network only forwards data; any additional processing is performed by external Feature Providers (FPs). FPs provide and manage ... Keywords: jingling, middleboxes, network services, outsourcing, sdn

Glen Gibb; Hongyi Zeng; Nick McKeown

2012-08-01T23:59:59.000Z

396

Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling  

Science Conference Proceedings (OSTI)

As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical ...

Francis Minhthang Bui; Dimitrios Hatzinakos

2008-01-01T23:59:59.000Z

397

Resource management algorithms for real-time wireless sensor networks with applications in cyber-physical systems  

Science Conference Proceedings (OSTI)

Wireless Sensor Networks (WSN) are playing a key role in the efficient operation of Cyber Physical Systems (CPS). They provide cost efficient solutions to current and future CPS requirements such as real-time structural awareness, faster event localization, ...

Benazir Fateh / Manimaran Govindarasu

2013-01-01T23:59:59.000Z

398

Effective algorithms and protocols for wireless networking: a topological approach  

E-Print Network (OSTI)

Much research has been done on wireless sensor networks. However, most protocols and algorithms for such networks are based on the ideal model Unit Disk Graph (UDG) model or do not assume any model. Furthermore, many results assume the knowledge of location information of the network. In practice, sensor networks often deviate from the UDG model significantly. It is not uncommon to observe stable long links that are more than five times longer than unstable short links in real wireless networks. A more general network model, the quasi unit-disk graph (quasi-UDG) model, captures much better the characteristics of wireless networks. However, the understanding of the properties of general quasi-UDGs has been very limited, which is impeding the design of key network protocols and algorithms. In this dissertation we study the properties for general wireless sensor networks and develop new topological/geometrical techniques for wireless sensor networking. We assume neither the ideal UDG model nor the location information of the nodes. Instead we work on the more general quasi-UDG model and focus on figuring out the relationship between the geometrical properties and the topological properties of wireless sensor networks. Based on such relationships we develop algorithms that can compute useful substructures (planar subnetworks, boundaries, etc.). We also present direct applications of the properties and substructures we constructed including routing, data storage, topology discovery, etc. We prove that wireless networks based on quasi-UDG model exhibit nice properties like separabilities, existences of constant stretch backbones, etc. We develop efficient algorithms that can obtain relatively dense planar subnetworks for wireless sensor networks. We also present efficient routing protocols and balanced data storage scheme that supports ranged queries. We present algorithmic results that can also be applied to other fields (e.g., information management). Based on divide and conquer and improved color coding technique, we develop algorithms for path, matching and packing problem that significantly improve previous best algorithms. We prove that it is unlikely for certain problems in operation science and information management to have any relatively effective algorithm or approximation algorithm for them.

Zhang, Fenghui

2008-08-01T23:59:59.000Z

399

GEOGRAPHICALLY STATIC QUORUMS IN AD-HOC NETWORKS AND THEIR PERFORMANCE AS LOCATION SERVERS  

E-Print Network (OSTI)

other without being in transmission range by relaying their messages through intermediate nodes. Routing a function that maps a node's ID to its location, but whilst this is ideal when networks are static into grid-squares of different orders. Starting with the grid-square that the node currently occupies

Kent, University of

400

LARS: a locally aware reputation system for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Mobile ad hoc networks (MANETs) have nodes that are dynamically and arbitrarily located. The nodes are often battery powered and may behave selfishly to preserve power. A promising mechanism to deal with node selfishness is to use reputation methods. ... Keywords: MANET, reputation systems, selfishness, trust, virtual currency schemes

Jiangyi Hu; Mike Burmester

2006-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Towards robustness and energy efficiency of cut detection in wireless sensor networks  

Science Conference Proceedings (OSTI)

Reliable, full network connectivity in wireless sensor networks (WSN) is difficult to maintain. Awareness of the state of network connectivity is similarly challenging. Harsh, unattended, low-security environments and resource-constrained nodes exacerbate ... Keywords: Network cut detection, Topology control, Wireless sensor networks

Myounggyu Won; Stephen M. George; Radu Stoleru

2011-05-01T23:59:59.000Z

402

Review: Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification  

Science Conference Proceedings (OSTI)

Vehicular Ad hoc NETworks (VANETs) allow vehicles to form a self-organized network without the need for a permanent infrastructure. As a prerequisite to communication, an efficient route between network nodes must be established, and it must adapt to ... Keywords: Inter-vehicle communication, Mobile ad hoc network, Routing, VANET, Vehicular ad hoc networks

James Bernsen; D. Manivannan

2009-02-01T23:59:59.000Z

403

Latency-sensitive power control for wireless ad-hoc networks  

Science Conference Proceedings (OSTI)

We investigate the impact of power control on latency in wireless ad-hoc networks. If transmission power is increased, interference increases, thus reducing network capacity. A node sending/relaying delay-sensitive real-time application traffic can, ... Keywords: ad-hoc networks, latency, medium access control, network connectivity, power control, wireless networks

Mohamed R. Fouad; Sonia Fahmy; Gopal Pandurangan

2005-10-01T23:59:59.000Z

404

An efficient cluster-based self-organisation algorithm for wireless sensor networks  

Science Conference Proceedings (OSTI)

The paper proposes an Efficient Cluster-based Self-organisation Algorithm (ECSA) for partitioning Wireless Sensor Networks (WSNs) into clusters, thus giving at the network a hierarchical organisation. Each sensor uses its weight ... Keywords: WSNs, cluster head, clustering algorithms, energy dissipation, homogeneous clusters, k-density, network lifetime, node weight, residual energy, self-organisation, wireless networks, wireless sensor networks

Mohamed Lehsaini; Herve Guyennet; Mohammed Feham

2010-02-01T23:59:59.000Z

405

Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network  

Science Conference Proceedings (OSTI)

The demand for maximum network lifetime in many mission-critical applications of wireless sensor networks motivates the great significance to deploy as few sensors as possible to achieve the expected network performance. In this paper, we first characterize ... Keywords: Adjustable transmission range, Energy-hole, Network lifetime, Node deployment, Wireless sensor network

Anfeng Liu; Xin Jin; Guohua Cui; Zhigang Chen

2013-05-01T23:59:59.000Z

406

No. 7 Signaling Network Configuration for Interworking Between B-ISDN and N-ISDN  

Science Conference Proceedings (OSTI)

Abstract: No.7 Signaling is used to transfer signaling and control information between network nodes in ISDN, Intelligent Network and Mobile Network. It is also used ATM-based B-ISDN signaling network. In the beginning of B-ISDN, broadband network services ...

Hwa-Suk Kim; Yun-Young An; Woo-Seop Rhee

1998-01-01T23:59:59.000Z

407

A new architectural approach for optical burst switching networks based on a common control channel  

Science Conference Proceedings (OSTI)

The new architectural approach to Optical Burst Switching networks presented here features a common control channel and a node locally maintained network model. The Common Control Channel allows for a fast and efficient broadcast of the network Control ... Keywords: Optical burst switched networks, Optical network architecture

Nuno M. Garcia; Paulo P. Monteiro; MáRio M. Freire; José R. Santos; Przemyslaw Lenkiewicz

2007-11-01T23:59:59.000Z

408

Trends in the development of communication networks: Cognitive networks  

Science Conference Proceedings (OSTI)

One of the main challenges already faced by communication networks is the efficient management of increasing complexity. The recently proposed concept of cognitive network appears as a candidate that can address this issue. In this paper, we survey the ... Keywords: Autonomic networks, Cognition loop, Cognitive networks, Cross-layer, Knowledge representation, Learning, OSI, Protocol stack, Reasoning, Self-aware

Carolina Fortuna; Mihael Mohorcic

2009-06-01T23:59:59.000Z

409

Ad Hoc mobility management with uniform quorum systems  

Science Conference Proceedings (OSTI)

Keywords: Ad hoc network, balanced incomplete block design, data distribution, mobility management, quorum system, reconfigurable wireless network, uniform quorum system

Zygmunt J. Haas; Ben Liang

1999-04-01T23:59:59.000Z

410

Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version)  

Science Conference Proceedings (OSTI)

We consider a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing. This type of routing takes advantage of the mobility and the storage capacity of the nodes, called the relay ... Keywords: Delay tolerant network, Limited packet lifetime, Mobile ad hoc network, Mobility model, Performance analysis, Two-hop relay protocol

Ahmad Al Hanbali; Philippe Nain; Eitan Altman

2008-06-01T23:59:59.000Z

411

Combining Mobile XMPP Entities and Cloud Services for Collaborative Post-Disaster Management in Hybrid Network Environments  

Science Conference Proceedings (OSTI)

Crises such as the Fukushima incident in Japan showed the demand for flexible and easy-to-use monitoring and communication systems to support post-disaster management (i.e. the organization of actions in the follow-up of disasters), especially when critical ... Keywords: XMPP, cloud services, collaboration, mDNS, post-disaster management

Ronny Klauck; Michael Kirsche

2013-04-01T23:59:59.000Z

412

Routing Technique Based on Clustering for Data Duplication Prevention in Wireless Sensor Network  

E-Print Network (OSTI)

Wireless Sensor Networks is important to nodes energy consumption for long activity of sensor nodes because nodes that compose sensor network are small size, and battery capacity is limited. For energy consumption decrease of sensor nodes, sensor networks routing technique is divided by flat routing and hierarchical routing technique. Specially, hierarchical routing technique is energy efficient routing protocol to pare down energy consumption of whole sensor nodes and to scatter energy consumption of sensor nodes by forming cluster and communicating with cluster head. but though hierarchical routing technique based on clustering is advantage more than flat routing technique, this is not used for reason that is not realistic. The reason that is not realistic is because hierarchical routing technique does not consider data transmission radius of sensor node in actually. so this paper propose realistic routing technique base on clustering.

Kim, Boseung; Shin, Yongtae

2009-01-01T23:59:59.000Z

413

Energy-efficient space-time coded cooperative routing in multihop wireless networks  

Science Conference Proceedings (OSTI)

Due to the limited energy supplies of nodes in many applications like wireless sensor networks, energy efficiency is crucial for extending the lifetime of these networks. This paper addresses the routing problem for outage-restricted multihop wireless ...

Behrouz Maham; Ravi Narasimhan; Are Hjørungnes

2009-11-01T23:59:59.000Z

414

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas  

E-Print Network (OSTI)

Long-distance multi-hop wireless networks have been used in recent years to provide connectivity to rural areas. The salient features of such networks include TDMA channel access, nodes with multiple radios, and point-to-point ...

Dutta, Partha

415

Scheduling algorithms for throughput maximization in time-varying networks with reconfiguration delays  

E-Print Network (OSTI)

We consider the control of possibly time-varying wireless networks under reconfiguration delays. Reconfiguration delay is the time it takes to switch network resources from one subset of nodes to another and it is a ...

Celik, Guner Dincer

2012-01-01T23:59:59.000Z

416

Hypothesizing about causal networks with positive and negative effects by meta-level abduction  

Science Conference Proceedings (OSTI)

Meta-level abduction discovers missing links and unknown nodes from incomplete networks to complete paths for observations. In this work, we extend applicability of meta-level abduction to deal with networks containing both positive and negative causal ...

Katsumi Inoue; Andrei Doncescu; Hidetomo Nabeshima

2010-06-01T23:59:59.000Z

417

Multi-hop routing is order-optimal in underwater extended networks  

E-Print Network (OSTI)

Capacity scaling laws are analyzed in an underwater acoustic network with n regularly located nodes. A narrow-band model is assumed where the carrier frequency is allowed to scale as a function of n. In the network, we ...

Shin, Won-Yong

418

Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks  

E-Print Network (OSTI)

Mesh Network Configuration (MSH-NCFG) messages. Each MSH-NCFG message contains a Network Descriptor by listening to MSH-NCFG messages. From all the possible neighboring nodes that advertise MSH-NCFG messages

Hua, Kien A.

419

Energy efficient sensor network implementations  

Science Conference Proceedings (OSTI)

In this paper, we discuss a low power embedded sensor node architecture we are developing for distributed sensor network systems deployed in a natural environment. In particular, we examine the sensor node for energy efficient processing-at-the-sensor. We analyze the following modes of operation; event detection, sleep(wake-up), data acquisition, data processing modes using low power, high performance embedded technology such as specialized embedded DSP processors and a low power FPGAs at the sensing node. We use compute intensive sensor node applications: an acoustic vehicle classifier (frequency domain analysis) and a video license plate identification application (learning algorithm) as a case study. We report performance and total energy usage for our system implementations and discuss the system architecture design trade offs.

Frigo, Janette R [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Kulathumani, Vinod [WEST VIRGINIA UNIV.; Rosten, Ed [CAMBRIDGE UNIV.; Wolinski, Christophe [IRISA; Wagner, Charles [IRISA; Charot, Francois [IRISA

2009-01-01T23:59:59.000Z

420

Throughput and delay analysis for hybrid radio-frequency and free-space-optical (RF/FSO) networks  

Science Conference Proceedings (OSTI)

In this paper the per-node throughput and end-to-end delay of randomly deployed (i.e. ad-hoc) hybrid radio frequency - free space optics (RF/FSO) networks are studied. The hybrid RF/FSO network consists of an RF ad hoc network of n nodes, f(n) ... Keywords: Ad hoc networks, Delay, Free space optics, Hybrid networks, Throughput capacity

Di Wang; Alhussein A. Abouzeid

2011-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Network scheduling for data archiving applications in sensor networks  

Science Conference Proceedings (OSTI)

Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An example is FPS, an adaptive power scheduling algorithm that combines slotted ...

Yong Yao; S. M. Nazrul Alam; Johannes Gehrke; Sergio D. Servetto

2006-09-01T23:59:59.000Z

422

Small Business Network List | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Network List Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy...

423

Efficient code distribution in wireless sensor networks  

Science Conference Proceedings (OSTI)

The need to reprogramme a wireless sensor network may arise from changing application requirements, bug fixes, or during the application development cycle. Once deployed, it will be impractical at best to reach each individual node. Thus, a scheme is ... Keywords: code distribution, compression, reprogramming, sensor networks, string distance, wireless

Niels Reijers; Koen Langendoen

2003-09-01T23:59:59.000Z

424

A virtual environment for network testing  

Science Conference Proceedings (OSTI)

The testing of network-based solutions demands a series of tedious tasks such as the deployment of the solution at different nodes and the configuration of different topologies. The manual execution of these tasks is very time consuming and a configurable ... Keywords: Re-configuration, Software testing, Virtual network

Wade A. Fagen; João W. Cangussu; Ram Dantu

2009-01-01T23:59:59.000Z

425

Dual wakeup design for wireless sensor networks  

Science Conference Proceedings (OSTI)

Energy is often identified as the single most important resource in wireless battery-powered sensor networks. While current wakeup schemes in the literature promise to conserve energy in such networks, they apply several assumptions that may not be always ... Keywords: Cyclic block design, Dual wakeup design, Energy conservation, Lonely node, Time-tolerance sensing

Y. F. Wong; L. H. Ngoh; Winston K. G. Seah; Wai-Choong Wong

2009-01-01T23:59:59.000Z

426

Deterministic Secure Positioning in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Position verification problem is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location information in ... Keywords: Distributed Protocol, Secure Positioning, Wireless Sensor Network

Sylvie Delaët; Partha Sarathi Mandal; Mariusz A. Rokicki; Sébastien Tixeuil

2008-06-01T23:59:59.000Z

427

ACT4: Networked Aquatic Sampling System  

E-Print Network (OSTI)

system for field operation • Wireless 802.11b based networkOperation • Continuous real time data acquisition and logging of pertinent environmental parameters • WirelessOperation • Network of 10 static nodes and 1 robotic boat • AODV based ad-hoc 802.11b wireless

2005-01-01T23:59:59.000Z

428

Establishing talent management for company's succession planning through analytic network process: Application to an MNC semiconductor company in Taiwan  

Science Conference Proceedings (OSTI)

This study is to design a leadership development program for a company's succession planning which will be important for its future competition. A semiconductor assembly and testing multinational corporation (MNC) in Taiwan was selected for interviews ... Keywords: Analytic network process (ANP), High potential (HiPo), Leadership competencies, Succession planning

F. C. Hor; Liang-Chih Huang; Hsu-Shih Shih; Yen-Hua Lee; E. Stanley Lee

2010-08-01T23:59:59.000Z

429

Decision support methodology using rule-based reasoning coupled to non-parametric measurement for industrial wastewater network management  

Science Conference Proceedings (OSTI)

EU water framework directive [Directive 2000/60/EC of the European Parliament and of the Council of 23 October 2000 Establishing a Framework for Community Action in the Field of Water Policy, Official Journal L 327, 22/12/2000 p. 0001-0073] encourages ... Keywords: Decision support methodology (DSM), Industrial wastewater network, UV spectra, Variability, WWTP, Wastewater quality controls

E. Dupuit; M. F. Pouet; O. Thomas; J. Bourgois

2007-08-01T23:59:59.000Z

430

A Failure Self-recovery Strategy with Balanced Energy Consumption for Wireless Ad Hoc Networks  

E-Print Network (OSTI)

In energy constrained wireless sensor networks, it is significant to make full use of the limited energy and maximize the network lifetime even when facing some unexpected situation. In this paper, all sensor nodes are grouped into clusters, and for each cluster, it has a mobile cluster head to manage the whole cluster. We consider an emergent situation that one of the mobile cluster heads is broken down, and hence the whole cluster is consequently out of work. An efficient approach is proposed for recovering the failure cluster by selecting multiple static sensor nodes as the cluster heads to collect packets and transmit them to the sink node. Improved simulated annealing algorithm is utilized to achieve the uniform deployment of the cluster heads. The new cluster heads are dynamically changed in order to keep balanced energy consumption. Among the new cluster heads, packets are transmitted through multi-hop forwarding path which is cost-lowest path found by Dijkstra's algorithm. A balanced energy consumptio...

Qiu, Tie; Xia, Feng; Wu, Guowei; Zhou, Yu

2012-01-01T23:59:59.000Z

431

Sensing and modeling human networks  

E-Print Network (OSTI)

Knowledge of how groups of people interact is important in many disciplines, e.g. organizational behavior, social network analysis, knowledge management and ubiquitous computing. Existing studies of social network interactions ...

Choudhury, Tanzeem Khalid, 1975-

2004-01-01T23:59:59.000Z

432

Wildfire Management and Forecasting Fire Potential: The Roles of Climate Information and Social Networks in the Southwest United States  

Science Conference Proceedings (OSTI)

Continuing progress in the fields of meteorology, climatology, and fire ecology has enabled more proactive and risk-tolerant wildland fire management practices in the United States. Recent institutional changes have also facilitated the ...

Gigi Owen; Jonathan D. McLeod; Crystal A. Kolden; Daniel B. Ferguson; Timothy J. Brown

2012-04-01T23:59:59.000Z

433

DiffServ node with join minimum cost queue policy and multiclass traffic  

Science Conference Proceedings (OSTI)

DiffServ, the vehicle for providing relative QoS in the Internet is also easily amenable to simple and effective pricing mechanisms. By pricing access to a relative QoS, we can model a DiffServ node as a 'Join Minimum Cost Queue' in which an arriving ... Keywords: diffServ, finite buffer queues, join minimum cost queue, join shortest queue, network pricing, quasi-birth--death processes, queue control

Rahul Tandra; N. Hemachandra; D. Manjunath

2004-01-01T23:59:59.000Z

434

Evaluation of body sensor network platforms: a design space and benchmarking analysis  

Science Conference Proceedings (OSTI)

Body Sensor Networks (BSNs) consist of sensor nodes deployed on the human body for health monitoring. Each sensor node is implemented by interfacing a physiological sensor with a sensor platform consisting of components such as microcontroller, radio ... Keywords: benchmark, body sensor networks, design space, hardware systems, system performance, wearable BSNs

Sidharth Nabar; Ayan Banerjee; Sandeep K. S. Gupta; Radha Poovendran

2010-10-01T23:59:59.000Z

435

Initialization of the Benders master problem using valid inequalities applied to fixed-charge network problems  

Science Conference Proceedings (OSTI)

Network problems concern the selection of arcs in a graph in order to satisfy, at minimum cost, some flow requirements, usually expressed in the form of node-node pair demands. Benders decomposition methods, based on the idea of partitioning of the initial ... Keywords: Benders decomposition, Fixed-charge network problem, Mixed integer programming, Refinery, Scheduling of crude oil, Valid inequalities

Georgios K. D. Saharidis; Maria Boile; Sotiris Theofanis

2011-06-01T23:59:59.000Z

436

A zone-based clustering method for ubiquitous robots based on wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we propose a topology configuration method for wireless sensor networks with an objective of well balancing energy consumption over all sensor nodes without generating any isolated sensor nodes. Our scheme has some attractive features: ... Keywords: clustering, routing, ubiquitous robots, wireless sensor network

Kyungmi Kim; Hyunsook Kim; Young Choi; Sukgyu Lee; Kijun Han

2006-10-01T23:59:59.000Z

437

Flow Allocation Model and Algorithm Based on Multi-target Coal Transportation Network  

Science Conference Proceedings (OSTI)

Coal transportation network consists of multiple logistics nodes and transportation paths. As the node capacity and cost factors is limited, its flow distribution is a multi-target and multi-constraint problem. Through the use of multi-target planning ... Keywords: flow allocation, model, algorithm, multi-target, coal transportation network

Tingting Zhu; Tianjun Hu; Xifu Wang; Yalong Zhao

2012-04-01T23:59:59.000Z

438

SmartGossip: an improved randomized broadcast protocol for sensor networks  

Science Conference Proceedings (OSTI)

We investigate four performance metrics for randomized broadcast protocols on sensor networks: the fraction of nodes that receive the message (coverage), the number of first-time receivers per transmission (energy efficiency), the node-average normalized ... Keywords: SmartGossip, performance analysis, randomized protocols, sensor networks

Ananth V. Kini; Vilas Veeraraghavan; Nikhil Singhal; Steven Weber

2006-04-01T23:59:59.000Z

439

A scalable load-balancing scheme for advanced metering infrastructure network  

Science Conference Proceedings (OSTI)

The advanced metering infrastructure (AMI) network based on wireless mesh network (WMN) is composed of smart meters (SMs), relay nodes, and data aggregation points (DAPs). Relay nodes deliver metering data sent by SMs to DAPs that forwards the data to ... Keywords: advanced metering infrastructure (AMI), load balancing, route flap problem

Jeasung Park; Yujin Lim; Seung-Jin Moon; Hong-Kyu Kim

2012-10-01T23:59:59.000Z

440

Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

We consider large-scale networks with n nodes, out of which k are in possession, (e.g., have sensed or collected in some other way) k information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy ...

Salah A. Aly; Zhenning Kong; Emina Soljanin

2008-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

On improving the representation of a region achieved by a sensor network  

Science Conference Proceedings (OSTI)

This paper considers the class of applications of sensor networks in which each sensor node makes measurements, such as temperature or humidity, at the precise location of the node. Such spot-sensing applications approximate the physical condition of ... Keywords: Coverage, Lifetime, Representation error, Sensor networks, Spatial uniformity

Xiaoyu Chu; Harish Sethu

2012-05-01T23:59:59.000Z

442

Minimum power allocation for cooperative routing in multihop wireless networks  

Science Conference Proceedings (OSTI)

Due to the limited energy supplies of nodes, in many applications like wireless sensor networks, energy-efficiency is crucial for extending the lifetime of these networks. We study the routing problem for multihop wireless ad hoc networks based on cooperative ...

Behrouz Maham; Are Hjørungnes

2009-03-01T23:59:59.000Z

443

Improving broadcast efficiency in wireless sensor network time synchronization protocols  

Science Conference Proceedings (OSTI)

In this work we proposed an algorithm to allow nodes in a wireless sensor network to interconnect in a way such that time stamp information can be efficiently distributed for network wide synchronization. The algorithm works by first establishing a level ... Keywords: broadcast optimization, sensor networks, time synchronization

Wenxun Huang; Yujuan Quan; Deming Chen

2012-06-01T23:59:59.000Z

444

Energy-efficient broadcasting in all-wireless networks  

Science Conference Proceedings (OSTI)

In all-wireless networks, minimizing energy consumption is crucial as in most cases the nodes are battery-operated. We focus on the problem of power-optimal broadcast, for which it is well known that the broadcast nature of radio transmissions can be ... Keywords: approximation algorithms, complexity theory, energy efficiency, minimum-energy networks, wireless ad hoc networks

Mario ?agalj; Jean-Pierre Hubaux; Christian C. Enz

2005-01-01T23:59:59.000Z

445

A new characterization of probabilities in Bayesian networks  

Science Conference Proceedings (OSTI)

We characterize probabilities in Bayesian networks in terms of algebraic expressions called quasi-probabilities. These are arrived at by casting Bayesian networks as noisy AND-OR-NOT networks, and viewing the subnetworks that lead to a node as arguments ...

Lenhart K. Schubert

2004-07-01T23:59:59.000Z

446

Maximizing Battery Life Routing in Wireless Ad Hoc Networks  

E-Print Network (OSTI)

Maximizing Battery Life Routing in Wireless Ad Hoc Networks Weifa Liang Department of Computer Abstract--Most wireless ad hoc networks consist of mobile devices which operate on batteries. Power con, for an ad hoc network consisting of the same type of battery mobile nodes, two approximation algorithms

Liang, Weifa

447

Lossy Data Aggregation in Multihop Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, in-network data aggregation is an efficient way to reduce energy consumption in network. However, most of the existing data aggregation scheduling methods try to aggregate the data from all the nodes at all time-instances. ... Keywords: Data Loss, Data Sampling, Energy Efficiency, Lossy Data Aggregation

Guojun Dai; Jianhui Zhang; Shaojie Tang; Xingfa Shen; Changping Lv

2009-12-01T23:59:59.000Z

448

Data aggregation in wireless sensor networks using ant colony algorithm  

Science Conference Proceedings (OSTI)

Data aggregation is important in energy constraint wireless sensor networks which exploits correlated sensing data and aggregates at the intermediate nodes to reduce the number of messages exchanged network. This paper considers the problem of constructing ... Keywords: Ant colony, Data aggregation, Wireless sensor networks

Wen-Hwa Liao; Yucheng Kao; Chien-Ming Fan

2008-11-01T23:59:59.000Z

449

An efficient and secure protocol for sensor network time synchronization  

Science Conference Proceedings (OSTI)

The emerging field of wireless sensor networks offers countless possibilities for achieving large scale monitoring in a distributed environment. These networks of resource constrained nodes require time synchronization for various distributed operations, ... Keywords: cross-layer control, passive participation, sensor networks, tempest, time synchronization

Emerson Farrugia; Robert Simon

2006-02-01T23:59:59.000Z

450

Analyzing localization errors in one-dimensional sensor networks  

Science Conference Proceedings (OSTI)

One-dimensional sensor networks can be found in many fields and demand node location information for various applications. Developing localization algorithms in one-dimensional sensor networks is trivial, due to the fact that existing localization algorithms ... Keywords: Cramér-Rao lower bound, Error propagation, Estimation errors, Localization, One-dimensional sensor networks

Baoqi Huang; Changbin Yu; Brian D. O. Anderson

2012-02-01T23:59:59.000Z

451

Routing in sparse splitting optical networks with multicast traffic  

Science Conference Proceedings (OSTI)

In this paper, we investigate the problem of Multicast Routing in Sparse Splitting Networks (MR-SSN). Given a network topology with the multicast capable nodes distributed uniformly throughout the network, and a multicast session, the MR-SSN problem ... Keywords: Steiner tree, Tabu search, light splitting, multicast, power issues

Shuguang Yan; Jitender S. Deogun; Maher Ali

2003-01-01T23:59:59.000Z

452

Task-oriented Distributed Information Fusion in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

A wireless sensor network may form a part of the base for cloud computing through Internet. We present a framework of task-oriented distributed data fusion, and investigate the assignments of heterogeneous sensors on nodes in the network for a specified ... Keywords: Distributed Decision Making, Linguistic Decision Trees, Network Hierarchy, Optimal sensor assignments

Hongmei He; Zhenhuan Zhu; Erkki Makinen

2012-08-01T23:59:59.000Z

453

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ’ ability to positively influence driver behaviour and also drivers ’ ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

454

Network Connections  

NLE Websites -- All DOE Office Websites (Extended Search)

Connecting to NERSC Using X Windows Connecting to NERSC with NX Transferring Data Network Performance Queues and Scheduling Job Logs & Analytics Training & Tutorials Software Accounts & Allocations Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 Home » For Users » Network Connections Network Connections NERSC's resources can be accessed using SSH and related tools, grid tools, and via the web. This section explains how to connect to NERSC

455

Management Information Systems (MIS) Sample Occupations  

E-Print Network (OSTI)

Support Specialist Computer and Information Systems Manager Computer Training Specialist Consultant Data Recruiter Knowledge Manager Logistics Manager Management Analysis MIS Director/Specialist Network Securities & Exchange Commission Website Design Companies Wholesale & Retail Companies Operations Manager

Ronquist, Fredrik

456

Capacity of Fading Gaussian Channel with an Energy Harvesting Sensor Node  

E-Print Network (OSTI)

Network life time maximization is becoming an important design goal in wireless sensor networks. Energy harvesting has recently become a preferred choice for achieving this goal as it provides near perpetual operation. We study such a sensor node with an energy harvesting source and compare various architectures by which the harvested energy is used. We find its Shannon capacity when it is transmitting its observations over a fading AWGN channel with perfect/no channel state information provided at the transmitter. We also obtain the capacity with a finite energy buffer via Markov decision theory.

Rajesh, R

2010-01-01T23:59:59.000Z

457

FAWN: a fast array of wimpy nodes  

Science Conference Proceedings (OSTI)

This paper presents a fast array of wimpy nodes---FAWN---an approach for achieving low-power data-intensive data-center computing. FAWN couples low-power processors to small amounts of local flash storage, balancing computation and I/O capabilities. ...

David G. Andersen; Jason Franklin; Michael Kaminsky; Amar Phanishayee; Lawrence Tan; Vijay Vasudevan

2011-07-01T23:59:59.000Z

458

Incentive Pricing in Multi-Class Communication Networks  

Science Conference Proceedings (OSTI)

We consider a communication network that offers multi-class services to multiple types of traffic. Users choose service classes so as to optimize their own performance. The network associates with each traffic type a nominal service class. Optimal prices ... Keywords: Network pricing, multi-class networks, network control, network design and management, game theory, broadband networking

Ariel Orda; Nahum Shimkin

1997-04-01T23:59:59.000Z

459

A new clustering scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Energy consumption has always been the most serious issue to consider while deploying Wireless Sensor Networks (WSNs). Sensor nodes are limited in power, computational capacities and memory so reporting the occurring of specific events, such as fire ... Keywords: Opnet simulator, PMM, WSNs, cluster, event, mobile sink, sensor node model

Hajar Mousannif; Said Rakrak; Hassan Al Moatassime

2010-11-01T23:59:59.000Z

460

FAIR: Fee Arbitrated Incentive Architecture in Wireless Ad Hoc Networks  

E-Print Network (OSTI)

the average price in the estimation table for all destinations. It periodically calculates the trend mechanisms to configure itself to the changing demands of the nodes, users, and network conditions. Price, leading to potentially selfish behavior. In fact, given that node's resources (energy, processor

Li, Baochun

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Complexity analysis of pipeline mapping problems in distributed heterogeneous networks  

Science Conference Proceedings (OSTI)

Largescale scientific applications require using various system resources to execute complex computing pipelines in distributed networks to support collaborative research. System resources are typically shared in the Internet or over dedicated connections based on their location, availability, capability, and capacity. Optimizing the network performance of computing pipelines in such distributed environments is critical to the success of these applications. We consider two types of largescale distributed applications: (1) interactive applications where a single dataset is sequentially processed along a pipeline; and (2) streaming applications where a series of datasets continuously flow through a pipeline. The computing pipelines of these applications consist of a number of modules executed in a linear order in network environments with heterogeneous resources under different constraints. Our goal is to find an efficient mapping scheme that allocates the modules of a pipeline to network nodes for minimum endtoend delay or maximum frame rate. We formulate the pipeline mappings in distributed environments as optimization problems and categorize them into six classes with different optimization goals and mapping constraints: (1) Minimum Endtoend Delay with No Node Reuse (MEDNNR), (2) Minimum Endtoend Delay with Contiguous Node Reuse (MEDCNR), (3) Minimum Endtoend Delay with Arbitrary Node Reuse (MEDANR), (4) Maximum Frame Rate with No Node Reuse or Share (MFRNNRS), (5) Maximum Frame Rate with Contiguous Node Reuse and Share (MFRCNRS), and (6) Maximum Frame Rate with Arbitrary Node Reuse and Share (MFRANRS). Here, 'contiguous node reuse' means that multiple contiguous modules along the pipeline may run on the same node and 'arbitrary node reuse' imposes no restriction on node reuse. Note that in interactive applications, a node can be reused but its resource is not shared. We prove that MEDANR is polynomially solvable and the rest are NP-complete. MEDANR, where either contiguous or noncontiguous modules in the pipeline can be mapped onto the same node, is essentially the Maximum n-hop Shortest Path problem, and can be solved using a dynamic programming method. In MEDNNR and MFRNNRS, any network node can be used only once, which requires selecting the same number of nodes for onetoone onto mapping. We show its NP-completeness by reducing from the Hamiltonian Path problem. Node reuse is allowed in MEDCNR, MFRCNRS and MFRANRS, which are similar to the Maximum n-hop Shortest Path problem that considers resource sharing. We prove their NP-completeness by reducing from the Disjoint-Connecting-Path Problem and Widest path with the Linear Capacity Constraints problem, respectively.

Lin, Ying [University of Tennessee, Knoxville (UTK); Wu, Qishi [ORNL; Zhu, Mengxia [ORNL; Rao, Nageswara S [ORNL

2009-04-01T23:59:59.000Z

462

On the design of a novel two-objective harmony search approach for distance- and connectivity-based localization in wireless sensor networks  

Science Conference Proceedings (OSTI)

In several wireless sensor network applications the availability of accurate nodes' location information is essential to make collected data meaningful. In this context, estimating the positions of all unknown-located nodes of the network based on noisy ... Keywords: Flip ambiguity, Harmony Search, Localization, Multi-objective, Wireless Sensor Networks

Diana Manjarres; Javier Del Ser; Sergio Gil-Lopez; Massimo Vecchio; Itziar Landa-Torres; Sancho Salcedo-Sanz; Roberto Lopez-Valcarce

2013-02-01T23:59:59.000Z

463

Candidate sets for alternative routes in road networks  

Science Conference Proceedings (OSTI)

We present a fast algorithm with preprocessing for computing multiple good alternative routes in road networks. Our approach is based on single via node routing on top of Contraction Hierarchies and achieves superior quality and efficiency compared to ...

Dennis Luxen; Dennis Schieferdecker

2012-06-01T23:59:59.000Z

464

Cooperative game-based routing approach for wireless sensor network  

Science Conference Proceedings (OSTI)

Aiming at the security and limited energy issues in wireless sensor network, this paper introduces a secure and energy-saving routing protocol based on cooperative game strategy. A novel incentive mechanism is proposed: all the nodes including the selfish ...

Fengyun Li; Guiran Chang; Lan Yao; Fuxiang Gao

2012-08-01T23:59:59.000Z

465

Opportunistic routing in multi-hop wireless networks  

E-Print Network (OSTI)

This thesis describes ExOR, an integrated routing and MAC protocol for bulk transfers in multi-hop wireless networks. ExOR exploits the broadcast nature of radios by making forwarding decisions based on which nodes receive ...

Biswas, Sanjit Zubin

2005-01-01T23:59:59.000Z

466

Typhoon: a reliable data dissemination protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers, prompt retransmissions, and frequency diversity to reduce contention ...

Chieh-Jan Mike Liang; R?zvan Mus?loiu-E.; Andreas Terzis

2008-01-01T23:59:59.000Z

467

ESF: an efficient security framework for wireless sensor network  

Science Conference Proceedings (OSTI)

A wireless sensor network WSN consists of a large number of resource constrained sensor nodes, usually deployed in hostile environments, where they face a variety of malicious attacks. To address the security vulnerabilities in WSN, this paper proposes ...

Somanath Tripathy

2013-02-01T23:59:59.000Z

468

Information-theoretic limits of dense underwater networks  

E-Print Network (OSTI)

Information-theoretic throughput scaling laws are analyzed in an underwater acoustic network with n regularly located nodes on a unit square, in which both bandwidth and received signal power can be severely limited. A ...

Shin, Won-Yong

469

Lifetime benefits through load balancing in homogeneous sensor networks  

Science Conference Proceedings (OSTI)

In routing protocols for wireless sensor networks energy efficiency is of paramount importance. Reliability-oriented protocols discard lossy links to avoid the significant energy cost of packet loss. The downside is that nodes with a particularly favorable ...

Daniele Puccinelli; Martin Haenggi

2009-04-01T23:59:59.000Z

470

Wireless sensor networks for structural and environmental monitoring  

Science Conference Proceedings (OSTI)

The article discusses various applications of Wireless Sensor Networks (WNS) in environment and civil engineering constructions monitoring with a particular emphasis on the evaluation of the influence of individual node failures on the operation of the ...

Igor Dunajewski

2008-01-01T23:59:59.000Z

471

ROPE: robust position estimation in wireless sensor networks  

Science Conference Proceedings (OSTI)

We address the problem of secure location determination, known as Secure Localization, and the problem of verifying the location claim of a node, known as Location Verification, in Wireless Sensor Networks (WSN). We propose a robust positioning ...

Loukas Lazos; Radha Poovendran; Srdjan ?apkun

2005-04-01T23:59:59.000Z

472

Optimal Sleep-Wake policies for an energy harvesting sensor node  

E-Print Network (OSTI)

Abstract—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sensor node senses a random field and generates a packet when it is awake. These packets are stored in a queue and transmitted in the wake mode using the energy available in the energy buffer. We obtain energy management policies which minimize a linear combination of the mean queue length and the mean data loss rate. Then, we obtain two easily implementable suboptimal policies and compare their performance to that of the optimal policy. Next, we extend the Throughput Optimal policy developed in our previous work to sensors with two modes. Via this policy, we can increase the throughput and stabilize the data queue by allowing the node to sleep in some slots and to drop some generated packets. This policy requires minimal statistical knowledge of the system. We also modify this policy to decrease the switching costs. Keywords: Energy harvesting sensor nodes, Sleep-Wake Policies, Throughput Optimal Policies.

Vinay Joseph; Vinod Sharma; Utpal Mukherji

2009-01-01T23:59:59.000Z

473

Transmitting and gathering streaming data in wireless multimedia sensor networks within expected network lifetime  

Science Conference Proceedings (OSTI)

Using multimedia sensor nodes in wireless sensor networks (WSNs) can significantly enhance the capability of WSNs for event description. Different kinds of holes can easily appear in WSNs. How to efficiently transmit multi-media streaming data and bypass ... Keywords: cross layer design, geographical multipath routing, wireless multimedia sensor networks

Lei Shu; Yan Zhang; Zhangbing Zhou; Manfred Hauswirth; Zhiwen Yu; Gearoid Hynes

2008-08-01T23:59:59.000Z

474

Intelligent Management of the Power Grid: An Anticipatory, Multi-Agent, High Performance Computing Approach: EPRI/DoD Complex Intera ctive Networks/Systems Initiative: Second Annual Report  

Science Conference Proceedings (OSTI)

This report details the second-year research accomplishments for one of six research consortia established under the Complex Interactive Networks/Systems Initiative. This particular document details an anticipatory, multi-agent, high performance computing approach for intelligent management of the power grid.

2001-06-21T23:59:59.000Z

475

Network support for system initiated checkpoints  

SciTech Connect

A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

Chen, Dong; Heidelberger, Philip

2013-01-29T23:59:59.000Z

476

Author manuscript, published in "ChinaCom2008, Chine (2008)" Energy-Efficient Cooperative Routing in BER Constrained Multihop Networks  

E-Print Network (OSTI)

Abstract — Due to the limited energy supplies of nodes, in many applications like wireless sensor networks energy-efficiency is crucial for extending the lifetime of these networks. We study the routing problem for multihop wireless ad hoc networks based on cooperative transmission. The source node wants to transmit messages to a single destination. Other nodes in the network may operate as relay nodes. In this paper, we propose a cooperative multihop routing for the purpose of power savings, constrained on a required bit error rate (BER) at the destination. We derive analytical results for line network topology. It is shown that energy savings of 100 % are achievable in line networks with a large number of nodes for BER = 10 ?4 constraint at the destination. I.

Behrouz Maham; Mérouane Debbah; Are Hjørungnes

2009-01-01T23:59:59.000Z

477

Social network support for data delivery infrastructures  

E-Print Network (OSTI)

if communication between such nodes represents the common case usage of a given PSN, it is less interesting because nodes which need to communicate often could likely organise their contacts to meet directly. The need for PSN support is greater when the nodes... its effect on the pathway. 1.2.3 Case Studies Chapter 3 and Chapter 4 give a detailed and self-contained account of how social network support can address the problems posed in §1.1. Here we give a brief overview of the two case studies in the light...

Sastry, Nishanth Ramakrishna

2011-10-11T23:59:59.000Z

478

Networks, smart grids: new model for synchronization  

NLE Websites -- All DOE Office Websites (Extended Search)

Stories » Stories » Networks, smart grids: new model for synchronization Networks, smart grids: new model for synchronization Researchers developed a surprisingly simple mathematical model that accurately predicts synchronization as a function of the parameters and the topology of the underlying network. May 21, 2013 High voltage transmission lines carry electrical power. High voltage transmission lines carry electrical power. The researchers envision that their method could be applied to assess synchronization and robustness quickly in electrical grids under volatile operating conditions. Networks of individual oscillating nodes often spontaneously synchronize and begin to oscillate at a coherent frequency. From heart cells to flashing fireflies to electric power grids, coupled oscillator networks are

479

Design and simulation on data-forwarding security in sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are the emerging information technology for monitoring equipment and ambient conditions of production lines in modern factories. A salient feature of wireless sensor networks is that nodes can relay sensing data to a factory ... Keywords: SQF, WSNs, energy consumption, industrial security, modelling, network security, packet delivery latency, reliability, routing, secure quasimultipath forwarding, wireless sensor networks

Men Long; Chwan-Hwa 'John' Wu

2009-10-01T23:59:59.000Z

480

Implementation of end-to-end abstractions in a network service architecture  

Science Conference Proceedings (OSTI)

To support the increasing diversity of systems and protocols in the Internet, modern routers offer a variety of data path processing functions. Such "network services" are easy to implement on a single node, but a network-wide deployment is difficult. ... Keywords: data path service, network architecture, network socket, next-generation internet

Shashank Shanbhag; Tilman Wolf

2008-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

GPSDTN: Predictive Velocity-Enabled Delay-Tolerant Networks for Arctic Research and Sustainability  

Science Conference Proceedings (OSTI)

A Delay-Tolerant Network (DTN) is a necessity for communication nodes that may need to wait for long periods to form networks. The IETF Delay Tolerant Network Research Group is developing protocols to enable such networks for a broad variety of Earth ...

R. Beck; K. Hinkel; W. Eisner; L. Liu; Jacob Norda; Ngoc Hoang; Kevin Fall; Jiang Li; Moses Garuba; Richard Machida; Steve Smith; S. Burleigh; L. Torgerson; A. Hooke; Robert Bulger; Glenn Sheehan; Ben Ellis; Robert Durst; Avri Doria; Maria Uden; James Ferl; D. Pleva; W. Ivancic; P. Paulsen; Ward Bathrick; G. Parr; C. Peoples; B. Scotney; A. Moore; Charles Lambert; Steven Groves; Christopher Small; Lawrence Freudinger; Jason LeBrun; Marc Seibert; Andrew Maffei

2007-07-01T23:59:59.000Z

482

Position-based cluster routing protocol for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Some of the proposed mobile ad hoc network routing algorithms require maintaining a global network state at each node. The global state is always an approximation of the current network state due to the non-negligible delay of propagating local state. ... Keywords: GPS, QoS, mobile ad hoc network, multicasting, position-based routing protocol

Chao-Cheng Shih; Tzay-Farn Shih

2006-07-01T23:59:59.000Z

483

Self modelling knowledge networks  

Science Conference Proceedings (OSTI)

What the scope of knowledge management (KM) is concerned, the focus of attention is shifting towards inter-organisational aspects resulting in new requirements for the KM process. This paper introduces the concept of self modelling knowledge networks ...

Volker Derballa; Antonia Albani

2005-10-01T23:59:59.000Z

484

BER Science Network Requirements  

E-Print Network (OSTI)

ESnet (Networking) Bert de Jong, PNNL (EMSL/HPC) KerstinKleese van Dam, PNNL (Data Management) Miron Livny,ORNL (ARM) Chris Oehmen, PNNL (Bioinformatics/ScalaBLAST)

Dart, Eli

2011-01-01T23:59:59.000Z

485

BES Science Network Requirements  

E-Print Network (OSTI)

September 22 and 23, 2010 ESnet Energy Sciences NetworkMD — September 22 and 23, 2010 ESnet is funded by the USASCR). Vince Dattoria is the ESnet Program Manager. ESnet is

Dart, Eli

2011-01-01T23:59:59.000Z

486

FLOP Counts for Single-Node Tests  

NLE Websites -- All DOE Office Websites (Extended Search)

FLOP Counts for "Small" Single-Node Miniapplication Tests FLOP Counts for "Small" Single-Node Miniapplication Tests FLOP Counts for "Small" Single-Node Miniapplication Tests These data, obtained using the NERSC Hopper system, are provided for reference. Code MPI Tasks Threads Reference TFLOP Count Benchmark Time (seconds) # of iterations miniFE 144 1 5.05435E+12 130.2 (total program time) miniGhost 96 1 6.55500E+12 76.5 AMG 96 1 1.30418E+12 66.95 18 UMT 96 1 1.30211E+13 416.99 49 SNAP 96 1 5.84246E+11 15.37 3059 miniDFT 40 1 2.32379E+13 153.97 GTC 64 1 6.63670E+13 1839.4 MILC 24 1 1.45971E+13 744.3 CORRECTION (02 August 2013): The values given for the reference counts are FLOPs, not TFLOPs. Last edited: 2013-08-02 09:40:18

487

Network Cabling Handbook  

Science Conference Proceedings (OSTI)

From the Publisher:This is a one-stop guide to both copper and fiber network cabling. Contains detailed coverage of monitoring software,connectivity troubleshooting,and management techniques. Master the art of wiring your network Plan,design,and build ...

Chris Clark

2001-11-01T23:59:59.000Z

488

Prefix-based node numbering for temporal XML  

Science Conference Proceedings (OSTI)

Prefix-based numbering (also called Dewey numbering, Dewey level order, or dynamic level numbering) is a popular method for numbering nodes in an XML data model instance. The nodes are numbered so that spatial relationships (e.g., is a node a descendant ... Keywords: Dewey numbering, XML, prefix-based numbering, temporal, versioning

Curtis E. Dyreson; Kalyan G. Mekala

2011-10-01T23:59:59.000Z

489

Improved Connectivity using Hybrid Uni/Omni-Directional Antennas in Sensor Networks  

E-Print Network (OSTI)

Connectivity in sensor networks is an important metric that describes the capability of networks to be able to report sensed information. The ability of member nodes to communicate with each other and collectively report data largely depends on connectivity. Density of node deployment, the transmission radius of the antenna and the communication paradigm employed has a significant effect on connectivity. A network deployment is said to be connected when every node within the network is capable of communicating, either via multi-hops or direct links to every other node in the network. This is a very strict connectivity requirement called 100% connectivity. This work deals with analyzing connectivity in various randomly deployed sensor network deployments and comparing metrics between omni and hybrid uni/omni-directional sensor networks. Specific results will be presented with varying node deployment densities and transmission radii and the levels of connectivity they guarantee. These results have significant impact on secure routing protocol design for wireless sensor networks and planning network deployments. I also present results on k-connectivity, which is a metric that represents network availability, along with the dependence on transmission radii, node densities and uni-directional antenna beam width.

Kwon, Ji Heon

2008-05-27T23:59:59.000Z

490

Interference-Aware Fair Rate Control in Wireless Sensor Networks  

E-Print Network (OSTI)

In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dynamically allocate fair and efficient transmission rates to each node? Our interference-aware fair rate control (IFRC) detects incipient congestion at a node by monitoring the average queue length, communicates congestion state to exactly the set of potential interferers using a novel low-overhead congestion sharing mechanism, and converges to a fair and efficient rate using an AIMD control law. We evaluate IFRC extensively on a 40-node wireless sensor network testbed. IFRC achieves a fair and efficient rate allocation that is within 20- 40% of the optimal fair rate allocation on some network topologies. Its rate adaptation mechanism is highly effective: we did not observe a single instance of queue overflow in our many experiments. Finally, IFRC can be extended easily to support situations where only a subset of the nodes transmit, where the network has multiple base stations, or where nodes are assigned different transmission weights.In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dynamically allocate fair and efficient transmission rates to each node? Our interference-aware fair rate control (IFRC) detects incipient congestion at a node by monitoring the average queue length, communicates congestion state to exactly the set of potential interferers using a novel low-overhead congestion sharing mechanism, and converges to a fair and efficient rate using an AIMD control law. We evaluate IFRC extensively on a 40-node wireless sensor network testbed. IFRC achieves a fair and efficient rate allocation that is within 20- 40% of the optimal fair rate allocation on some network topologies. Its rate adaptation mechanism is highly effective: we did not observe a single instance of queue overflow in our many experiments. Finally, IFRC can be extended easily to support situations where only a subset of the nodes transmit, where the network has multiple base stations, or where nodes are assigned different transmission weights.

Sumit Rangwala; Ramakrishna Gummadi; Ramesh Govindan; Konstantinos Psounis

2006-01-01T23:59:59.000Z

491

Lymph node clearance of plutonium from subcutaneous wounds in beagles  

SciTech Connect

The lymph node clearance of /sup 239/Pu O/sub 2/ administered as insoluble particles from subcutaneous implants was studied in adult beagles to simulate accidental contamination of hand wounds. External scintillation data were collected from the popliteal lymph nodes of each dog after 9.2 to 39.4 mu Ci of plutonium oxide was subcutaneously implanted into the left or right hind paws. The left hind paw was armputated 4 weeks after implantation to prevent continued deposition of plutonium oxide particles in the left popliteal lymph node. Groups of 3 dogs were sacrificed 4, 8, 16, and 32 weeks after plutonium implantation for histopathologic, electron microscopic, and radiochemical analysis of regional lymph nodes. An additional group of dogs received treatment with the chelating agent diethyenetriaminepentaacetic acid (DTPA). Plutonium rapidly accumulated in the popliteal lymph nodes after subcutaneous injection into the hind paw, and 1 to 10% of the implant dose was present in the popliteal lymph nodes at the time of necropsy. Histopathologic changes in the popliteal lymph nodes with plutonium particles were characterized primarily by reticular cell hyperplasia, increased numbers of macrophages, necrosis, and fibroplasia. Eventually, the plutonium particles became sequestered by scar tissue that often replaced the entire architecture of the lymph node. Light microscopic autoradiographs of the popliteal lymph nodes showed a time-related increase in number of alpha tracks per plutonium source. Electron microscopy showed that the plutonium particles were aggregated in phagolysosomes of macrophages. There was slight clearance of plutonium from the popliteal lymph nodes of dogs monitored for 32 weeks. The clearance of plutonium particles from the popliteal lymph nodes was associated with necrosis of macrophages. The external iliac lymph nodes contained fewer plutonium particles than the popliteal lymph nodes and histopathologic changes were less severe. The superficial inguinal lymph nodes of one dog contained appreciable amounts of plutonium. Treatment with diethylenetriaminepentaacetic acid (DTPA) did not have a measurable effect on the clearance of plutonium from the popliteal lymph nodes. (60 references) (auth)

Dagle, G.E.

1973-08-01T23:59:59.000Z

492

Network-Centric Quantum Communications with Application to Critical Infrastructure Protection  

E-Print Network (OSTI)

Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: quantum identification; verifiable quantum secret sharing; multi-party authenticated key establishment, including group keying; and single-fiber quantum-secured communications that can be applied as a security retrofit/upgrade to existing optical fiber installations. A demonstration that NQC meets the challenging simultaneous latency and security requirements of electric grid control communications, which cannot be met without compromises using conventional cryptography, is described.

Richard J. Hughes; Jane E. Nordholt; Kevin P. McCabe; Raymond T. Newell; Charles G. Peterson; Rolando D. Somma

2013-05-01T23:59:59.000Z

493

Distributed services for mobile ad hoc networks  

E-Print Network (OSTI)

A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile ad hoc network is the mobility of the nodes. Because of the mobility, communication links form and disappear as nodes come into and go out of each other's communica- tion range. Mobile ad hoc networks are particularly useful in situations like disaster recovery and search, military operations, etc. Research on mobile ad hoc networks has drawn a huge amount of attention recently. The main challenges for mobile ad hoc networks are the sparse resources and frequent mobility. Most of the research work has been focused on the MAC and routing layer. In this work, we focus on distributed services for mobile ad hoc networks. These services will provide some fundamental functions in developing various applications for mobile ad hoc networks. In particular, we focus on the clock synchronization, connected dominating set, and k-mutual exclusion problems in mobile ad hoc networks.

Cao, Guangtong

2005-08-01T23:59:59.000Z

494

Coherent transport on Apollonian networks and continuous-time quantum walks  

E-Print Network (OSTI)

We study the coherent exciton transport on Apollonian networks generated by simple iterative rules. The coherent exciton dynamics is modeled by continuous-time quantum walks and we calculate the transition probabilities between two nodes of the networks. We find that the transport depends on the initial nodes of the excitation. For networks less than the second generation the coherent transport shows perfect revivals when the initial excitation starts at the central node. For networks of higher generation, the transport only shows partial revivals. Moreover, we find that the excitation is most likely to be found at the initial nodes while the coherent transport to other nodes has a very low probability. In the long time limit, the transition probabilities show characteristic patterns with identical values of limiting probabilities. Finally, the dynamics of quantum transport are compared with the classical transport modeled by continuous-time random walks.

Xinping Xu; Wei Li; Feng Liu

2008-10-06T23:59:59.000Z

495

Power management for heterogeneous clusters: An experimental study  

Science Conference Proceedings (OSTI)

Reducing energy consumption has a significant role in mitigating the total cost of ownership of computing clusters. Building heterogeneous clusters by combining high-end and low-end server nodes (e.g., Xeons and Atoms) is a recent trend towards achieving ... Keywords: Web server cluster, power management, heterogeneous cluster, energy consumption, high-end server nodes, low-end server nodes, Xeons, Atoms, energy-efficient computing, cluster-level power manager, optimal cluster configuration

M. Mustafa Rafique; Nishkam Ravi; Srihari Cadambi; Ali R. Butt; Srimat Chakradhar

2011-07-01T23:59:59.000Z

496

Stochastic hub and spoke networks  

E-Print Network (OSTI)

life to the early Roman water management and road network systems to modern day transportation systems and social networks such as Facebook and Twitter. The topic of this PhD thesis is an in-depth research study on a specific type of network system...

Hult, Edward Eric

2011-10-11T23:59:59.000Z

497

Enabling decentralised management through federation  

Science Conference Proceedings (OSTI)

Cross-domain management is an increasingly important concern in network management and such management capability is a key-enabler of many emerging computing environments. This paper analyses the requirements for management systems that aim to support ... Keywords: Federation, Management, Policy-based management, Semantics, Telecommunications

Kevin Feeney; Rob Brennan; John Keeney; Hendrik Thomas; Dave Lewis; Aidan Boran; Declan O'Sullivan

2010-11-01T23:59:59.000Z

498

Data collection, storage, and retrieval with an underwater sensor network  

E-Print Network (OSTI)

In this paper we present a novel platform for underwater sensor networks to be used for long-term monitoring of coral reefs and fisheries. The sensor network consists of static and mobile underwater sensor nodes. The nodes communicate point-to-point using a novel high-speed optical communication system integrated into the TinyOS stack, and they broadcast using an acoustic protocol integrated in the TinyOS stack. The nodes have a variety of sensing capabilities, including cameras, water temperature, and pressure. The mobile nodes can locate and hover above the static nodes for data muling, and they can perform network maintenance functions such as deployment, relocation, and recovery. In this paper we describe the hardware and software architecture of this underwater sensor network. We then describe the optical and acoustic networking protocols and present experimental networking and data collected in a pool, in rivers, and in the ocean. Finally, we describe our experiments with mobility for data muling in this network.

I. Vasilescu; K. Kotay; D. Rus; M. Dunbabin; P. Corke

2005-01-01T23:59:59.000Z

499

Rapidly Deployable Radio Networks Network Architecture  

E-Print Network (OSTI)

­P LINK & SEND NEWSWITCH PACKET NODES HANDLE REMOTE Figure 14: State Diagram for Master. START PACKET DONE NODES REMOTE HANDLE EDGE NODE ACTIVE Figure 15: State Diagram for EN not serving as Master. Each EDGE NODE ­ REMOTE NODE LINK Figure 17: Flow Diagram for processes during Handle RN State. possible

Kansas, University of

500

WebTrafMon: Web-based Internet/Intranet network traffic monitoring and analysis system  

Science Conference Proceedings (OSTI)

As enterprise computing environments become more network-oriented, the importance of network traffic monitoring and analysis intensifies. Most existing traffic monitoring and analysis tools focus on measuring the traffic loads of individual network segments. ... Keywords: Enterprise network management, Network traffic monitoring and analysis, Traffic management, Traffic type and source analysis, Web-based management

J. W. -K Hong; S.-S Kwon; J.-Y Kim

1999-09-01T23:59:59.000Z