Sample records for network scada communications

  1. Network Traffic Analysis and SCADA Security

    E-Print Network [OSTI]

    Hu, Jiankun

    systems are widely used for monitoring and controlling industrial systems including power plants, water of traffic generated. Finally, network traffic monitoring can be used in security management to identify the vulnerabilities of SCADA systems because this 383 © Springer 2010 , Handbook of Information and Communication

  2. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  3. SCADA

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Historical Powerplant Data The data or SCADA (Supervisory Control and Data Aquisition) information in the links below consists of Elevation, Water Release, Generation and Ramping...

  4. Hallmark Project Commercialization of the Secure SCADA Communications...

    Broader source: Energy.gov (indexed) [DOE]

    and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has come from a trusted source and not been altered in...

  5. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL] [ORNL; Borges, Raymond Charles [ORNL] [ORNL; Buckner, Mark A [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  6. sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu

    E-Print Network [OSTI]

    ) systems. DCS systems typically are used within a single processing or generating plant or over a small. For exam- ple, a utility company may use a DCS to generate power and a SCADA system to distribute it. We, and wastewater industries. While control systems can be vulnerable to a variety of types of cyber attacks

  7. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  8. automotive communication network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 101 SCADA IMPLEMENTATION USING GSM NETWORK FOR COMMUNICATION CiteSeer Summary: Abstract-...

  9. Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network Isolation and System Restoration (FISR) service, delivered by SCADA system are computed, discussed and correlated to quality indicators of power supplied to customers. In delivering FISR service, SCADA system

  10. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which

  11. acquisition scada systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Permission from IEEE must Engineering Websites Summary: of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption Dae-Hyun Choi, Student Member, IEEE acquisition...

  12. Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks

    E-Print Network [OSTI]

    Tronci, Enrico

    for an electrical power distribution grid. The modeling techniques we discuss aim at providing a probabilistic propagation of disturbances and adverse events between Electrical infrastructures and Telco networks. Many demonstrate their applicability by modeling and #12;analyzing an actual SCADA system for an electrical power

  13. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Energy Savers [EERE]

    Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years,...

  14. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01T23:59:59.000Z

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  15. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    ). Keyword: SCADA, PLC, SCADA security, SCADA networks, PLC security, Trusted computing, TCM, TPM, Embedded). Nyckelord:SCADA, PLC, SCADA säkerhet, SCADA-nätverk, PLC säkerhet, pålitlig datoranvändning, TCM, TPM

  16. Routing SCADA data through an enterprise WAN

    SciTech Connect (OSTI)

    Flowers, T.; Houle, B. [Houston Lighting and Power, TX (United States)] [Houston Lighting and Power, TX (United States); Retzer, J.; Ramanathan, R. [National Systems and Research, Camas, WA (United States)] [National Systems and Research, Camas, WA (United States)

    1995-07-01T23:59:59.000Z

    Houston Lighting and Power (HL and P) and many other large utilities have investigated substantial resources in developing integrated enterprise wide area networks (WANs). The WAN provides unprecedented opportunities for integrating information throughout the corporation, resulting in improved efficiency and reduced costs of operation. In contrast, present dedicated point-to-point SCADA data circuits from the energy management system (EMS) to remote terminal units (RTUs) are not currently integrated with the network, nor replicated in any offsite backup system. An integrated approach might integrate communications from selected RTUs over the WAN to a backup system or the EMS. Such an approach would potentially provide improved disaster recovery, more efficient use of communications, reduced maintenance costs, and improved availability of operational data. RTU data, however, is fundamentally different from most other WAN traffic in that it is critical to the moment-to-moment operation of the utility and consists of a large number of messages repeated frequently and continuously. There are valid concerns as to whether the stability, availability, and inherent latency of the WAN would be adequate to support operations of a backup or primary SCADA system. There are also concerns about the adverse effects that SCADA traffic might have on the WAN. These concerns led to the project featured in this article, which tested the operational suitability and effectiveness of routing SCADA data between selected RTUs and a central site on the WAN.

  17. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Attacks Against Water SCADA Systems . . . . . . . . . .2 d (bottom) [simulated results]. . Gignac SCADA supervisoryGignac canal network and SCADA system . . . . . . . . .

  18. Supervisory Control and Data Acquisition (SCADA). January 1975-December 1989 (A Bibliography from the COMPENDEX data base). Report for January 1975-December 1989

    SciTech Connect (OSTI)

    Not Available

    1990-03-01T23:59:59.000Z

    This bibliography contains citations concerning software, hardware, and implementation of Supervisory Control and Data Acquisition (SCADA) Systems. SCADA is applied to the control and monitoring of systems covering large geographical areas, such as electric power distribution, gas pipelines, water supply distribution, and offshore-platform operations. Topics include personnel training, man-machine interfaces, satellite communication links for SCADA, and networking technology. (Contains 137 citations fully indexed and including a title list.)

  19. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA FAQs...

  20. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Documents SCADA...

  1. Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    on SCADA systems was first proposed in [2]. It is assumed an operator has a model of a control system are manipulated. If no such manipulation takes place and the control signal is still anomalous, we can assume Supervisory control and data acquisition (SCADA) systems form a vital part of the critical infrastructure

  2. Towards a Standard for Highly Secure SCADA Systems

    SciTech Connect (OSTI)

    Carlson, R.

    1998-09-25T23:59:59.000Z

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied to automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.

  3. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical

  4. Sandia SCADA Program -- High Surety SCADA LDRD Final Report

    SciTech Connect (OSTI)

    CARLSON, ROLF E.

    2002-04-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteria Protection Profile. This report provides the status of work completed and discusses several challenges ahead.

  5. Networked Loads in the Distribution Grid

    E-Print Network [OSTI]

    Wang, Zhifang; Li, Xiao; Muthukumar, Vishak; Scaglione, Anna; Peisert, Sean; McParland, Chuck

    2012-01-01T23:59:59.000Z

    is structured according to the SCADA model. Although thea prototypical instance of SCADA network in the distributionservers that are part of a SCADA system, which has grown in

  6. alternative cfrp retrofitting: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  7. absolute latency plasma: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  8. avian short latency: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  9. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Testbeds Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  10. JAMMING COMMUNICATION NETWORKS UNDER COMPLETE ...

    E-Print Network [OSTI]

    2007-02-08T23:59:59.000Z

    This paper describes a problem of interdicting/jamming communication networks in un- ... Jamming communication networks is an important problem but has.

  11. apparatus-localized latency determinant: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  12. a-bomb survivors latency: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  13. Social Network and Communications Institutional Change Principle...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Network and Communications Institutional Change Principle Social Network and Communications Institutional Change Principle Federal agencies can use social networks and...

  14. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA Program OverviewTara Camacho-Lopez2015-05-11T18:41:05+00...

  15. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  16. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  17. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  18. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    SciTech Connect (OSTI)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01T23:59:59.000Z

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  19. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    facilities such as water distribution infrastructures, electricity generation plants and oil refineries need industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs industry and government, leading to several efforts to increase secu- rity in these industrial networks

  20. SYNTHESIS LECTURES ON COMMUNICATION NETWORKS

    E-Print Network [OSTI]

    Huang, Jianwei

    Pricing Jean Walrand, Series Editor Jianwei Huang Lin Gao SYNTHESIS LECTURES ON COMMUNICATION NETWORKS CM& Morgan Claypool Publishers& Wireless Network Pricing Jean Walrand, Series Editor Jianwei Huang Lin Gao SYNTHESIS LECTURES ON COMMUNICATION NETWORKS CM& Morgan Claypool Publishers& Wireless Network Pricing Jean

  1. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    use of Supervisory Control and Data Acquisition (SCADA) systems and process control systems became popular in the 1960s as a need arose to more efficiently monitor and control...

  2. Good practice guide on firewall deployment for SCADA and process control networks

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To: CongestionDevelopment of a downholeReactorsgoal andLastNetworks

  3. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National SCADA Testbed Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  4. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  5. Toward Survivable SCADA Jonathan Kirsch

    E-Print Network [OSTI]

    Amir, Yair

    Toward Survivable SCADA Jonathan Kirsch Siemens Technology to Business Center 1995 University the first survivable SCADA system ­ one capable of providing correct behavior with minimal performance degra faced while at- tempting to integrate modern intrusion-tolerant protocols with the SCADA architecture

  6. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01T23:59:59.000Z

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  7. HYBRID MODELING OF COMMUNICATION NETWORKS USING MODELICA

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    HYBRID MODELING OF COMMUNICATION NETWORKS USING MODELICA Daniel F¨arnqvist Katrin Strandemar and simulation of communication networks using the modeling language Modelica are discussed. Congestion control model, that Modelica provides an efficient platform for the analysis of communication networks

  8. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

  9. Communication in automation, including networking and wireless

    E-Print Network [OSTI]

    Antsaklis, Panos

    Communication in automation, including networking and wireless Nicholas Kottenstette and Panos J and networking in automation is given. Digital communication fundamentals are reviewed and networked control are presented. 1 Introduction 1.1 Why communication is necessary in automated systems Automated systems use

  10. Covert Communication Networks

    E-Print Network [OSTI]

    Nix, Timothy Glen

    2013-08-02T23:59:59.000Z

    of participation in the network to both other members of the group and external eavesdroppers, and finally on resilience against disconnection. In this dissertation, we describe the challenges and requirements for such a system. We consider the topologies...

  11. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W. (Idaho Falls, ID)

    2011-12-20T23:59:59.000Z

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The processing circuitry is configured to execute computer programming code. Storage media is coupled to the processing circuitry and includes computer programming code configured to cause the processing circuitry to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  12. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W

    2013-04-23T23:59:59.000Z

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  13. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  14. Social Network and Communications Institutional Change Principle

    Broader source: Energy.gov [DOE]

    Federal agencies can use social networks and communications to spark and reinforce behavior change for meeting sustainability goals. This principle is based on research findings showing that people...

  15. PIPELINES AS COMMUNICATION NETWORK LINKS

    SciTech Connect (OSTI)

    Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

    2005-03-14T23:59:59.000Z

    This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

  16. Hybrid Modeling of Communication Networks Using Modelica

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Hybrid Modeling of Communication Networks Using Modelica Daniel F¨arnqvist, Katrin Strandemar, Karl is to describe initial work on modeling packet-switched communication network us- ing Modelica [1], [8], which that the hybrid model is suitable for Modelica. More- over, we show that the model can then be efficiently simu

  17. Networked UAV Command, Control and Communication

    E-Print Network [OSTI]

    Frew, Eric W.

    climate change.3 Aerial platforms have been demonstrated to be ideal for use in maintaining these mobileNetworked UAV Command, Control and Communication Jack Elston , Eric Frew , Brian Argrow University of Colorado, Boulder, CO, 80309, USA The networked UAV command, control, and communication project

  18. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  19. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  20. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben [Université de Tunis El Manar, Tunisia; Rabai, Latifa Ben Arfa [Université de Tunis, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2014-01-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  1. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Energy Savers [EERE]

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

  2. National SCADA Test Bed - Enhancing control systems security...

    Energy Savers [EERE]

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  3. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01T23:59:59.000Z

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  4. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

    2010-12-16T23:59:59.000Z

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  5. Communication Reliability in Network on Chip Designs

    E-Print Network [OSTI]

    Kumar, Reeshav

    2012-10-19T23:59:59.000Z

    The performance of low latency Network on Chip (NoC) architectures, which incorporate fast bypass paths to reduce communication latency, is limited by crosstalk induced skewing of signal transitions on link wires. As a result of crosstalk...

  6. WIRELESS SENSOR NETWORK BASED CONTROL SYSTEM CONCIDERING COMMUNICATION COST

    E-Print Network [OSTI]

    WIRELESS SENSOR NETWORK BASED CONTROL SYSTEM CONCIDERING COMMUNICATION COST Yutaka Iino* Takeshi for wireless sensor network based control system, minimizing communication energy consumption. Some control, wireless sensor network technology has been developed rapidly, and various applications to control system

  7. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, Dario B. (DeSoto, TX)

    1994-01-01T23:59:59.000Z

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

  8. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, D.B.

    1994-07-19T23:59:59.000Z

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

  9. Cooperative Multihop Communication for Underwater Acoustic Networks

    E-Print Network [OSTI]

    Zhou, Shengli

    Cooperative Multihop Communication for Underwater Acoustic Networks Cecilia Carbonelli and Urbashi propagation 1. INTRODUCTION Underwater sensor networks will find applications in data collection, pollution acoustic (UWA) channels differ from those in other media, such as radio channels, due to the high temporal

  10. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdf Flash2010-60.pdf2 DOE March, 2015 TechnologyFramework for SCADA

  11. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgramSCADA

  12. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution Grid Integration Permalink GalleryNational SCADA Testbed Home

  13. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01T23:59:59.000Z

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  14. Designing Satellite Communication Networks by Zero-One Quadratic Programming

    E-Print Network [OSTI]

    Helme, Marcia P.

    In satellite communications networks, distinctive facilities called homing stations perform special transmission functions. Local demand nodes clustered around each homing station communicate with each other via a local ...

  15. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  16. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01T23:59:59.000Z

    and implementation of smart home energy management systemsStandard Technologies for Smart Home Area Networks EnablingInteroperability framework for smart home systems”, Consumer

  17. On the Characteristics of Spectrum-Agile Communication Networks

    E-Print Network [OSTI]

    Liu, Xin

    , both the Federal Communications Commission (FCC) and the federal government have made important1 On the Characteristics of Spectrum-Agile Communication Networks Xin Liu Wei Wang Department almost all spectrum suitable for wireless communications have been allocated, preliminary studies

  18. Communication via entangled coherent quantum network

    E-Print Network [OSTI]

    A. El Allati; Y. Hassouni; N. Metwally

    2010-11-17T23:59:59.000Z

    A quantum network is constructed via maximum entangled coherent states. The possibility of using this network to achieve communication between multi-participants is investigated. We showed that the probability of teleported unknown state successfully, depends on the size the used network. As the numbers of participants increases, the successful probability does not depend on the intensity of the field. The problem of implementing quantum teleportation protocol via a noise quantum network is discussed. We show one can send information perfectly with small values of the field intensity and larger values of the noise strength. The successful probability of this suggested protocol increases abruptly for larger values of the noise strength and gradually for small values. We show that for small size of the used quantum network, the fidelity of the teleported state decreases smoothly, while it decreases abruptly for larger size of network.

  19. Multimedia Communications over IP Networks 4 -6 September 2000

    E-Print Network [OSTI]

    Abu-Rgheff, Mosa Ali

    Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution of the Internet David@plymouth.ac.uk School of Computing #12;Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution' applying at each level: #12;Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution

  20. Graphene-enabled Wireless Communication Networks

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    Graphene-enabled Wireless Communication Networks at the Nanoscale 1 Ignacio Llatser Nanonetworking;Graphene Honeycomb lattice of carbon atoms 2-dimensional material Discovered by A. K. Geim and K. S. Novoselov 9 Graphene G. Liu, W. Stillman, S. Rumyantsev, Q. Shao, M. Shur, A. A. Balandin, "Low

  1. Energy Harvesting Communication Networks: Optimization and Demonstration

    E-Print Network [OSTI]

    Gesbert, David

    ) and the UK (Imperial College London). Index Terms--energy harvesting; energy packet net- works; Markov models harvesting devices. EH capability can scavenge ambient energy, such as vibrations, thermal gradients or solar1 Energy Harvesting Communication Networks: Optimization and Demonstration (The E-CROPS Project

  2. Agent Interaction and State Determination in SCADA Systems

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Agent Interaction and State Determination in SCADA Systems Thomas Richard McEvoy2 and Stephen D to continue to operate in a compromised state. Finally, the scale and complex- ity of SCADA systems makes

  3. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber...

  4. Risk Modelling the Transition of SCADA System to IPv6

    E-Print Network [OSTI]

    Boyer, Edmond

    Risk Modelling the Transition of SCADA System to IPv6 Suriadi Suriadi, Alan Tickle, Ejaz Ahmed.morarji@qut.edu.au Abstract. SCADA is one of a set of manufacturing-and-control systems that are used to monitor and control6 protocol and inevitably this change will affect SCADA systems. However IPv6 introduces its own set

  5. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  6. Position estimation of transceivers in communication networks

    DOE Patents [OSTI]

    Kent, Claudia A. (Pleasanton, CA); Dowla, Farid (Castro Valley, CA)

    2008-06-03T23:59:59.000Z

    This invention provides a system and method using wireless communication interfaces coupled with statistical processing of time-of-flight data to locate by position estimation unknown wireless receivers. Such an invention can be applied in sensor network applications, such as environmental monitoring of water in the soil or chemicals in the air where the position of the network nodes is deemed critical. Moreover, the present invention can be arranged to operate in areas where a Global Positioning System (GPS) is not available, such as inside buildings, caves, and tunnels.

  7. Communication synthesis for on chip networks

    E-Print Network [OSTI]

    Swaminathan, Narayanan

    2002-01-01T23:59:59.000Z

    to Corlesign Environment C. Synthesize&l Communication Architecl, urc VI COXCLUSIO&U REFFREUCES . VITA LIST OF TABLES TABLE Page III ITRANS 2001 Roadmap . Effect of Virtual Channels and Bulfers in Area of Network Area Cost Comparison of 128 and 256... Roadmap for Semiconductors (ITRS) identifies design productivity, power management, multi-core organization, I/O bandwidth, and circuit and process tech- nologies as key contexts for future evolution of microprocessing units [I]. Commu- nication...

  8. JSAC SPECIAL ISSUE ON NETWORK SUPPORT FOR GROUP COMMUNICATION 1 Scalable Secure Group Communication over IP

    E-Print Network [OSTI]

    Banerjee, Suman

    JSAC SPECIAL ISSUE ON NETWORK SUPPORT FOR GROUP COMMUNICATION 1 Scalable Secure Group Communication our scheme is completely end­host based, it can be used to implement group security over IP multicast­enabled untrusted, insecure networks. A. Group Keys and Re­keying Groups Many secure group communication systems [12

  9. COMMUNICATION NETWORKS AND THE RISE OF AN INFORMATION ELITE

    E-Print Network [OSTI]

    COMMUNICATION NETWORKS AND THE RISE OF AN INFORMATION ELITE CAN COMMUNICATION HELP THE INFORMATION shared. Thus universal access policies that provide only communication channels but do not also establish of communication channels and the levels of learning and sharing that take place, the model rigorously explains how

  10. Challenges for Efficient Communication in Underwater Acoustic Sensor Networks

    E-Print Network [OSTI]

    Pompili, Dario

    Challenges for Efficient Communication in Underwater Acoustic Sensor Networks Ian F. Akyildiz for oceano- graphic data collection, pollution monitoring, offshore explo- ration and tactical surveillance in collaborative monitoring missions. Underwater acoustic network- ing is the enabling technology

  11. On traffic analysis in anonymous communication networks

    E-Print Network [OSTI]

    Zhu, Ye

    2009-06-02T23:59:59.000Z

    OF PHILOSOPHY Approved by: Co-Chairs of Committee, Riccardo Bettati A. L. Narasimha Reddy Committee Members, Wei Zhao Michael Longnecker Head of Department, Costas N. Georghiades August 2006 Major Subject: Computer Engineering iii ABSTRACT On Tra?c Analysis... in Anonymous Communication Networks. (August 2006) Ye Zhu, B.S., Shanghai Jiao Tong University; M.S., Texas A&M University Co?Chairs of Advisory Committee: Dr. Riccardo Bettati Dr. A. L. Narasimha Reddy In this dissertation, we address issues related to tra...

  12. LOCOMOTION (TERRESTRIAL AND AERIAL) AND COMMUNICATION OF AUTONOMOUS ROBOT NETWORKS

    E-Print Network [OSTI]

    Kansas, University of

    , flying robots, micro-air vehicles, robot communication, autonomous robot networks. #12;2 1. TERRESTRIAL1 LOCOMOTION (TERRESTRIAL AND AERIAL) AND COMMUNICATION OF AUTONOMOUS ROBOT NETWORKS Arvin Agah vehicles, next generation robotic platforms, platform mechanics and materials, winterization of robotic

  13. Remote Stabilization via Communication Networks with a Distributed Control Law

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Remote Stabilization via Communication Networks with a Distributed Control Law Emmanuel Witrant the problem of remote stabilization via communication networks involving some time- varying delays of known average dynamics. This problem arises when the control law is remotely implemented and leads

  14. The Geospatial Characteristics of a Social Movement Communication Network

    E-Print Network [OSTI]

    Conover, Michael D; Ferrara, Emilio; McKelvey, Karissa; Menczer, Filippo; Flammini, Alessandro

    2013-01-01T23:59:59.000Z

    Social movements rely in large measure on networked communication technologies to organize and disseminate information relating to the movements' objectives. In this work we seek to understand how the goals and needs of a protest movement are reflected in the geographic patterns of its communication network, and how these patterns differ from those of stable political communication. To this end, we examine an online communication network reconstructed from over 600,000 tweets from a thirty-six week period covering the birth and maturation of the American anticapitalist movement, Occupy Wall Street. We find that, compared to a network of stable domestic political communication, the Occupy Wall Street network exhibits higher levels of locality and a hub and spoke structure, in which the majority of non-local attention is allocated to high-profile locations such as New York, California, and Washington D.C. Moreover, we observe that information flows across state boundaries are more likely to contain framing lang...

  15. Gas Main Sensor and Communications Network System

    SciTech Connect (OSTI)

    Hagen Schempf

    2006-05-31T23:59:59.000Z

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  16. Defenses against Covert-Communications in Multimedia and Sensor Networks

    E-Print Network [OSTI]

    Jainsky, Julien Sebastien 1981-

    2012-11-29T23:59:59.000Z

    subversive communications to a much greater extent. 3 Furthermore, the acquisition of highly correlated multimedia provides fertile ground for advanced steganographic approaches. Covert communications in multimedia networks is of special concern...DEFENSES AGAINST COVERT-COMMUNICATIONS IN MULTIMEDIA AND SENSOR NETWORKS A Dissertation by JULIEN SEBASTIEN JAINSKY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements...

  17. Abstract--By penetrating the SCADA system, an intruder may remotely operate a power system using supervisory control

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1 Abstract-- By penetrating the SCADA system, an intruder may remotely operate a power system using vulnerability using attack trees. The attack tree formulation based on power system control networks is used to evaluate the system, scenario, and leaf vulnerabilities. The measure of vulnerabilities in the power system

  18. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  19. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research and Development of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for...

  20. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

  1. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01T23:59:59.000Z

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  2. Simulating Challenges to Communication Networks for Evaluation of Resilience

    E-Print Network [OSTI]

    Mahmood, Rabat Anam

    2009-07-31T23:59:59.000Z

    Simulating Challenges to Communication Networks for Evaluation of Resilience ? 2009 Rabat Anam Mahmood Submitted to the Graduate Degree Program in Electrical Engineering & Computer Science... of various faults and challenges to normal operation" [8]. A resilient network detects, remediates, and recovers from outages and periods of degraded performance within as little time as possible. This so happens that each node in the network continuously...

  3. Social Networks in Health Care: Communication, collaboration and insights

    E-Print Network [OSTI]

    Klein, Ophir

    Social Networks in Health Care: Communication, collaboration and insights Foreword At Chirp, Facebook boasts 400 million users and has created its own unique cyber culture. Social networking is accessed and shared. In this issue brief, we provide a snapshot of social networking's evolution

  4. SCADA System Security ECE 478 Network Security

    E-Print Network [OSTI]

    water treatment systems; electric power transmission, distribution, and generation; petroleum storage variety of industries including Electric power generation, transmission, and distribution, Environmental. A Human-machine interface allows the operator to view the state of the plant equipment. Dumb terminals

  5. SCADA system aids BGE`s Notch Cliff propane-air facility

    SciTech Connect (OSTI)

    Miller, B.A. [Baltimore Gas and Electric Co., MD (United States)

    1997-02-01T23:59:59.000Z

    SCADA systems in the natural gas industry are commonly associated with distribution networks and transmission pipelines. There is however, another application for SCADA technology that is increasingly being utilized in the industry. By implementing automation technology and process control concepts more typically associated with industrial and petrochemical process facilities, Baltimore Gas and Electric Co. (BGE) has significantly improved the efficiency, performance, and safety at its Notch Cliff Propane-Air peak shaving facility. These results have contributed to BGE`s ongoing efforts to effectively operate in the competitive energy marketplace. When the Notch Cliff plant was built in the early 1960s, it was a state-of-the-art facility. The plant blends propane vapor and compressed air to create a supplement to the natural gas supply during peak demand periods.

  6. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Chou, Pai H.

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2, and to validate its effectiveness with long-term field deployment results. Keywords: structural health monitoring, SCADA system, remote monitoring system 1. INTRODUCTION Structural health monitoring (SHM) is the use

  7. Flatness-based control of an irrigation canal using SCADA

    E-Print Network [OSTI]

    -time irrigation operations using a supervision, control, and data acquisition (SCADA) system with automatic centralized controller. Irrigation canals can be viewed and modeled as delay systems since it takes timeFlatness-based control of an irrigation canal using SCADA Tarek Rabbani, Simon Munier, David

  8. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    day irrigation canal systems. This type of monitoring and control infrastructure is also commonStealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern

  9. Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks

    E-Print Network [OSTI]

    Lo Cigno, Renato Antonio

    Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks 90% of this material is reproduced brakes before a collision Some 40% more do not brake effectively Road Accidents 41.600 fatalities 1

  10. Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks

    E-Print Network [OSTI]

    Lo Cigno, Renato Antonio

    Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks 90% of this material is reproduced brakes before a collision Some 40% more do not brake effectively Road Accidents 41.600 fatalities 1

  11. Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks

    E-Print Network [OSTI]

    Lo Cigno, Renato Antonio

    Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks 90% of this material is reproduced% of passengers vehicles and 26% of trucks do not activate brakes before a collision Some 40% more do not brake

  12. Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks

    E-Print Network [OSTI]

    Lo Cigno, Renato Antonio

    Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks 90% of this material is reproduced% of passengers vehicles and 26% of trucks do not activate brakes before a collision Some 40% more do not brake

  13. Analysis of informal communication networks - a case study

    E-Print Network [OSTI]

    Schoder, Detlef

    The structure and dynamics of informal communication networks are of central importance for the functionality of enterprise workflows and for performance and innovation of knowledge-centric organizations. While most ...

  14. Predictive Compensation for Communication Outages in Networked Control Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Predictive Compensation for Communication Outages in Networked Control Systems Erik Henriksson Henrik Sandberg Karl Henrik Johansson Abstract-- A predictive outage compensator co time instance, the predictive outage compensator suggests a replacement command based on the history

  15. Demonstration of SCADA system to Manage Oilfield Pump Off Controllers

    SciTech Connect (OSTI)

    Newquist, Dan

    2000-09-11T23:59:59.000Z

    PC-based SCADA systems are today widely accepted by the oil and gas industry, thanks to the increased power and capabilities of PCs, their reduced costs, and the wider use of PCs by energy companies in office and field operations. More and more field operators are using laptops in their daily work duties. This has made the PC the choice for field SCADA systems, and for making SCADA data available throughout company operations. As PCs have become more powerful, it has allowed SCADA software developers to add more capabilities to their systems. SCADA systems have become tools that now help field operators perform their jobs more efficiently, facilitate in optimizing producing wells, provide an active interface for monitoring and controlling plants and compressors, and provide real-time and historical well data to engineers to help them develop strategies for optimizing field operations.

  16. Control and Operation of the LHCb Readout Boards using Embedded Microcontrollers and the PVSSII SCADA System

    E-Print Network [OSTI]

    Koestner, Stefan

    2006-01-01T23:59:59.000Z

    Control and Operation of the LHCb Readout Boards using Embedded Microcontrollers and the PVSSII SCADA System

  17. avionics system architecture: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CERN Preprints Summary: The ALICE Detector Control System (DCS) is based on a commercial SCADA product, running on a large Windows computer cluster. It communicates with about...

  18. Providing ordered message delivery in communication network systems

    E-Print Network [OSTI]

    Rivera-Hernandez, Julio A

    1995-01-01T23:59:59.000Z

    PROVIDING ORDERED MESSAGE DELIVERY IN COMMUNICATION NETWORK SYSTEMS A Thesis by JULI0 A. RIVERA-HERNANDEZ Submitted to the Oflice of Graduate Studies of Texas AkM University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1995 Major Subject: Computer Science PROVIDING ORDERED MESSAGE DELIVERY IN COMMUNICATION NETWORK SYSTEMS A Thesis by JULIO A. RIVERA-HERNANDEZ Submitted to Texas ARM University in partial fulfillment of the requirements for the degree...

  19. POWER CONTROL IN WIRELESS COMMUNICATIONS NETWORKS -FROM A

    E-Print Network [OSTI]

    Gustafsson, Fredrik

    POWER CONTROL IN WIRELESS COMMUNICATIONS NETWORKS - FROM A CONTROL THEORY PERSPECTIVE Fredrik of wireless cellular communications systems will be in focus and methods for transmitter power control. Relevant aspects of power control are discussed with emphasis on practical issues, using an automatic

  20. A Power Line Communication Network Infrastructure for The Smart Home

    E-Print Network [OSTI]

    Latchman, Haniph A.

    A Power Line Communication Network Infrastructure for The Smart Home Yu-Ju Lin, Haniph A. Latchman's as a basic infrastructure for building integrated "smart homes," wherein infor- mation appliances (IA guarantee QoS for real-time communications, supporting delay sensitive data streams for "Smart Home

  1. Quantum Communication Network Utilizing Quadripartite Entangled States of Optical Field

    E-Print Network [OSTI]

    Heng Shen; Xiaolong Su; Xiaojun Jia; Changde Xie

    2009-09-16T23:59:59.000Z

    We propose two types of quantum dense coding communication networks with optical continuous variables, in which a quadripartite entangled state of the optical field with totally three-party correlations of quadrature amplitudes is utilized. In the networks, the exchange of information between any two participants can be manipulated by one or two of the remaining participants. The channel capacities for a variety of communication protocols are numerically calculated. Due to the fact that the quadripartite entangled states applied in the communication systems have been successfully prepared already in the laboratory, the proposed schemes are experimentally accessible at present.

  2. Quantum communication network utilizing quadripartite entangled states of optical field

    SciTech Connect (OSTI)

    Shen Heng; Su Xiaolong; Jia Xiaojun; Xie Changde [State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006 (China)

    2009-10-15T23:59:59.000Z

    We propose two types of quantum dense coding communication networks with optical continuous variables, in which a quadripartite entangled state of the optical field with totally three-party correlations of quadrature amplitudes is utilized. In the networks, the exchange of information between any two participants can be manipulated by one or two of the remaining participants. The channel capacities for a variety of communication protocols are numerically calculated. Due to the fact that the quadripartite entangled states applied in the communication systems have been successfully prepared already in the laboratory, the proposed schemes are experimentally accessible at present.

  3. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01T23:59:59.000Z

    systems for unattended ground sensor networks. In Proc.link for unattended ground sensors. In Proc. SPIE, volumeenvironment sensing, unattended ground sensor networks, and

  4. Communication Load Reduction for Neural Network Implementations

    E-Print Network [OSTI]

    Behnke, Sven

    the total amount of communication load, followed by a placement of partitions onto proces- sors 3]. We

  5. ESC: Energy Synchronized Communication in Sustainable Sensor Networks

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    ESC: Energy Synchronized Communication in Sustainable Sensor Networks Yu Gu, Ting Zhu and Tian He Abstract--With advances in energy harvesting techniques, it is now feasible to build sustainable sensor of sustainable sensor networks is to effectively utilize a continuous stream of ambient energy. Instead

  6. Routing protocol for anycast communications in a wireless sensor network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Routing protocol for anycast communications in a wireless sensor network Nancy El Rachkidy. 1 Introduction In the past few years, wireless sensor networks have been used in several moni University Complexe scientifique des C´ezeaux, 63177 Aubi`ere cedex, France Abstract. In wireless sensor

  7. Fair Energy-Efficient Network Design for Multihop Communications

    E-Print Network [OSTI]

    Wang, Xin

    Fair Energy-Efficient Network Design for Multihop Communications Xin Wang Department of Computer--We consider the energy-efficient network resource allocation that minimizes a cost function of average user between efficiency and fairness in energy-efficient designs. Based on such cost functions, optimal routing

  8. Autonomous Data Collection from Underwater Sensor Networks using Acoustic Communication

    E-Print Network [OSTI]

    Sukhatme, Gaurav S.

    for an autonomous underwater vehicle (AUV) to collect data from an underwater sensor network. The sensors. A potential solution is the use of a mobile autonomous under- water vehicle (AUV) equipped with an acousticAutonomous Data Collection from Underwater Sensor Networks using Acoustic Communication Geoffrey A

  9. Communication synthesis of networks-on-chip (noc)

    E-Print Network [OSTI]

    Bhojwani, Praveen Sunder

    2009-05-15T23:59:59.000Z

    considered by most NoC researchers. This architecture consists of a regular layout of network tiles. These tiles consist of IP cores interfaced with NoCs via core-network interfaces (CNI). On-chip routers route communication between the source and destination... network tiles, over links between them. A pro- The journal model is IEEE Transactions on Automatic Control. 2 tocol stack similar to the one used in wide-area networks has also been proposed for the on-chip network environment [5]. Fig. 1. NoC architecture...

  10. Communication synthesis of networks-on-chip (NoC)

    E-Print Network [OSTI]

    Bhojwani, Praveen Sunder

    2008-10-10T23:59:59.000Z

    considered by most NoC researchers. This architecture consists of a regular layout of network tiles. These tiles consist of IP cores interfaced with NoCs via core-network interfaces (CNI). On-chip routers route communication between the source and destination... network tiles, over links between them. A pro- The journal model is IEEE Transactions on Automatic Control. 2 tocol stack similar to the one used in wide-area networks has also been proposed for the on-chip network environment [5]. Fig. 1. NoC architecture...

  11. Multimedia Communications over IP Networks 4-6 September 2000, University of Plymouth

    E-Print Network [OSTI]

    Abu-Rgheff, Mosa Ali

    Multimedia Communications over IP Networks 4-6 September 2000, University of Plymouth (QGWR(QG 4HWZRUN1HWZRUN Mike Buckley Lucent Technologies Multimedia Communications over IP Networks #12;Multimedia Communications over IP Networks 4-6 September 2000, University of Plymouth #12;Multimedia Communications over IP

  12. SCADA computer sytem controls major Saudi Aramco crude oil pipeline

    SciTech Connect (OSTI)

    Dempsey, J.; Al-Habib, R. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-12-31T23:59:59.000Z

    A replacement Supervisory Control and Data Acquisition (SCADA) computer system which monitors and controls two 1,100 kilometer pipelines and eleven associated pump stations is described. The SCADA system was designed to meet two objectives: (1) decentralize the overall control system and provide a distributed control system capable of regulatory control at each pump and pressure reducing station, and (2) provide system wide monitoring and supervisory control function during normal operations at the crude oil terminal. The SCADA computer system hardware (host computers and consoles), software modules, and applications are overviewed. A data flow diagram and a hardware configuration diagram are provided. 3 figs.

  13. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01T23:59:59.000Z

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  14. Complex Dynamics of Autonomous Communication Networks and the Intelligent Communication Paradigm

    E-Print Network [OSTI]

    Andrei P. Kirilyuk

    2006-03-16T23:59:59.000Z

    Dynamics of arbitrary communication system is analysed as unreduced interaction process. The applied generalised, universally nonperturbative method of effective potential reveals the phenomenon of dynamic multivaluedness of competing system configurations forced to permanently replace each other in a causally random order, which leads to universally defined dynamical chaos, complexity, fractality, self-organisation, and adaptability (physics/9806002, physics/0211071, physics/0405063). We demonstrate the origin of huge, exponentially high efficiency of the unreduced, complex network dynamics and specify the universal symmetry of complexity (physics/0404006) as the fundamental guiding principle for creation and control of such qualitatively new kind of networks and devices. The emerging intelligent communication paradigm and its practical realisation in the form of knowledge-based networks involve the features of true, unreduced intelligence and consciousness (physics/0409140) appearing in complex (multivalued) network dynamics and results.

  15. Communications and Networking for Smart Grid: Technology and Practice , HossamS. Hassanein2

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    Editorial Communications and Networking for Smart Grid: Technology and Practice Chi Zhou1 , Hossam for Smart Grid research and development, so the communications networks in Smart Grid must facilitate communications protocols, and provide secure and reliable communications for the smart grid. Many open issues

  16. A new communication paradigm for mobile TV over cellular network Dr. Hongxiang Li

    E-Print Network [OSTI]

    A new communication paradigm for mobile TV over cellular network Dr. Hongxiang Li Electrical terrestrial TV network and propose a new mobile TV communication paradigm that is radically different from and communication theory (i.e., Network Coding and Dirty Paper Coding) in the new mobile TV system design. Despite

  17. Signaling communication events in a computer network

    DOE Patents [OSTI]

    Bender, Carl A. (Highland, NY); DiNicola, Paul D. (Hurley, NY); Gildea, Kevin J. (Bloomington, NY); Govindaraju, Rama K. (Poughkeepsie, NY); Kim, Chulho (Poughkeepsie, NY); Mirza, Jamshed H. (Woodstock, NY); Shah, Gautam H. (Wappingers Falls, NY); Nieplocha, Jaroslaw (Richland, WA)

    2000-01-01T23:59:59.000Z

    A method, apparatus and program product for detecting a communication event in a distributed parallel data processing system in which a message is sent from an origin to a target. A low-level application programming interface (LAPI) is provided which has an operation for associating a counter with a communication event to be detected. The LAPI increments the counter upon the occurrence of the communication event. The number in the counter is monitored, and when the number increases, the event is detected. A completion counter in the origin is associated with the completion of a message being sent from the origin to the target. When the message is completed, LAPI increments the completion counter such that monitoring the completion counter detects the completion of the message. The completion counter may be used to insure that a first message has been sent from the origin to the target and completed before a second message is sent.

  18. A New Compact Multichannel Receiver for Underwater Wireless Communication Networks

    E-Print Network [OSTI]

    Abdi, Ali

    size of the proposed receiver makes it particularly useful for small unmanned underwater vehicles1 A New Compact Multichannel Receiver for Underwater Wireless Communication Networks Ali Abdi of the particle velocity, in addition to the pressure, multichannel reception can be accomplished in underwater

  19. Networking Challenges and Principles in Diffusion-based Molecular Communication

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    monitoring systems. How nanomachines will communicate is still an important challenge for the networking of nanotechnology in the biomedical, environmental and industrial fields. One of the most promising paradigms. In this work, the key differences of the physical channel of DMC with respect to the wireless electromagnetic

  20. Optimizing Communication Energy Consumption in Perpetual Wireless Nanosensor Networks

    E-Print Network [OSTI]

    Weigle, Michele

    Optimizing Communication Energy Consumption in Perpetual Wireless Nanosensor Networks Shahram}@cs.odu.edu Abstract--This paper investigates the effect of various param- eters of energy consumption. Finding the optimum combination of parameters to minimize energy consumption while satisfying the Qo

  1. Energy-Aware Multiband Communications in Heterogeneous Networks

    E-Print Network [OSTI]

    Gesbert, David

    Engineering, University of Novi Sad, Serbia Abstract--This paper investigates the energy-efficiency of wellEnergy-Aware Multiband Communications in Heterogeneous Networks Wael Guib`ene, Chadi Khirallah- known spectrum sensing algorithms that exploit the sensed signal's energy, autocorrelation

  2. Flatness-Based Control of Open-Channel Flow in an Irrigation Canal Using SCADA

    E-Print Network [OSTI]

    Boyer, Edmond

    Flatness-Based Control of Open-Channel Flow in an Irrigation Canal Using SCADA Tarek Rabbani, Simon of an algorithm for real-time irrigation operations using a supervision, control, and data acquisition (SCADA

  3. area network system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the experiment. The network management system is implemented based on a commercial SCADA system (PVSS II). We show here how a large scale network can be monitored and...

  4. Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications

    E-Print Network [OSTI]

    semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications

  5. Optimal Integrated Control and Scheduling of Networked Control Systems with Communication

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Optimal Integrated Control and Scheduling of Networked Control Systems with Communication Abstract-- This paper addresses the problem of the optimal control and scheduling of Networked Control Systems over limited bandwidth deterministic networks. Multivariable linear systems subject

  6. Network and Index Coding with Application to Robust and Secure Communications

    E-Print Network [OSTI]

    El Rouayheb, Salim Y.

    2011-02-22T23:59:59.000Z

    Since its introduction in the year 2000 by Ahlswede et al., the network coding paradigm has revolutionized the way we understand information flows in networks. Traditionally, information transmitted in a communication network was treated as a...

  7. An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions

    E-Print Network [OSTI]

    Liu, Weiru

    An Architecture of a Multi-Agent System for SCADA - dealing with uncertainty, plans and actions.loughlin@ecit.qub.ac.uk Keywords: Autonomous Agents, Multi-agent Systems, Sensors, SCADA, Uncertainty, Plans, Actions, Fusion in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission

  8. 60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via

    E-Print Network [OSTI]

    Amir, Yair

    60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via Intrusion availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system--one that is able to ensure cor- rect behavior with minimal

  9. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  10. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  11. Supporting fault-tolerant communication in networks

    E-Print Network [OSTI]

    Kanjani, Khushboo

    2009-05-15T23:59:59.000Z

    . The capacity reservation problem can be formulated as the following integer problem : Min (Total Cost = summationdisplay ei?E ciri) (3.1) subject to: ri ? ?i (3.2) ri ? Zi (3.3) where Zi is the set of integers and for every cut C in the network...

  12. Nano Communication Networks Update | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxide CaptureSee theOilNREL inNano Communication

  13. Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges

    E-Print Network [OSTI]

    Fang, Xi; Xue, Guoliang

    2011-01-01T23:59:59.000Z

    Smart grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this work we present our vision on smart grid from the perspective of wireless communications and networking technologies. We present wireless communication and networking paradigms for four typical scenarios in the future smart grid and also point out the research challenges of the wireless communication and networking technologies used in smart grid

  14. Multiply-agile encryption in high speed communication networks

    SciTech Connect (OSTI)

    Pierson, L.G. [Sandia National Labs., Albuquerque, NM (United States); Witzke, E.L. [RE/SPEC Inc., Albuquerque, NM (United States)

    1997-05-01T23:59:59.000Z

    Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networks, can satisfy a wide variety of security requirements if that hardware is key-agile, robustness-agile and algorithm-agile. Hence, multiply-agile encryption provides enhanced solutions to the secrecy, interoperability and quality of service issues in high-speed networks. This paper defines these three types of agile encryption. Next, implementation issues are discussed. While single-algorithm, key-agile encryptors exist, robustness-agile and algorithm-agile encryptors are still research topics.

  15. 1 Edgar Nett Mobile Computer Communication SS'10 Problems compared to fixed networks

    E-Print Network [OSTI]

    1 Edgar Nett Mobile Computer Communication SS'10 Problems compared to fixed networks Higher loss-Hoc-Networks routing, service localization, reachability #12;2 Edgar Nett Mobile Computer Communication SS'10 Layering: The philosopher-translator-secretary architecture #12;3 Edgar Nett Mobile Computer Communication SS'10 source

  16. Organizational structure and communication networks in a university environment

    E-Print Network [OSTI]

    Mathiesen, Joachim; Sneppen, Kim

    2010-01-01T23:59:59.000Z

    The ``six degrees of separation" between any two individuals on Earth has become emblematic of the 'small world' theme, even though the information conveyed via a chain of human encounters decays very rapidly with increasing chain length, and diffusion of information via this process may be very inefficient in large human organizations. The information flow on a communication network in a large organization, the University of Oslo, has been studied by analyzing e-mail records. The records allow for quantification of communication intensity across organizational levels and between organizational units (referred to as ``modules"). We find that the number of e-mails messages within modules scales with module size to the power of $1.29\\pm .06$, and the frequency of communication between individuals decays exponentially with the number of links required upwards in the organizational hierarchy before they are connected. Our data also indicates that the number of messages sent by administrative units is proportional...

  17. Underwater Sensor Networking: Research Challenges and Potential Applications

    E-Print Network [OSTI]

    Heidemann, John

    synchronization, and localization protocols for high- latency acoustic networks, long-duration network sleeping SCADA systems, but in- creasingly with more rapidly deployed sensor networks [39]. Advances in reducing

  18. Storage Area Network Optimization A cooperation of Ancor Communications, Minneapolis, USA

    E-Print Network [OSTI]

    Felsner, Stefan

    Storage Area Network Optimization A cooperation of Ancor Communications, Minneapolis, USA and Freie The Storage Area Network Optimization Project (SANO) is a cooperation of Ancor Communications (now QLogic for server-to-storage and server-to-server networking have been the focus of much attention during the 90s

  19. Butterfly and Benes-Based on-Chip Communication Networks for Multiprocessor Turbo Decoding

    E-Print Network [OSTI]

    Muller, Olivier

    Butterfly and Benes-Based on-Chip Communication Networks for Multiprocessor Turbo Decoding Hazem interconnection networks as on-chip communication networks for parallel turbo decoding. Adapted Benes for all turbo code standards and constitutes a promising feature for their reuse for any similar

  20. Apparatus and method for data communication in an energy distribution network

    DOE Patents [OSTI]

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08T23:59:59.000Z

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  1. Developments on the SCADA of CERN Accelerators Vacuum

    E-Print Network [OSTI]

    Antoniotti, F; Boccioli, M; Gomes, P; Pereira, H F; Kopylov, L; Merker, S; Mikheev, M S

    2014-01-01T23:59:59.000Z

    During the first 3 years of LHC operation, the priority for the SCADA of vacuum controls was to attend to user requests, and to improve its ergonomics and efficiency: access & presentation of information simplified and normalized; coherent functionalities & menus across all accelerators; automatic

  2. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    power generation plants and oil refineries often involve components that are geographically distributed. To continuously monitor and control the different sections of the plant in order to ensure its appropriate the concepts of SCADA systems, analyze the threats and vulnerabilities of these systems, and illustrate

  3. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA

    E-Print Network [OSTI]

    PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA A Thesis Submitted Technical Report TR2010-665 #12;Abstract Message authentication with low latency is necessary to ensure- tication solutions by our lab and others looked at single messages and incurred no- ticeable latency

  4. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle| DepartmentAchievementEnergy ICCPSecure

  5. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneralGuiding Documents and Linksl W SHVDCProtocol, a

  6. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection

  7. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet), GeothermalGridHYDROGEN TO THE HIGHWAYSProject Commercialization

  8. Multi-photon quantum communication in quantum networks

    E-Print Network [OSTI]

    Wei Qin; Chuan Wang; Ye Cao; Gui Lu Long

    2015-03-17T23:59:59.000Z

    We propose and analyze a multiphoton-state coherent transport protocol in a coupled-resonator quantum network. A multiphoton swap gate between two antipodes can be achieved with neither external modulation nor coupling strength engineering. Moreover, we extend this result to a coupled-resonator chain of arbitrary length with different coupling strengths. Effects of decoherence via quantum nondemolition interaction are studied with sources including vacuum quantum fluctuation and bath thermal excitations when the bath is in the thermal equilibrium state. These observations are helpful to understand the decoherence effects on quantum communication in quantum coupled-resonator systems.

  9. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Energy Savers [EERE]

    Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security...

  10. Developments on the SCADA of CERN Accelerators Vacuum

    E-Print Network [OSTI]

    Antoniotti, F; Boccioli, M; Gomes, P; Pereira, H; Kopylov, L; Mikheev, M; Merker, S

    2014-01-01T23:59:59.000Z

    During the first 3 years of LHC operation, the priority for the SCADA (Supervisory Control And Data Acquisition) of vacuum controls was to attend to user requests, and to improve its ergonomics and efficiency: access & presentation of information simplified and normalized; coherent functionalities & menus across all accelerators; automatic scripts instead of fastidious manual actions; enhanced tools for data analysis and for maintenance interventions. Several decades of cumulative developments, based on heterogeneous technologies and architectures, have been asking for a homogenization effort. The first LHC Long Shutdown (LS1) provides the opportunity to further standardize the vacuum controls systems [1], around Siemens-S7 PLCs (Programmable Logic Controllers) and PVSS SCADA. Meanwhile, exchanges with other Groups at CERN and outside Institutes have been promoted: to follow the global update policy for software libraries; to discuss philosophies and development details; and to accomplish common pro...

  11. On Energy-Aware Communication and Control Co-design in Wireless Networked Control Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On Energy-Aware Communication and Control Co-design in Wireless Networked Control Systems Nicolas that concern energy-aware management in wireless communication and control co-design. It is argued focus on advances that concern energy-aware management in communication and control co- This work

  12. Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March 2003 Mobility Patterns in Microcellular Wireless Networks

    E-Print Network [OSTI]

    Peha, Jon M.

    Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March 2003 Mobility Patterns in Microcellular Wireless Networks Suttipong Thajchayapong and Jon M. Peha Department- cellular wireless networks, based on measurements from the 802.11-based system that blankets the Carnegie

  13. IEEE Wireless Communications and Networking Conference (WCNC), Sept. 2000 A Novel Co-existence Algorithm for Unlicensed Fixed Power Devices

    E-Print Network [OSTI]

    Peha, Jon M.

    ]. The Federal Communications Commission (FCC) has of late increased unlicensed allocations, creating1 IEEE Wireless Communications and Networking Conference (WCNC), Sept. 2000 A Novel Co the Unlicensed Personal Communication Services (UPCS) band [2], the Unlicensed National Information

  14. Wireless Communication for Smart Grid Applications at Distribution Level Feasibility and Requirements

    E-Print Network [OSTI]

    Namboodiri, Vinod

    and reduce the latency of event notification. Fault location is considered as an example application AND DESIGN FOR DISTRIBUTION Traditional system control and data acquisition (SCADA) level communication has

  15. Network Communication as a Service-Oriented William JOHNSTON, Joe METZGER, Mike O'CONNOR, Michael COLLINS, Joseph

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    Network Communication as a Service-Oriented Capability William JOHNSTON, Joe METZGER, Mike O complex tasks. Network communication is currently not a service ­ it is provided, in general, as a "best of scientific instrument (which is very soon for the LHC at CERN) ­ networks must provide communication

  16. JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA (Research Fellows

    E-Print Network [OSTI]

    Liu, Weiru

    JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA, the research topics include: (i) developing multi-agent system architecture for supporting SCADA systems-agent environments and integrating planning knowledge; (iii) investigating security vulnerabilities in MAS for SCADA

  17. Determining a bisection bandwidth for a multi-node data communications network

    DOE Patents [OSTI]

    Faraj, Ahmad A. (Rochester, MN)

    2010-01-26T23:59:59.000Z

    Methods, systems, and products are disclosed for determining a bisection bandwidth for a multi-node data communications network that include: partitioning nodes in the network into a first sub-network and a second sub-network in dependence upon a topology of the network; sending, by each node in the first sub-network to a destination node in the second sub-network, a first message having a predetermined message size; receiving, by each node in the first sub-network from a source node in the second sub-network, a second message; measuring, by each node in the first sub-network, the elapsed communications time between the sending of the first message and the receiving of the second message; selecting the longest elapsed communications time; and calculating the bisection bandwidth for the network in dependence upon the number of the nodes in the first sub-network, the predetermined message size of the first test message, and the longest elapsed communications time.

  18. Simulation-based optimization of communication protocols for large-scale wireless sensor networks1

    E-Print Network [OSTI]

    Maróti, Miklós

    1 Simulation-based optimization of communication protocols for large-scale wireless sensor networks--The design of reliable, dynamic, fault-tolerant services in wireless sensor networks is a big challenge everyday life more comfortable, e.g. Intelligent Spaces [3]. These sensor networks often use distributed

  19. ENERGY-EFFICIENT MULTIMEDIA COMMUNICATIONS IN LOSSY MULTI-HOP WIRELESS NETWORKS

    E-Print Network [OSTI]

    Kravets, Robin

    ENERGY-EFFICIENT MULTIMEDIA COMMUNICATIONS IN LOSSY MULTI-HOP WIRELESS NETWORKS Al Harris, Cigdem is energy-efficiency due to battery- power constrained mobile nodes. The network interface is a significant to reduce the energy wasted by sending such useless data in lossy networks. Keywords: Energy-efficient

  20. A SIP-based OSGi Device Communication Service for Mobile Personal Area Networks

    E-Print Network [OSTI]

    Kolberg, Mario

    A SIP-based OSGi Device Communication Service for Mobile Personal Area Networks Alan Brown, Mario are offered a variety of applications for their devices. Such devices include mobile phones, personal digital such as Bluetooth, users form their own mobile Personal Area Networks (PAN) to inter- network these devices

  1. anterior communicating artery: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communiation in one direction and quantum communication in the other. Aram W. Harrow; Debbie W. Leung 2005-05-12 125 Stockholm based communications agency Environmental...

  2. 1540-7977/11/$26.002011 IEEE2 ieee power & energy magazine september/october 2011 Communication

    E-Print Network [OSTI]

    Roy, Sumit

    requirements are not just traditional "home-run" scada requirements; they are more like a mesh in which any point in the system may need to communicate with any other point in the sys- tem. the speed and latency

  3. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05T23:59:59.000Z

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  4. Sandia Energy - National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution Grid Integration Permalink GalleryNational SCADA

  5. The ICoN integrated communication and navigation protocol for underwater acoustic networks

    E-Print Network [OSTI]

    Kanthan, Rupesh R

    2005-01-01T23:59:59.000Z

    The deployment of autonomous underwater devices has increased dramatically in the last several years, presenting a strong and growing need for a network protocol to mediate acoustic communications between devices. This ...

  6. Coordinated Vehicle Platoon Control: Weighted and Constrained Consensus and Communication Network Topologies

    E-Print Network [OSTI]

    Zhang, Hongwei

    Coordinated Vehicle Platoon Control: Weighted and Constrained Consensus and Communication Network a new method for enhancing highway safety and efficiency by coordinated control of vehicle platoons. One performance. Vehicle deployment is formulated as a weighted and constrained consensus control problem

  7. Distributed connection management for real-time communication over wormhole-routed networks

    E-Print Network [OSTI]

    Sundaresan, Sharad

    1997-01-01T23:59:59.000Z

    DISTRIBUTED CONNECTION MANAGEMENT FOR REAL- TIME COMMUNICATION OVER WORMHOLE-ROUTED NETWORKS A Thesis by SHARAD SUNDARESAN Submitted to the Office of Graduate Studies of Texas ASM University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE August 1997 Major Subject: Computer Science DISTRIBUTED CONNECTION MANAGEMENT FOR REAL-TIME COMMUNICATION OVER WORMHOLE-ROUTED NETWORKS A Thesis by SHARAD SUNDARESAN Submitted to Texas AkM University in partial...

  8. 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET

  9. Edgar Nett Mobile Computer Communication SS'14 1 Roaming in infrastructure networks

    E-Print Network [OSTI]

    Edgar Nett Mobile Computer Communication SS'14 1 Roaming in infrastructure networks No or bad informs the old AP so it can release resources #12;Edgar Nett Mobile Computer Communication SS'14 3 channels (N. America 11, Japan 14), each channel has a bandwidth of 22MHz #12;Edgar Nett Mobile Computer

  10. Cloud networking and communications Cloud computing is having an important impact on

    E-Print Network [OSTI]

    Boutaba, Raouf

    Editorial Cloud networking and communications Cloud computing is having an important impact attention has been devoted to system aspects of Cloud computing. More recently, however, the focus is shifting towards Cloud net- working and communications with evolutionary and revo- lutionary propositions

  11. archiving communication system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Synchronization with Channel Estimation in Multi-Relay Cooperative Networks", IEEE Trans. Signal Process., vol. 60 Cooperative Networks", in Proc. IEEE International Conference on...

  12. atomos communication system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Synchronization with Channel Estimation in Multi-Relay Cooperative Networks", IEEE Trans. Signal Process., vol. 60 Cooperative Networks", in Proc. IEEE International Conference on...

  13. analog communication systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Synchronization with Channel Estimation in Multi-Relay Cooperative Networks", IEEE Trans. Signal Process., vol. 60 Cooperative Networks", in Proc. IEEE International Conference on...

  14. Advanced System Design of In-Building Wireless Communication Networks Using

    E-Print Network [OSTI]

    Stancil, Daniel D.

    Advanced System Design of In-Building Wireless Communication Networks Using Ventilation Ducts design an IEEE 802.11g wireless system that uses ventilation ducts to distribute the signals throughout modifications and antenna excitations we have tried, chronicling how to best install wireless local area network

  15. Energy-Efficient Modulation Design for Reliable Communication in Wireless Networks

    E-Print Network [OSTI]

    Gursoy, Mustafa Cenk

    Energy-Efficient Modulation Design for Reliable Communication in Wireless Networks Qing Chen transmit power scenarios. We have noted that variable power schemes can attain higher energy-efficiencies. The analysis of energy-efficient modulation design is also conducted in multi- hop linear networks

  16. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  17. Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks

    E-Print Network [OSTI]

    Poovendran, Radha

    Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks Loukas, University of Washington, Seattle, WA Abstract-- We consider the problem of secure multicast in an energy network operation in an wireless ad hoc environment. Energy is a physical layer parameter, while security

  18. Line-plane broadcasting in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Berg, Jeremy E. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2010-11-23T23:59:59.000Z

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  19. Line-plane broadcasting in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08T23:59:59.000Z

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  20. Unreduced Dynamic Complexity: Towards the Unified Science of Intelligent Communication Networks and Software

    E-Print Network [OSTI]

    Andrei P. Kirilyuk

    2006-03-16T23:59:59.000Z

    Operation of autonomic communication networks with complicated user-oriented functions should be described as unreduced many-body interaction process. The latter gives rise to complex-dynamic behaviour including fractally structured hierarchy of chaotically changing realisations. We recall the main results of the universal science of complexity (physics/9806002) based on the unreduced interaction problem solution and its application to various real systems, from nanobiosystems (physics/0412097, physics/0502133) and quantum devices (physics/0211071) to intelligent networks (physics/0412058) and emerging consciousness (physics/0409140). We concentrate then on applications to autonomic communication leading to fundamentally substantiated, exact science of intelligent communication and software. It aims at unification of the whole diversity of complex information system behaviour, similar to the conventional, "Newtonian" science order for sequential, regular models of system dynamics. Basic principles and first applications of the unified science of complex-dynamic communication networks and software are outlined to demonstrate its advantages and emerging practical perspectives.

  1. Investigation of broadband over power line channel capacity of shipboard power system cables for ship communications networks 

    E-Print Network [OSTI]

    Akinnikawe, Ayorinde

    2009-05-15T23:59:59.000Z

    and networking has led to suggestions of applying BPL in other systems including ships. The application of BPL technology using the Shipboard Power System (SPS) as a potential communications network for ship automation systems has been proposed, to achieve recent...

  2. amadeus on-line trigger: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communications package DIM, and a set of PVSS panels and libraries. PVSS is a commercial SCADA system chosen as toolkit and framework for the LHCb controls system. The C++ package...

  3. agent communication framework: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Er D. Korzyk 2000-01-01 55 Semantics of Communicating Agents Based on Deduction and Abduction Computer Technologies and Information Sciences Websites Summary: Semantics of...

  4. agent concise communication: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Er D. Korzyk 2000-01-01 32 Semantics of Communicating Agents Based on Deduction and Abduction Computer Technologies and Information Sciences Websites Summary: Semantics of...

  5. access communication datac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Open learner models, communication, multiple users. 1 Introduction Open learner models (OLM) are learner models that are accessible Bull, Susan 111 Channel modelling and relay for...

  6. analysis communication evaluation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Communication in Nondestructive Evaluation (DICONDE). Practice E2339 defines an industrial adaptation of the NEMA Standards Publication titled Digital Imaging and...

  7. arthropod vibratory communication: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1998, 2001 production by small animals limit the efficiency of sound communication (Bennet-Clark, 1998; Larsen Elias, Damian Octavio 4 Trap Design for Vibratory Bowl Feeders...

  8. E-print Network: Research Communications for Scientists and Engineers

    Office of Scientific and Technical Information (OSTI)

    E-print Web Log E-print Network E-print Network About Search Browse by Discipline Find Scientific Societies Receive E-print Alerts Contact Us Help Home Site Map OSTI DOE For...

  9. Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran

    E-Print Network [OSTI]

    Lazos, Loukas

    Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran Abstract-- In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques

  10. 3360 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 7, JULY 2013 Wireless Mesh Network in Smart Grid: Modeling

    E-Print Network [OSTI]

    Wang, Wenye

    in Smart Grid: Modeling and Analysis for Time Critical Communications Yi Xu, Member, IEEE, and Wenye Wang, Senior Member, IEEE Abstract--Communication networks are an indispensable com- ponent in the smart grid that are located distributively in the grid. In particular, wireless networks will be deployed widely in the smart

  11. Topic 3: Smart Grid Communications A.H. MohsenianRad (U of T) 1Networking and Distributed Systems

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    Aggregator PLC IP WMN ZigBee (Home Area Network) Substations Operation Sensors PLC IP/IEC #12;Smart GridTopic 3: Smart Grid Communications A.H. MohsenianRad (U of T) 1Networking and Distributed Systems Reference Model for Smart Grid Dr. Hamed Mohsenian-Rad Texas Tech UniversityCommunications and Control

  12. Cellular computation and communications using engineered genetic regulatory networks

    E-Print Network [OSTI]

    Weiss, Ron, 1970-

    2001-01-01T23:59:59.000Z

    In this thesis, I present an engineering discipline for obtaining complex, predictable, and reliable cell behaviors by embedding biochemical logic circuits and programmed intercellular communications into cells. To accomplish ...

  13. Communication delay in circuit-switched interconnection networks

    E-Print Network [OSTI]

    Min, G.; Ould-Khaoua, M.

    Min,G. Ould-Khaoua,M. Sarbazi-Azad,H. Proceedings 20th IEEE Int. Performance, Computing, and Communications Conference (IEEE-IPCCC 2001), Phoenix, Arizona, April 4-6, 2001. pp 51-56 IEEE Computer Society Press

  14. Radar network communication through sensing of frequency hopping

    DOE Patents [OSTI]

    Dowla, Farid; Nekoogar, Faranak

    2013-05-28T23:59:59.000Z

    In one embodiment, a radar communication system includes a plurality of radars having a communication range and being capable of operating at a sensing frequency and a reporting frequency, wherein the reporting frequency is different than the sensing frequency, each radar is adapted for operating at the sensing frequency until an event is detected, each radar in the plurality of radars has an identification/location frequency for reporting information different from the sensing frequency, a first radar of the radars which senses the event sends a reporting frequency corresponding to its identification/location frequency when the event is detected, and all other radars in the plurality of radars switch their reporting frequencies to match the reporting frequency of the first radar upon detecting the reporting frequency switch of a radar within the communication range. In another embodiment, a method is presented for communicating information in a radar system.

  15. aircraft communication systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and the high-speed of aircrafts Jain, Raj 5 Aircraft System Identification Using Artificial Neural Networks Engineering Websites Summary: Aircraft System Identification Using...

  16. access control communications: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cost reduction of wireless technologies, ITS is finding favour, transport efficiency and environment concerns. However, the vehicular network applications require a medium...

  17. 344 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 5, NO. 4, DECEMBER 2003 Designing Optimal Pulse-Shapers

    E-Print Network [OSTI]

    -existence, the Federal Communications Commission (FCC) has released a spectral mask in its "First UWB Report and Order (R344 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 5, NO. 4, DECEMBER 2003 Designing Optimal Pulse communications. Utilizing ultra-short pulses, UWB baseband transmissions enable rich multipath diversity, and can

  18. Adaptive Connection Admission Control for Mission Critical Real-Time Communication Networks

    E-Print Network [OSTI]

    Bettati, Riccardo

    admission control in real-time communication networks. Much of the existing work on connection admission in resource availability. We take an innovative approach: First, we allow an application to specify QoS over include supervisory command and control of defense systems, manufacturing plants, etc. The success

  19. Adaptive Connection Admission Control for Mission Critical Real-Time Communication Networks

    E-Print Network [OSTI]

    Sahoo, Anirudha

    in real-time communication networks. Much of the existing work on connection admission control (CAC availability. We take an innovative approach: First, we allow an application to specify QoS in a range, rather include supervisory command and control of defense systems, manufacturing plants, etc. The success

  20. Energy Efficient Communication in Next Generation Rural-Area Wireless Networks

    E-Print Network [OSTI]

    Belding-Royer, Elizabeth M.

    of flexible wireless transmission over long- distance white space links. We theoretically and experimentally and develop Power- Rate, a protocol that dynamically adjusts transmission parameters according to channelEnergy Efficient Communication in Next Generation Rural-Area Wireless Networks Veljko Pejovic

  1. Department of Computer Science & Engineering A Survey on Communication Networks in Emergency Warning Systems

    E-Print Network [OSTI]

    Jain, Raj

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.5.1 Japanese Earthquake Early Warning System . . . . . . . . . . . . . . . . . . . . . 15 3 in Emergency Warning Systems Authors: Yan Li Abstract: N/A Type of Report: MS Project Report Department - ph: (314) 935-6160 #12;A Survey on Communication Networks in Emergency Warning Systems Student: Yan

  2. What is about future high speed power line communication systems for in-vehicles networks ?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What is about future high speed power line communication systems for in-vehicles networks and results are given for different applications. Index Terms-- vehicles, power line, X-by-wire, embedded related to the steering, traction, braking system (ABS), Electronic Stability Program (ESP), Electric

  3. Communicated by Allen Selverston Oscillating Networks: Control of Burst Duration by

    E-Print Network [OSTI]

    Columbia University

    and modeling studies indicate that the PD neurons play an important role in regulating the durationCommunicated by Allen Selverston Oscillating Networks: Control of Burst Duration by Electrically, a conditional oscillator, plays a dominant role in rhythm generation. In the work described here, we manipulate

  4. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  5. TEG: A High-Performance, Scalable, Multi-Network Point-to-Point Communications Methodology

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    TEG: A High-Performance, Scalable, Multi-Network Point-to-Point Communications Methodology T University Abstract. TEG is a new component-based methodology for point-to-point mes- saging. Developed as part of the Open MPI project, TEG provides a configurable fault-tolerant capability for high

  6. Power Reduction of CMP Communication Networks via RF-Interconnects M-C. Frank Chang

    E-Print Network [OSTI]

    Cong, Jason "Jingsheng"

    latency and low energy consumption [5][7]. RF-I transmission lines provide single-cycle crossPower Reduction of CMP Communication Networks via RF-Interconnects M-C. Frank Chang , Jason Cong}@cs.ucla.edu Electrical Engineering Department, UCLA. {mfchang, socher, roccotam}@ee.ucla.edu Abstract As chip

  7. EMC/EMI Analysis in Wireless Communication Networks Department of Electrical Engineering

    E-Print Network [OSTI]

    Loyka, Sergey

    EMC/EMI Analysis in Wireless Communication Networks S. Loyka Department of Electrical Engineering: sergey.loyka@ieee.org Abstract: Main challenges in EMC/EMI modeling and simulation for modern and future difference between simulating analog and digital systems. A computationally-efficient approach for EMC

  8. Automatic Parameter Identification in FlexRay based Automotive Communication Networks

    E-Print Network [OSTI]

    Automatic Parameter Identification in FlexRay based Automotive Communication Networks Eric-Triggered Architectures are being introduced in safety-critical automotive systems ("X-by-wire") to cope with the growing and explore its limitations. I. INTRODUCTION Nowadays most automotive innovations stem from elec- tronic

  9. Self-Organisation in Future Mobile Communication Networks

    E-Print Network [OSTI]

    -organisation into wireless access networks are (i) to achieve substantial operational and capital expenditure (O/CAPEX-configuration and self-healing components. Section 4 then describes and illustrates the expected gains in terms of O/CAPEX

  10. Microsoft Word - Johnston.IOS.Network Communication as a Service...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of DOE. 1.2. ESnet Defined ESnet is: * A large-scale IP network built on a national circuit infrastructure with high-speed connections to all major US and international research...

  11. Locating hardware faults in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Megerian, Mark G. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2010-01-12T23:59:59.000Z

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  12. Test suite for the archiver of a SCADA system

    E-Print Network [OSTI]

    Voitier, Axel

    2009-01-01T23:59:59.000Z

    Topic: The group responsible for providing the main control system applications for all machines at CERN has to validate that every piece of the control systems used will be reliable and fully functional when the LHC and its experiments will do collisions of particles. CERN use PVSS from ETM/Siemens for the SCADA part of its control systems. This software has a component dedicated to archive into a centralised Oracle database values and commands of tenth of thousands hardware devices. This component, named RDB, has to be tested and validated in terms of functionality and performance. The need is high for that because archiving is a critical part of the control systems. In case of an incident on one of the machine, it will be unacceptable to not benefit of archiving the machine context at this moment just because of a bug in RDB. Bugs have to be spotted and reported to ETM. Results: The proposed solution is an extensible automatic tester able to evaluate currently around 160 cases of potential bugs. Since the ...

  13. USC/ISI Technical Report ISI-TR-625, October 2006 1 Enabling Interoperability and Extensibility of Future SCADA Systems

    E-Print Network [OSTI]

    Heidemann, John

    well in an oilfield is only connected with a few sensors at the well it resides. The RTU usually of the current SCADA systems is their limited extensibility to new applications. In the above oilfield monitoring for Interactive Smart Oilfield Technologies (CiSoft). wants to extend its SCADA system by adding a safety alarm

  14. Using Dimmable Lighting for Regulation Capacity and Non-Spinning Reserves in the Ancillary Services Market. A Feasibility Study.

    E-Print Network [OSTI]

    Rubinstein, Francis

    2011-01-01T23:59:59.000Z

    and data acquisition (SCADA) and wireless communicationInternet and utility SCADA systems, wireless communications

  15. advanced communications technology: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communications technology First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Abstract--Rapid advances in...

  16. advanced communication technology: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communication technology First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Abstract--Rapid advances in...

  17. Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking

    E-Print Network [OSTI]

    and Its Implementation over SSL Yong Song, Konstantin Beznosov, and Victor C. M. Leung Department 2006 This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL

  18. Architecting Space Communication Networks under Mission Demand Uncertainty

    E-Print Network [OSTI]

    de Weck, Olivier L.

    (conops) as a function of communication require- ments. The accuracy of the model is assessed by comparing real conops from current TDRSS-supported missions with the pre- dicted concept of operations. The model to transmit the information. Second, derive a concept of operations (conops) that facilitates data delivery

  19. Opportunistic Aggregation over Duty Cycled Communications in Wireless Sensor Networks

    E-Print Network [OSTI]

    Roedig, Utz

    Benson, Tony O'Donovan, Utz Roedig+, Cormac J. Sreenan. Mobile and Internet Systems Laboratory, Dept. This communication concept is used in the standard low power listening (LPL) protocol shipped with TinyOS 2.x, we firstly present an alternative framelet based low power listening implementation called Framelet

  20. Hybrid Modeling of Communication Networks Using Modelica Daniel Farnqvist, Katrin Strandemar, Karl Henrik Johansson, and Jo~ao Pedro Hespanha

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Hybrid Modeling of Communication Networks Using Modelica Daniel F¨arnqvist, Katrin Strandemar networks using Modelica is discussed. Congestion control in packet-switched networks, such as the Internet, by develop- ing a model library based on a recent hybrid systems model, that Modelica provides an efficient

  1. Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking

    E-Print Network [OSTI]

    Roy, Sumit

    among contending flows that share this link by solving a linear programming (LP) problem. A thorough Assignment for Multi-Radio Wireless Mesh Networks Fei Ye,1 Sumit Roy,1 and Zhisheng Niu2 1 University, provided the original work is properly cited. We investigate channel assignment for a multichannel wireless

  2. In-vehicle communication networks -a historical perspective and review

    E-Print Network [OSTI]

    Navet, Nicolas

    as the emerging automotive networks is given. Next, the current eorts of the automotive industry on middleware . . . . . . . . . . . . 31 3.3 AUTOSAR - a standard for the automotive industry . . 32 3.3.1 The reference model on the proposals of the AUTOSAR consortium. Finally, we highlight future trends in the development of automotive

  3. A Cooperative Communication Protocol for Wireless Ad-hoc Networks

    E-Print Network [OSTI]

    , MMII. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute in the network layer, where all nodes act as routers to relay messages. Cooperative transmission takes this idea. He was quick to o#11;er solutions when I worked my way into a corner, and constantly prompted me

  4. Communication Systems Chair of Communication Systems

    E-Print Network [OSTI]

    Schindelhauer, Christian

    , porn sites, web services, ... :-)) #12;8 | 28 Communication Systems network insecurity Inner and intra

  5. On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lin, Yunyue; Wu, Qishi; Cai, Xiaoshan; Du, Xiaojiang; Kwon, Ki-Hyeon

    2010-01-01T23:59:59.000Z

    Data transmission from sensor nodes to a base station or a sink node often incurs significant energy consumption, which critically affects network lifetime. We generalize and solve the problem of deploying multiple base stations to maximize network lifetime in terms of two different metrics under one-hop and multihop communication models. In the one-hop communication model, the sensors far away from base stations always deplete their energy much faster than others. We propose an optimal solution and a heuristic approach based on the minimal enclosing circle algorithm to deploy a base station at the geometric center of each cluster. In themore »multihop communication model, both base station location and data routing mechanism need to be considered in maximizing network lifetime. We propose an iterative algorithm based on rigorous mathematical derivations and use linear programming to compute the optimal routing paths for data transmission. Simulation results show the distinguished performance of the proposed deployment algorithms in maximizing network lifetime.« less

  6. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01T23:59:59.000Z

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  7. FNCS: A Framework for Power System and Communication Networks Co-Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Fuller, Jason C.; Fisher, Andrew R.; Marinovici, Laurentiu D.; Agarwal, Khushbu

    2014-04-13T23:59:59.000Z

    This paper describes the Fenix framework that uses a federated approach for integrating power grid and communication network simulators. Compared existing approaches, Fenix al- lows co-simulation of both transmission and distribution level power grid simulators with the communication network sim- ulator. To reduce the performance overhead of time synchro- nization, Fenix utilizes optimistic synchronization strategies that make speculative decisions about when the simulators are going to exchange messages. GridLAB-D (a distribution simulator), PowerFlow (a transmission simulator), and ns-3 (a telecommunication simulator) are integrated with the frame- work and are used to illustrate the enhanced performance pro- vided by speculative multi-threading on a smart grid applica- tion. Our speculative multi-threading approach achieved on average 20% improvement over the existing synchronization methods

  8. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    E-Print Network [OSTI]

    Xie, Geoffrey

    . These networks may provide command and control for autonomous underwater vehicles, forward reporting by arraysOn the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater of sensor grids, ad hoc communications links to covert forces, or positive control of unmanned, forward

  9. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  10. Enabling Interoperability and Extensibility of Future SCADA Systems Wei Ye and John Heidemann

    E-Print Network [OSTI]

    Heidemann, John

    (RTU) that monitors and controls a production well in an oilfield is only connected with a few sensors applications. In the above oilfield monitoring example, a user in the field can only access a sensor's data. through the USC Center for Interactive Smart Oilfield Technologies (CiSoft). wants to extend its SCADA

  11. Detecting Integrity Attacks on SCADA Systems Rohan Chabukswar, Yilin Mo, Bruno Sinopoli

    E-Print Network [OSTI]

    Sinopoli, Bruno

    susceptibilities in industrial control systems. In view of the present threat of global terrorism, a power grid. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and then a simplified model of a power system. Keywords: Cyber-Physical Systems, SCADA, Secure, Control 1. INTRODUCTION

  12. Synchronization Algorithms for Co-Simulation of Power Grid and Communication Networks

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Agarwal, Khushbu; Fuller, Jason C.; Marinovici, Laurentiu D.; Fisher, Andrew R.

    2014-09-11T23:59:59.000Z

    The ongoing modernization of power grids consists of integrating them with communication networks in order to achieve robust and resilient control of grid operations. To understand the operation of the new smart grid, one approach is to use simulation software. Unfortunately, current power grid simulators at best utilize inadequate approximations to simulate communication networks, if at all. Cooperative simulation of specialized power grid and communication network simulators promises to more accurately reproduce the interactions of real smart grid deployments. However, co-simulation is a challenging problem. A co-simulation must manage the exchange of informa- tion, including the synchronization of simulator clocks, between all simulators while maintaining adequate computational perfor- mance. This paper describes two new conservative algorithms for reducing the overhead of time synchronization, namely Active Set Conservative and Reactive Conservative. We provide a detailed analysis of their performance characteristics with respect to the current state of the art including both conservative and optimistic synchronization algorithms. In addition, we provide guidelines for selecting the appropriate synchronization algorithm based on the requirements of the co-simulation. The newly proposed algorithms are shown to achieve as much as 14% and 63% im- provement, respectively, over the existing conservative algorithm.

  13. data acquisition equipment, and client/server industry-standard com-puter networking technology. The system allows students to get experi-

    E-Print Network [OSTI]

    Gross, George

    data acquisition equipment, and client/server industry-standard com- puter networking technology by the industry. Keywords: Education, laboratories, EMS, client-server systems, real-time systems, and SCADA

  14. NetQoPE: A Model-driven Network QoS Provisioning Engine for Distributed Real-time and Embedded Systems

    E-Print Network [OSTI]

    Schmidt, Douglas C.

    and data acquisition (SCADA) systems, and enterprise security and hazard sensing subsystems, con- sist have network quality of service (QoS) requirements, such as low end-to-end roundtrip latency and jitter

  15. EURASIP Journal on Wireless Communications and Networking 2005:5, 118 c 2005 Mohammad Hossein Manshaei et al.

    E-Print Network [OSTI]

    Turletti, Thierry

    the original work is properly cited. network, which impacts routing. Therefore, power control is not confinedEURASIP Journal on Wireless Communications and Networking 2005:5, 1­18 c 2005 Mohammad Hossein Manshaei et al. An Evaluation of Media-Oriented Rate Selection Algorithm for Multimedia Transmission

  16. A Cyber Security Study of a SCADA Energy Management System: Stealthy

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    of critical infrastructures in our society are the power, the gas and the water supply networks transmitted through unencrypted communication chan- nels, making these critical infrastructures vulnerable Estimator Andr´e Teixeira Gy¨orgy D´an Henrik Sandberg Karl H. Johansson School of Electrical

  17. TO APPEAR IN JOURNAL OF COMMUNICATIONS AND NETWORKS, 1999 1 An Unsupervised Hybrid Network for Blind

    E-Print Network [OSTI]

    Cichocki, Andrzej

    for Blind Separation of Independent Non-Gaussian Source Signals in Multipath Environment Seungjin CHOI by a linear memoryless feedforward network) which is able to recover multiple source signals blindly. A simple criterion for multichannel blind deconvo- lution and an associated learning algorithm are presented

  18. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01T23:59:59.000Z

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  19. JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, DECEMBER 2007 1 Energy-Efficiency and Transmission Strategy Selection in

    E-Print Network [OSTI]

    Dai, Huaiyu

    , these coopera- tive transmission strategies may incur additional energy cost and system overhead. In this paper for optimal transmission strategy selection in system level and link level, aiming at minimum energyJOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, DECEMBER 2007 1 Energy

  20. 28 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011 Efficient Multipath Communication for Time-Critical

    E-Print Network [OSTI]

    Zhou, Shengli

    Communication for Time-Critical Applications in Underwater Acoustic Sensor Networks Zhong Zhou, Student Member, IEEE, Member, ACM Abstract--Due to the long propagation delay and high error rate of acoustic channels range of aquatic applications, such as oceanographic data collection, pollution monitoring, offshore

  1. The 2011 Military Communications Conference -Track 3 -Cyber Security and Network Operations From Security to Vulnerability: Data Authentication

    E-Print Network [OSTI]

    Wang, Wenye

    lines and transform ers [5], to perform critical functions of energy transmission and distributionThe 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations From Wang· Zhuo Lu* Jianfeng Mat "Department of Electrical and Computer Engineering, NC State University

  2. Deadlock-free class routes for collective communications embedded in a multi-dimensional torus network

    DOE Patents [OSTI]

    Chen, Dong; Eisley, Noel A.; Steinmacher-Burow, Burkhard; Heidelberger, Philip

    2013-01-29T23:59:59.000Z

    A computer implemented method and a system for routing data packets in a multi-dimensional computer network. The method comprises routing a data packet among nodes along one dimension towards a root node, each node having input and output communication links, said root node not having any outgoing uplinks, and determining at each node if the data packet has reached a predefined coordinate for the dimension or an edge of the subrectangle for the dimension, and if the data packet has reached the predefined coordinate for the dimension or the edge of the subrectangle for the dimension, determining if the data packet has reached the root node, and if the data packet has not reached the root node, routing the data packet among nodes along another dimension towards the root node.

  3. Path Search Algorithm for Connections with Pumps in Crude Oil Pipe Networks Jorge L. Rojas-D'Onofrio*. Jack Mrquez**

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Path Search Algorithm for Connections with Pumps in Crude Oil Pipe Networks Jorge L. Rojas of connections in pipe networks for crude oil transportation, using pumps to overcome negative differences SCADA. We tested the algorithms using data from real pipe networks located in Venezuela. Keywords: Crude

  4. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  5. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJulyD&DDepartmentContaminated GroundDOE National SCADA Test

  6. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01T23:59:59.000Z

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  7. Analysis of wind turbine vibrations based on SCADA data

    E-Print Network [OSTI]

    Andrew Kusiak; Zijun Zhang

    2010-01-01T23:59:59.000Z

    Vibrations of a wind turbine have a negative impact on its performance. Mitigating this undesirable impact requires knowledge of the relationship between the vibrations and other wind turbine parameters that could be potentially modified. Three approaches for ranking the impact importance of measurable turbine parameters on the vibrations of the drive train and the tower are discussed. They include the predictor importance analysis, the global sensitivity analysis, and the correlation coefficient analysis versed in data mining and statistics. To decouple the impact of wind speed on the vibrations of the drive train and the tower, the analysis is performed on data sets with narrow speed ranges. Wavelet analysis is applied to filter noisy accelerometer data. To exclude the impact malfunctions on the vibration analysis, the data are analyzed in a frequency domain. Data-mining algorithms are used to build models with turbine parameters of interest as inputs, and the vibrations of drive train and tower as outputs. The performance of each model is thoroughly evaluated based on metrics widely used in the wind industry. The neural network algorithm outperforms other classifiers and is considered to be the most promising approach to study wind turbine vibrations. ?DOI: 10.1115/1.4001461?

  8. Distributed decision-making of networked multi-agent systems in complex environments

    E-Print Network [OSTI]

    Zhu, Minghui

    2011-01-01T23:59:59.000Z

    deception attacks on water SCADA systems. In Proceedings ofexamining the stability of a SCADA water management systemexamining the stability of a SCADA water management system

  9. The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07) IMPLEMENTING BACKSCATTER RADIO FOR WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    (PIMRC'07) IMPLEMENTING BACKSCATTER RADIO FOR WIRELESS SENSOR NETWORKS Giovanni Vannucci Mitsubishi Electric Research Laboratories, Cambridge USA Aggelos Bletsas RadioCommunications Lab (RCL) Aristotle University of Thessaloniki, Greece Darren Leigh Mitsubishi Electric Research Laboratories, Cambridge USA

  10. 1928 IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 10, OCTOBER 2013 A Small World Network Model for Energy Efficient Wireless Networks

    E-Print Network [OSTI]

    Elkashlan, Maged

    for Energy Efficient Wireless Networks Tiankui Zhang, Jinlong Cao, Yue Chen, Laurie Cuthbert, and Maged Elkashlan Abstract--Wireless ad hoc networks can be modeled as small world networks based on the complex of the wireless links, and 2) the impact of a wireless node on the entire network. By adopting the proposed metric

  11. The scope of SaCoNet is to deal with the growing smart communications fields embedded in complex systems for a wide variety of applications in the future generation of network and cloud

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    emerging networks: sky of clouds, Internet of things, Smart Grids, Smart Cities, etc. The evolutionThe scope of SaCoNet is to deal with the growing smart communications fields embedded in complex technologies. SaCoNet focuses on how smart communications and ICT networks impact not only on network

  12. Control and monitoring of on-line trigger algorithms using a SCADA system

    E-Print Network [OSTI]

    van Herwijnen, E; Barczyk, A; Damodaran, B; Frank, M; Gaidioz, B; Gaspar, C; Jacobsson, R; Jost, B; Neufeld, N; Bonifazi, F; Callot, O; Lopes, H

    2006-01-01T23:59:59.000Z

    LHCb [1] has an integrated Experiment Control System (ECS) [2], based on the commercial SCADA system PVSS [3]. The novelty of this approach is that, in addition to the usual control and monitoring of experimental equipment, it provides control and monitoring for software processes, namely the on-line trigger algorithms. Algorithms based on Gaudi [4] (the LHCb software framework) compute the trigger decisions on an event filter farm of around 2000 PCs. Gaucho [5], the GAUdi Component Helping Online, was developed to allow the control and monitoring of Gaudi algorithms. Using Gaucho, algorithms can be monitored from the run control system provided by the ECS. To achieve this, Gaucho implements a hierarchical control system using Finite State Machines. In this article we describe the Gaucho architecture, the experience of monitoring a large number of software processes and some requirements for future extensions.

  13. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01T23:59:59.000Z

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  14. Abstract--A mobile ad hoc network is a wireless communication network which does not rely on a fixed

    E-Print Network [OSTI]

    Lyu, Michael R.

    hoc networks. We propose a secure public key authentication service based on a trust model nodes in the networks. We perform an overall evaluation of our proposed approach by simulations distributed systems, security in ad hoc networks is based on the use of a key management system

  15. affecting cell-to-cell communication: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Affective value and associative processing Barrett, Lisa Feldman 96 Is this climate porn? How does climate change communication Environmental Sciences and Ecology Websites...

  16. On improving communication in emergency response at network and organizational levels

    E-Print Network [OSTI]

    Dilmaghani, Raheleh B.

    2010-01-01T23:59:59.000Z

    in an Organizational Chart . . . . . . . . . . . . . .Response Scenarios . . . . . . . .4.3 Inter-OrganizationalCommunication at Organizational Level by Petri nets . 5.1

  17. AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS

    E-Print Network [OSTI]

    (as opposed to network support) data transmissions. Next steps in this effort will focus on store to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures and protocols will enable more effective networked subsurface

  18. 1. Introduction Wireless networked systems arise in various communication contexts, and are becoming

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    cooperative networks multiple radios are deployed in a neighborhood. The radios connect to each other via networks, in terms of both energy efficiency and throughput (Ho et al., 2003). However, besides the many wireless links to form a multi-hop wireless network, with a few nodes acting as gateways that connect

  19. Wireless Networks 6 (2000) 263277 263 Application-driven power management for mobile communication

    E-Print Network [OSTI]

    Han, Richard Y.

    2000-01-01T23:59:59.000Z

    consumed by the communication. For a high-end laptop, this can translate to 6­9% savings in the energy to be properly managed to conserve energy. In this paper, we present the design and implementation of an innovative transport level protocol capable of significantly reducing the power usage of the communication

  20. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy:Whether you're a16-17, 2015 | Department ofSupervisory control and data

  1. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of BadTHEEnergyReliability2015 Peer Review |5Dryers;Prairie21 Steps

  2. Toward resilient communities: A performance-based engineering framework for design and evaluation of the built environment

    E-Print Network [OSTI]

    Mieler, Michael

    2012-01-01T23:59:59.000Z

    control and data acquisition (SCADA) systems to control thea community. Note that SCADA stands for supervisory controlthan two infrastructures Sh SCADA, Communications Water for

  3. Outage Detection in Power Distribution Networks with Optimally-Deployed Power Flow Sensors

    E-Print Network [OSTI]

    Zhao, Yue

    Outage Detection in Power Distribution Networks with Optimally-Deployed Power Flow Sensors Yue Zhao deployed real-time power flow sensors and that of load estimates via Advanced Metering Infrastructure (AMI of Naval Research, under Grant N00014-12-1-0767. where supervisory control and data acquisition (SCADA

  4. Random intersection graphs and their applications in security, wireless communication, and social networks

    E-Print Network [OSTI]

    Zhao, Jun; Gligor, Virgil

    2015-01-01T23:59:59.000Z

    Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigning each node a set of items in some random manner and then putting an edge between any two nodes that share a certain number of items. Broadly speaking, our work is about analyzing random intersection graphs, and models generated by composing it with other random graph models including random geometric graphs and Erd\\H{o}s-R\\'enyi graphs. These compositional models are introduced to capture the characteristics of various complex natural or man-made networks more accurately than the existing models in the literature. For random intersection graphs and their compositions with other random graphs, we study properties su...

  5. Advances in integrating autonomy with acoustic communications for intelligent networks of marine robots

    E-Print Network [OSTI]

    Schneider, Toby Edwin

    2013-01-01T23:59:59.000Z

    Autonomous marine vehicles are increasingly used in clusters for an array of oceanographic tasks. The effectiveness of this collaboration is often limited by communications: throughput, latency, and ease of reconfiguration. ...

  6. B-RPM: An Efficient One-to-Many Communication Framework for On-Chip Networks 

    E-Print Network [OSTI]

    Shaukat, Noman

    2012-10-19T23:59:59.000Z

    The prevalence of multicore architectures has accentuated the need for scalable on-chip communication media. Various parallel applications and programming paradigms use a mix of unicast (one-to-one) and multicast (one-to-many) ...

  7. Ubiquitous communications for wireless personal area networks in a heterogeneous environment 

    E-Print Network [OSTI]

    Ma, Junkang

    2010-06-28T23:59:59.000Z

    The widespread use of wireless technologies has led to a tremendous development in wireless communication systems. Currently, an individual mobile user may carry multiple personal devices with multiple wireless interfaces, ...

  8. A Communication Model of Broadcast in Wormhole-Routed Networks-on-Chip

    E-Print Network [OSTI]

    Moadeli, M.

    Moadeli,M. Vanderbauwhede,W. The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) pp 315-322

  9. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  10. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

    2013-04-16T23:59:59.000Z

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  11. Stackelberg Game for Distributed Resource Allocation over Multiuser Cooperative Communication Networks

    E-Print Network [OSTI]

    Liu, K. J. Ray

    . The energy-efficient transmission was consid- ered for broadcast networks in [4]. [5] considered the design Networks Beibei Wang, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, MD 20742, USA Department of Electrical

  12. ELG7177 -Topics in Communications I: Neural Networks and Fuzzy Systems Winter 2009 (Jan. 6 -April 9): Tuesday, 11:30-13:00, CBY B202

    E-Print Network [OSTI]

    Petriu, Emil M.

    enforcement. Applications: neuro-fuzzy modelling and control, pattern recognition. Course outline: 1 NN architectures. 7. Applications of NN NN modeling of 3D objects. Pattern recognition. InverseELG7177 - Topics in Communications I: Neural Networks and Fuzzy Systems Winter 2009 (Jan. 6 - April

  13. Moving HomePlug to Industrial Applications with Power-Line Communication Network

    E-Print Network [OSTI]

    Zhao, Z.W.

    Home networking is becoming an attractive application not only for the Internet access but also for home automation. Being a high-speed and dominant standard presently, HomePlug has an important role in home LAN connecting ...

  14. Two-way communication with neural networks in vivo using focused light

    E-Print Network [OSTI]

    Schummers, James

    Neuronal networks process information in a distributed, spatially heterogeneous manner that transcends the layout of electrodes. In contrast, directed and steerable light offers the potential to engage specific cells on ...

  15. An energy-efficient communication system for ad hoc wireless and sensor networks

    E-Print Network [OSTI]

    Tetteh, William Nii Adjetey

    2007-01-01T23:59:59.000Z

    Existing ad hoc wireless and sensor network systems often trade off energy against performance. As such, it is hard to find a single deployable system that supports high data rates while maintaining energy-efficient ...

  16. Place-Based Attributes Predict Community Membership in a Mobile Phone Communication Network

    E-Print Network [OSTI]

    Eagle, Nathan N.

    Social networks can be organized into communities of closely connected nodes, a property known as modularity. Because diseases, information, and behaviors spread faster within communities than between communities, understanding ...

  17. Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks

    E-Print Network [OSTI]

    Ramaswamy Pillai, Vinod

    2013-08-28T23:59:59.000Z

    of TCP/IP reference model - the network model used in the current Internet architecture. First, we consider societal agents taking decisions on whether to obtain content legally or illegally, and tie their behavior to questions of performance of content...

  18. Distributed Event Synchronization for Diagnosing Wireless Mesh Networks Georg Lukas, University of Magdeburg, Institute for Distributed Systems

    E-Print Network [OSTI]

    used for overall process supervision and control for the whole plant, for instance in SCADA systems application-relevant network parameters (mostly one-way latency) required by the users and the applications and mitigating its occurrence in the future. For measuring one-way latency and providing a global view of system

  19. Dynamic Networked Coverage of Time-Varying Environments in the Presence of Fading Communication Channels

    E-Print Network [OSTI]

    Liebling, Michael

    (the summation of motion and communication energy) consumption of the mobile agents in each period- working for Unmanned Autonomous Vehicles (Wi-UAV'11) [Ghaffarkhah et al. 2011]. This work is supported) to design periodic trajectories and TX power policies for the mobile agents that minimize the total energy

  20. A communication stack over PLC for multi physical layer IPv6 Networking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Inc. and CITI Insa-Lyon / INRIA, France Bernard Tourancheau: CITI Insa-Lyon / INRIA and LIP UMR 5668 interoperability features regarding others media with a robust and reliable communication stack for smart metering the main grid power supply. However, power consumption is still relevant to keep the global power overhead

  1. Networks, deregulation, and risk : the politics of critical infrastructure protection

    E-Print Network [OSTI]

    Ellis, Ryan Nelson

    2011-01-01T23:59:59.000Z

    A Brief History of SCADA/EMS. ?; Gordon Friedlander. ?2009. 67-69; OE. National SCADA Test Bed Program. 4; BriData Acquisition Systems (SCADA). Idaho National Engineering

  2. Modeling and control of network traffic for performance and secure communications

    E-Print Network [OSTI]

    Xiong, Yong

    2005-02-17T23:59:59.000Z

    -Based AIMD . . . . . . . . . . . . . . . . . . . . 25 2. Window-Based AIMD . . . . . . . . . . . . . . . . . . 30 F. Analysis for Rate-Based Systems . . . . . . . . . . . . . . 32 1. Rate-Based Network Model . . . . . . . . . . . . . . . 33 2. System...: Robustness of the adaptive sliding window scheme . . . . . . . . . . . . . . . . . . . . . . 96 F. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 V SUMMARY : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 101 REFERENCES...

  3. Wireless Networks 5 (1999) 467477 467 Active tracking: Locating mobile users in personal communication

    E-Print Network [OSTI]

    Levy, Hanoch

    1999-01-01T23:59:59.000Z

    the network searches for the user location. The latter is performed when a connection to the user (for- lected, and designated as reporting cells. Each user will register only upon entering a reporting cell. Thus, when there is a paging event, the search for any user will be re- stricted to the vicinity

  4. Structural bottlenecks for communication in networks Sameet Sreenivasan,1,2

    E-Print Network [OSTI]

    Stanley, H. Eugene

    Division, Los Alamos National Laboratory, MS B258, Los Alamos, New Mexico 87545, USA 3 Laboratory of Networking and Information Systems and Department of Electrical and Computer Engineering, Boston University is the packet insertion rate above which queuing and congestion appears in the net- work. It has been argued

  5. Constraint-based Evolutionary QoS Adaptation for Power Utility Communication Networks

    E-Print Network [OSTI]

    Suzuki, Jun

    Champrasert, Junichi Suzuki and Tetsuo Otani Department of Computer Science University of Massachusetts power stations to consumers through a number of substations. Recently, the commu- nication networks consumers through a chain of substations. Each substation is re- sponsible for a certain physical regio

  6. Ratpack: Communication in a Sparse Dynamic Network J gila Bitsch Link,

    E-Print Network [OSTI]

    and a solar panel, to zebras. The nodes then recorded the ani- mals' position as well as when and where.last@uni-tuebingen.de ABSTRACT The goal of this project is to investigate the behavior of wild living rats using sensor networks by the burrow dwelling behavior of rats, which makes delay tolerant data transmission schemes a ne- cessity

  7. Prediction-Based Recovery from Link Outages in On-Board Mobile Communication Networks

    E-Print Network [OSTI]

    Libman, Lavy

    , such as those pro- posed for (and employed in) public transport vehicles, users are connected to a local network transport routes, and their repetitive nature, allows a certain degree of prediction of impending link extension known as Freeze-TCP, we study how the performance of the protocol depends on the outage prediction

  8. Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks

    E-Print Network [OSTI]

    Fan, Jeffrey

    node, the large-scaled senor network is proposed to be transformed into a maze diagram by a user of data, including temperature, humidity, pressure, noise levels, vehicular movement, etc to the functionalities of a highly scaled VLSI silicon chip with multi-cored environments. In other words, each SoC has

  9. Airborne wireless communication systems, airborne communication methods, and communication methods

    DOE Patents [OSTI]

    Deaton, Juan D. (Menan, ID); Schmitt, Michael J. (Idaho Falls, ID); Jones, Warren F. (Idaho Falls, ID)

    2011-12-13T23:59:59.000Z

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  10. Modeling and evaluation of aerial layer communications system architectures

    E-Print Network [OSTI]

    Ajemian, Stephen P

    2014-01-01T23:59:59.000Z

    Airborne networks are being developed to provide communications services in order to augment space-based and terrestrial communications systems. These airborne networks must provide point to point wireless communications ...

  11. automated fuel monitoring: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    supplement Remote Terminal Unit (RTU) data for Supervisory Control and Data Acquisition (SCADA) system, which improves SCADA and other applications. This data integration paradigm...

  12. automated activity monitoring: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    supplement Remote Terminal Unit (RTU) data for Supervisory Control and Data Acquisition (SCADA) system, which improves SCADA and other applications. This data integration paradigm...

  13. IEEE Wireless Communications April 201390 1536-1284/13/$25.00 2013 IEEE NEXT GENERATION COGNITIVE CELLULAR NETWORKS

    E-Print Network [OSTI]

    Cheng, Xiuzhen "Susan"

    by centralized authorities (e.g., the Federal Communications Commission [FCC] in the United States) that allocateIEEE Wireless Communications · April 201390 1536-1284/13/$25.00 © 2013 IEEE NEXT GENERATION communications. Based on the sensing results, CR users determine which spectrum band to use (spectrum decision

  14. Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Djouadi, Seddik M [ORNL; Charalambous, Prof. Charalambos [University of Cyprus

    2014-01-01T23:59:59.000Z

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented.

  15. abcn front-end chip: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for managing such data. However, this database should be completely integrated into the SCADA framework, it should be accessible from the SCADA and the SCADA features, e.g....

  16. atlas pixel front-end: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for managing such data. However, this database should be completely integrated into the SCADA framework, it should be accessible from the SCADA and the SCADA features, e.g....

  17. Operations Research and the Captivating Study of Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Paradox and Evolutionary Variational Inequalities · A New Network Performance/Efficiency Measure;Subway Network Railroad Network Iridium Satellite Constellation Network Satellite and Undersea Cable Networks Duke Energy Gas Pipeline Network Transportation, Communication, and Energy Networks #12;Components

  18. Operations Research and the Captivating Study of Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Variational Inequalities · A New Network Performance/Efficiency Measure with Applications to Critical;Subway Network Railroad Network Iridium Satellite Constellation Network Satellite and Undersea Cable Networks Duke Energy Gas Pipeline Network Transportation, Communication, and Energy Networks #12;Components

  19. Multiparty-controlled quantum secure direct communication

    SciTech Connect (OSTI)

    Xiu, X.-M., E-mail: xiuxiaomingdl@126.com; Dong, L.; Gao, Y.-J.; Chi, F. [Bohai University, Physics Department (China)

    2007-12-15T23:59:59.000Z

    A theoretical scheme of a multiparty-controlled quantum secure direct communication is proposed. The supervisor prepares a communication network with Einstein-Podolsky-Rosen pairs and auxiliary particles. After passing a security test of the communication network, a supervisor tells the users the network is secure and they can communicate. If the controllers allow the communicators to communicate, the controllers should perform measurements and inform the communicators of the outcomes. The communicators then begin to communicate after they perform a security test of the quantum channel and verify that it is secure. The recipient can decrypt the secret message in a classical message from the sender depending on the protocol. Any two users in the network can communicate through the above processes under the control of the supervisor and the controllers.

  20. Loan Performance Data and Communication | Department of Energy

    Energy Savers [EERE]

    Performance Data and Communication Loan Performance Data and Communication Better Buildings Residential Network Financing and Revenue Peer Exchange Call: Loan Performance Data and...

  1. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 2, FEBRUARY 2014 1129 Optimizing Network Sustainability and Efficiency

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    station (BS) is powered by sustainable energy. Our objective is to enhance the network sustainability to ensure the network sustainability. To this end, the energy buffer is modeled as a G/D/1 queue where of the energy buffer to enhance the network efficiency and sustainability. Both theoretical analysis and nu

  2. Energy-efficient wireless communication In this chapter we present an energy-efficient highly adaptive network

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    Energy-efficient wireless communication In this chapter we present an energy-efficient highly substantial research in the hardware aspects of mobile communications energy-efficiency, such as low-power electronics, power-down modes, and energy efficient modulation. However, due to fundamental physical

  3. Topics in network communications

    E-Print Network [OSTI]

    Cannons, Jillian Leigh

    2008-01-01T23:59:59.000Z

    Int. Workshop on Evaluation of Wireless Ad Hoc, Sensor andon Performance Evaluation of Wireless Ad Hoc, Sensor and

  4. Investigation of broadband over power line channel capacity of shipboard power system cables for ship communications networks

    E-Print Network [OSTI]

    Akinnikawe, Ayorinde

    2009-05-15T23:59:59.000Z

    cables. The work used a multiconductor transmission line theory based approach to model the channel response of SPS distribution lines and estimated the channel throughput capacity using a “water-filling” communication technique. This work found that BPL...

  5. Good Practice Guide on Firewall Deployment for SCADA and Process Control

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To: CongestionDevelopment of a downholeReactorsgoal andLastNetworks |

  6. Critical Infrastructure Networks and Supernetworks: New Tools for Dynamics,

    E-Print Network [OSTI]

    Nagurney, Anna

    Critical Infrastructure Networks and Supernetworks: New Tools for Dynamics, Network Efficiency Variational Inequalities · A New Network Performance/Efficiency Measure with Applications to Critical, Communication, and Energy Networks #12;Components of Common Physical Networks Network System Nodes Links Flows

  7. Channel modelling and relay for powerline communications 

    E-Print Network [OSTI]

    Tan, Bo

    2013-11-28T23:59:59.000Z

    The thesis discusses the channel modelling and relay techniques in powerline communications (PLC) which is considered as a promising technology for the Smart Grid communications, Internet access and home area network ...

  8. Master's Thesis A Secure and Energy Efficient Communication

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks and Technology 2011 #12;A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks #12;A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks Advisor : Professor Kwangjo

  9. Approved Module Information for EE4017, 2014/5 Module Title/Name: Realtime Communication Networks Module Code: EE4017

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Module Code: EE4017 School: Engineering and Applied Science Module Type: Standard Module New Module development #12;Indicative Module Content: Telecommunication systems: Network structures; national & Teaching Rationale: Lectures, tutorials and directed reading. Module Assessment Methods of Assessment

  10. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2013 1 Optimal Relay Placement in Cellular Networks

    E-Print Network [OSTI]

    Coupechoux, Marceau

    in Cellular Networks Mattia Minelli, Maode Ma, Marceau Coupechoux, Jean-Marc Kelif, Marc Sigelle, and Philippe, France (e- mail: {marceau.coupechoux, marc.sigelle, philippe.godlewski}@telecom- paristech.fr. ). J

  11. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

  12. Accepted for publication in Wireless Networks, Special Issue on Multiuser Detection in Wireless Communications Adaptive Power Control and MMSE Interference

    E-Print Network [OSTI]

    Yates, Roy

    that the receiver structure is fixed and iteratively update the transmit powers of the users to provide them hand optimizes the receiver structure with the assumption that the users have fixed transmitter powers communication systems, iterative power control is used to provide each user with an acceptable level

  13. Abstract--This paper looks into the vulnerabilities of the electric power grid and associated communication network, in the

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Abstract--This paper looks into the vulnerabilities of the electric power grid and associated analysis of interdependencies in a critical infrastructure (CI), i.e. the smart grid for electricity in the functionality of the communication system yields a faulty condition in the electric power grid, and find

  14. Int. J. Communication Networks and Distributed Systems, Vol. 6, No. 1, 2011 59 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Wang, Yongge

    systems; DCS; cyber attacks; smart grid security; critical infrastructure protection; secure communication of SIS, UNC Charlotte, 9201 University City Blvd, Charlotte, NC 28223, USA E-mail: yonwang a central location. Control systems are widely used in critical infrastructures such as electric grid

  15. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Williams, “Security issues in SCADA networks,” Computers andA Cyber Security Study of a SCADA Energy Management System,”and transmitted over a SCADA network to the system operator.

  16. Network coding for robust wireless networks

    E-Print Network [OSTI]

    Kim, MinJi, Ph. D. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth ...

  17. 76 August 2001/Vol. 44, No. 8 COMMUNICATIONS OF THE ACM A computer and network system must be protected

    E-Print Network [OSTI]

    Ye, Nong

    sys- tems, such as energy generation systems in nuclear power plants. Process control activities a variety of techniques for prevention, detection, isolation, assessment, reaction, and vulnerability state. Vulnerability testing looks for points (a weak pass- word, for example) of a computer and network

  18. Networked Cyber-Physical Systems As computing and communication get more tightly integrated into the physical processes around us,

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    ://mlab.seas.upenn.edu/vhm] Distributed Wireless Control/Actuator Networks in Industrial Automation Embedded wireless on time-bounded anytime algorithms on GPUs for real-time vehicle trafficMatrix is capable of simulating over 16 million vehicles on

  19. 2005 International Conference on Wireless Networks, Communications and Mobile Computing Improving TCP Throughput over Lossy Links Using

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    TCP Throughput over Lossy Links Using Protocol-Level Speculations Haowei Bai Honeywell Labs 3660- The degradation of Transport Control Protocol (TCP) throughput in networks with lossy links is mainly due to processor performance degradation due to control hazards in CPU design. First, two types of loss events

  20. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 4, APRIL 1999 689 The Rapidly Deployable Radio Network

    E-Print Network [OSTI]

    Kansas, University of

    , and mobile node management. This paper describes the architecture for the Rapidly Deployable Radio Network for implementing mobile, rapidly deployable, and adaptive wireless communica- tions systems. The driving and a prototype system built to evaluate key system components. Index Terms-- Adaptive protocols, mobile

  1. Mobile RobotsSensor Networks Autonomous Sensor/Actuator Networks

    E-Print Network [OSTI]

    Breu, Ruth

    mobile networks with dynamic topology Optimized task allocation and communication based on application and energy constraints Secure communication and data management in mobile sensor networks Solution SpaceMobile RobotsSensor Networks Autonomous Sensor/Actuator Networks ROSES RObot assisted SEnsor

  2. Reconfigureable network node

    DOE Patents [OSTI]

    Vanderveen, Keith B. (Tracy, CA); Talbot, Edward B. (Livermore, CA); Mayer, Laurence E. (Davis, CA)

    2008-04-08T23:59:59.000Z

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  3. Communication and Structured Correlation Elliott Wagner

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    Communication and Structured Correlation Elliott Wagner October 19, 2008 Abstract Philosophers population and models in which a finite number of agents communicate with their neighbors in a social network. My results show that communication with neighbors is more conducive to the evolution of meaning than

  4. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    A N D U G U L A Networking for Smart Meters KTH Information and Communication Technology #12;Networking for Smart Meters Chaitanya Dandugula dandu@kth.se June 19, 2012 Master of Science Thesis for the distribution of electricity to individual homes/consumers. A smart meter (SM) is an electronic device

  5. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    L D E N E B R O G O N Z Á L E Z On the way to enable Cellular/Wi-Fi networks interworking Energy-efficient enhancements for IEEE 802.11 WLANs KTH Information and Communication Technology #12;Energy-efficient experience, optimal use of access networks should care about energy-efficiency in order to extend device

  6. Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges

    E-Print Network [OSTI]

    Wu, Jie

    1 Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela problem in wireless sensor networks with adjustable sensing range. Communication and sensing consume Wireless sensor networks (WSNs) constitute the foundation of a broad range of applications related

  7. accident response process: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    last years there has been an increasing interest in the secu- rity of process control and SCADA systems-1-4503-0564-81103 ...10.00. General Terms Security Keywords SCADA,...

  8. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home Stationary PowerResearchRiskRotorDocuments

  9. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs Home Stationary Power

  10. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs Home Stationary

  11. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs Home

  12. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgram Overview

  13. INFORMATION ENGINEERING Principles, Technologies, Networks, and Applications

    E-Print Network [OSTI]

    Huang, Jianwei

    AccessApplications Smartgrids,GreenCommunications TelecommunicationSwitching Peer-to-PeerSystems OnlineSocialNetworks Internet

  14. On Cyber Security for Networked Control Systems Saurabh Amin

    E-Print Network [OSTI]

    random failures and secu- rity attacks. Cyber-security of Supervisory Control and Data Acquisition (SCADA, cyber-security assessment for SCADA systems is performed based on well-defined attacker and defender objectives. The mathematical model of SCADA systems considered in this work has two control levels

  15. Ultra high-speed Mobile Information and CommunicationUMIC Prof. Fadhel M. Ghannouchi

    E-Print Network [OSTI]

    and smart-grid wireless communication networks. This talk will highlight the why it is important to reduce

  16. Data communications

    SciTech Connect (OSTI)

    Preckshot, G.G. [Lawrence Livermore National Lab., CA (United States)

    1993-08-01T23:59:59.000Z

    The purpose of this paper is to recommend regulatory guidance for reviewers examining computer communication systems used in nuclear power plants. The recommendations cover three areas important to these communications systems: system design, communication protocols, and communication media. The first area, system design, considers three aspects of system design--questions about architecture, specific risky design elements or omissions to look for in designs being reviewed, and recommendations for multiplexed data communication systems used in safety systems. The second area reviews pertinent aspects of communication protocol design and makes recommendations for newly designed protocols or the selection of existing protocols for safety system, information display, and non-safety control system use. The third area covers communication media selection, which differs significantly from traditional wire and cable. The recommendations for communication media extend or enhance the concerns of published IEEE standards about three subjects: data rate, imported hazards and maintainability.

  17. MFC Communications Infrastructure Study

    SciTech Connect (OSTI)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01T23:59:59.000Z

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  18. Host Event Based Network Monitoring

    SciTech Connect (OSTI)

    Jonathan Chugg

    2013-01-01T23:59:59.000Z

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  19. Scheduling in switched queueing networks with heavy-tailed trac

    E-Print Network [OSTI]

    Markakis, Mihalis G

    2013-01-01T23:59:59.000Z

    We study scheduling problems arising in switched queueing networks, a class of stochastic systems that are often used to model data communication networks, such as uplinks and downlinks of cellular networks, networks of ...

  20. D-ADMM: A Communication-Efficient Distributed Algorithm For ...

    E-Print Network [OSTI]

    2012-02-13T23:59:59.000Z

    In applications such as sensor networks, nodes are battery- operated devices and thus energy is a scarce resource. It is well known that communication is the ...

  1. 16.36 Communication Systems Engineering, Spring 2003

    E-Print Network [OSTI]

    Modiano, Eytan H.

    Introduces the fundamentals of digital communications and networking. Topics covered include elements of information theory, sampling and quantization, coding, modulation, signal detection and system performance in the ...

  2. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2008 1 Redefinition of Max-Min Fairness in Multi-hop Wireless Networks

    E-Print Network [OSTI]

    Jiang, Hai

    -Min Fairness in Multi-hop Wireless Networks Ping Wang, Member, IEEE, Hai Jiang, Member, IEEE, Weihua Zhuang that it is challenging to evaluate service fairness in multi-hop wireless networks due to intra-flow contention as an alternative criterion. Based on this criterion, a new definition of max-min fairness for wireless networks

  3. Techniques for green radio cellular communications 

    E-Print Network [OSTI]

    Videv, Stefan

    2013-07-01T23:59:59.000Z

    This thesis proposes four novel techniques to solve the problem of growing energy consumption requirements in cellular communication networks. The first and second part of this work propose a novel energy efficient ...

  4. Design of a mobile coastal communications buoy

    E-Print Network [OSTI]

    Hendry-Brogan, Meghan

    2004-01-01T23:59:59.000Z

    In response to a growing interest in networked communications at sea as well as the needs of our vital commercial fishing industry, the Northeast Consortium funded a novel research initiative to establish wireless acoustic ...

  5. Energy and quality scalable wireless communication

    E-Print Network [OSTI]

    Min, Rex K. (Rex Kee), 1976-

    2003-01-01T23:59:59.000Z

    Nodes for emerging, high-density wireless networks will face the dual challenges of continuous, multi-year operation under diverse and challenging operating conditions. The wireless communication subsystem, a substantial ...

  6. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    K U R I Y O a n d M O H A M M A D A B D U L L A Toward a Network Based 3D Printing Service KTH Information and Communication Technology #12;Toward a Network Based3D Printing Service Laurier Ndikuriyo realized and is left as future work. Keywords: 3D-printing, MakerBot Thing-o-Matic, Replicatorg, LAMP, Open

  7. Departmental Communications

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1978-09-26T23:59:59.000Z

    The order establishes standards on eliminating gender-specific terminology from all DOE communications. Canceled by DOE O 1321.139.

  8. Complex Networked Control Systems

    E-Print Network [OSTI]

    buildings, modern control systems are increasingly incorporating communication networks in feedback loops [5Complex Networked Control Systems W e live and operate in a networked world. We drive to work on the performance of feedback control systems [5], [6]. Signifi- cant attention is focused on devising local

  9. anode front-end electronics: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System). The selected SCADA, which is therefore used for the CMS DCS, is PVSS II from the company ETM. This SCADA has its own database, which is suitable for storing conventional...

  10. analog front-end electronics: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System). The selected SCADA, which is therefore used for the CMS DCS, is PVSS II from the company ETM. This SCADA has its own database, which is suitable for storing conventional...

  11. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01T23:59:59.000Z

    used in area like smart buildings, street light controls andbuilding. This section focuses on HAN design to address two smart

  12. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01T23:59:59.000Z

    AMR uses UNB-PLC to read smart meter every 15 minutes [29].can be shared. Home 1 Smart meter Utility distribution2 HomePlug AV HomePlug GP Smart meter Cable PEV Appliance

  13. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01T23:59:59.000Z

    A. Chattopadhyay, A. Yang, R. Gadh, “Electric vehicle smartAngeles, 2012 Professor Rajit Gadh, Co-chair Professor AsadC. Frank Chang Lei He Rajit Gadh, Committee Co-chair Asad M.

  14. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01T23:59:59.000Z

    in home automation and LonWorks is widely used in industrialto industrial control, building and home automation. Fig.

  15. TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    to align with the electric field. The Inventions, Researches and Writings of Nikola Tesla #12;March 12TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS Ljiljana Trajkovi Communication Networks;March 12, 2004 Kwantlen College Ljiljana Trajkovic, Simon Fraser University 2 Road map Tesla in 1890's

  16. TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    of Nikola Tesla #12;January 17, 2005 UBC Ljiljana Trajkovic, Simon Fraser University 9 Wireless patentsTESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS Ljiljana Trajkovi Communication Networks;January 17, 2005 UBC Ljiljana Trajkovic, Simon Fraser University 2 Road map Tesla in 1890's First wireless

  17. Business communications

    SciTech Connect (OSTI)

    Bratten, W.A.; Emrich, M.L.

    1989-01-01T23:59:59.000Z

    Over the last few years, the need to communicate worldwide has produced positive results among standards bodies. This enabled differing factions to resolve conflicts among higher layer protocols. The European communities regulatory bodies will gain considerable flexibility with a uniform standard. At present X.400 stands ready to provide global business communication. 9 refs., 1 fig.

  18. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden M A N X I N G D U in upgrading their network capacity. However, an important conclusion from this thesis project be more efficient. It should be noted that the mobile terminals covered in the project are connected

  19. Collision Avoidance in a Dense RFID Network Shweta Jain

    E-Print Network [OSTI]

    Das, Samir R.

    is supplied by inductive coupling between the reader and tag antennas. The reader "energizes" the tags read. Categories and Subject Descriptors C.2.1 [Computer-Communication Networks]: Network Architecture and Design--Network communication, Wire- less communication General Terms Design, Experimentation

  20. International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.6, November 2011 DOI : 10.5121/ijcnc.2011.3601 1

    E-Print Network [OSTI]

    Li, Juan "Jen"

    infrastructure. However, the functionality and security of such networks would be potentially undermined without decentralized, secure and reliable trust relationships between mobile ad hoc social network participants, and history of friendship. A set of simulations is conducted to evaluate our system deployed in a mobile

  1. Covert Optical Communication

    E-Print Network [OSTI]

    Boulat A. Bash; Andrei H. Gheorghe; Monika Patel; Jonathan Habif; Dennis Goeckel; Don Towsley; Saikat Guha

    2014-09-10T23:59:59.000Z

    Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary. We show that, although it is impossible over a pure-loss channel, covert communication is attainable in the presence of any excess noise, such as a $300$K thermal blackbody. In this case, $\\mathcal{O}(\\sqrt{n})$ bits can be transmitted reliably and covertly in $n$ optical modes using standard optical communication equipment. The all-powerful adversary may intercept all transmitted photons not received by the intended receiver, and employ arbitrary quantum memory and measurements. Conversely, we show that this square root scaling cannot be outperformed. We corroborate our theory in a proof-of-concept experiment. We believe that our findings will enable practical realizations of covert communication and sensing, both for point-to-point and networked scenarios.

  2. A Virtual Infrastructure for Wireless Sensor Networks

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    &CHAPTER 4 A Virtual Infrastructure for Wireless Sensor Networks STEPHAN OLARIU and QINGWEN XU Old, and wireless communications 107 Handbook of Sensor Networks: Algorithms and Architectures, Edited by I and communication infra- structures, called wireless sensor networks, will have a significant impact on a wide array

  3. Phase patterns of coupled oscillators with application to wireless communication

    SciTech Connect (OSTI)

    Arenas, A.

    2008-01-02T23:59:59.000Z

    Here we study the plausibility of a phase oscillators dynamical model for TDMA in wireless communication networks. We show that emerging patterns of phase locking states between oscillators can eventually oscillate in a round-robin schedule, in a similar way to models of pulse coupled oscillators designed to this end. The results open the door for new communication protocols in a continuous interacting networks of wireless communication devices.

  4. ENVIRONMENTAL LAW NETWORK

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ENVIRONMENTAL LAW NETWORK INTERNATIONAL RÉSEAU INTERNATIONAL DE DROIT DE L´ENVIRONNEMENT INTERNATIONALES NETZWERK UMWELTRECHT EU Enforcement Policy of Community Environmental law as presented in the Commission Communication on implementing European Community Environmental law Marta Ballesteros The direct

  5. Actor-Network Procedures (Extended Abstract)

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    and practical reasoning about security of computation and communication in net- works.engineering. Towards, and the ever expanding range of devices and objects used for communication and network- ing, blurring many

  6. 1418 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 46, NO. 11, NOVEMBER 1998 Energy Efficiency of Media Access Protocols for Mobile Data Networks

    E-Print Network [OSTI]

    Chockalingam, A.

    1418 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 46, NO. 11, NOVEMBER 1998 Energy Efficiency of Media Member, IEEE Abstract--As mobile terminals are powered by a finite battery source, energy constraints analytical framework, we study the energy efficiency of a class of multiple access schemes, using the average

  7. Hierarchical Wireless Network Architecture for Distributed Applications Zeashan Hameed Khan

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Hierarchical Wireless Network Architecture for Distributed Applications Zeashan Hameed Khan Control-- This paper describes a hierarchical wireless network architecture for real time remote coordination, Distributed monitoring, QoS adaptation, Realtime coordination I. INTRODUCTION Wireless communication networks

  8. Exploring Architectural Challenges in Scalable Underwater Wireless Sensor Networks

    E-Print Network [OSTI]

    Shi, Zhijie Jerry

    1 Exploring Architectural Challenges in Scalable Underwater Wireless Sensor Networks Z. Jerry Shi and Yunsi Fei Department of Computer Science and Engineering Department of Electrical and Computer sensor networks (UWSNs): Aquatic applications Design challenges in UWSNs ­ Communications ­ Networking

  9. Optimal Power Flow: Closing the Loop over Corrupted Data

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    application are the Supervisory Control and Data Acquisition (SCADA) systems. In power networks, the SCADA System. Modern SCADA/EMS systems collect large amounts of measurement data and, using a State Estimator attack. We denote the data corruption by a. cyber attacks on SCADA/EMS systems operating power net- works

  10. Lead, Communications Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will: Serve as Lead, Communications Specialist for the Communications Team. Assists the Communications Director in planning, coordinating and implementing...

  11. Compiling functional reactive macroprograms for sensor networks

    E-Print Network [OSTI]

    Newton, Ryan Rhodes, 1980-

    2005-01-01T23:59:59.000Z

    Sensor networks present a number of novel programming challenges for application developers. Their inherent limitations of computational power, communication bandwidth, and energy demand new approaches to programming that ...

  12. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    SciTech Connect (OSTI)

    L. DOWELL

    1999-08-01T23:59:59.000Z

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints. reconfiguration to restore connectivity to a data-fusion network following the failure of a network component.

  13. Illuminating the Heterotropic Communication of the Pair-wise Interactions in Phosphofructokinase from Bacillus stearothermophilus

    E-Print Network [OSTI]

    Perez, Stephanie

    2012-10-17T23:59:59.000Z

    The number of allosteric sites and active sites in phosphofructokinase from Bacillus stearothermophilus create an intricate network of communication within the enzyme. With thermodynamic linkage analysis, the overall allosteric communication can...

  14. 21F.019 / 21F.021 Communicating Across Cultures, Spring 2003

    E-Print Network [OSTI]

    Widdig, Bernd

    In an increasingly interconnected world, communicating across cultures is a crucial skill in the international networks of business, science, and technology. Subject examines a range of communication styles and techniques ...

  15. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013 825 Guest Editorial

    E-Print Network [OSTI]

    Wang, Cheng-Xiang

    Spectrum and Energy Efficient Design of Wireless Communication Networks: Part I Yang Yang, Xiaohu You-of-the-art solutions for joint spectrum and energy efficient design (SEED) and optimization of wireless communication

  16. Communications Systems Driven by Software Agent Technology Communications Systems Driven by

    E-Print Network [OSTI]

    Poslad, Stefan

    @nortelnetworks.com Abstract The application of software agent technology to the management of communications' infrastructures describe how agent technology has been used for network management, legacy telecommunications systems in an applied situation of providing a virtual private network. Latter sections describe mobile agent technology

  17. Magnetostatic communication

    DOE Patents [OSTI]

    Daily, William D. (Livermore, CA)

    2008-02-26T23:59:59.000Z

    A system for providing communication of information by modulating a magnetostatic field with a magnetostatic transmitter that modulates said magnetostatic field to contain the information and detecting the information in the modulated field at a distance with a magnetostatic detector that detects the modulated magnetic field containing the information.

  18. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  19. Virtual infrastructure for wireless ad hoc networks

    E-Print Network [OSTI]

    Gilbert, Seth, 1976-

    2007-01-01T23:59:59.000Z

    One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...

  20. The Multi-Network Design Problem

    E-Print Network [OSTI]

    Balakrishnan, Anantaram

    This paper studies a new multi-facility network synthesis problem, called the Multi-level Network Design (MLND) problem, that arises in the topological design of hierarchical communication, transportation, and electric ...

  1. Improving Network Reliability: Analysis, Methodology, and Algorithms

    E-Print Network [OSTI]

    Booker, Graham B.

    2010-07-14T23:59:59.000Z

    The reliability of networking and communication systems is vital for the nation's economy and security. Optical and cellular networks have become a critical infrastructure and are indispensable in emergency situations. This dissertation outlines...

  2. Quality of service analysis for audio over cellular voice networks and cellular wireless wide area networks

    E-Print Network [OSTI]

    Malik, Omair S. (Omair Safwan)

    2007-01-01T23:59:59.000Z

    Cellular Wireless Wide Area Networks (WWANs) are most prevalent and offer high-bandwidth data transfer. We believe WWANs can be availed for voice communications employing Voice Over IP technologies. Such a communication ...

  3. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS: SPECIAL ISSUES ON WIRELESS AD HOC NETWORKS 1 Principles and Protocols for Power Control in

    E-Print Network [OSTI]

    Kawadia, Vikas

    Principles and Protocols for Power Control in Wireless Ad Hoc Networks Vikas Kawadia and P. R. Kumar-- Transmit power control is a prototypical example of a cross-layer design problem. The transmit power level consumption. The challenge is to determine where in the architecture the power control problem

  4. There are significant efforts underway to develop practical resources for quantum communi-cations and information processing in optical fiber networks. Entanglement, which refers to the

    E-Print Network [OSTI]

    Van Stryland, Eric

    - cations and information processing in optical fiber networks. Entanglement, which refers be entangled. Coupling such down-converted photons into optical fibers without degrading entanglement, however-division multiplexed optical fiber systems. Some recent results on utilizing such entanglement for quantum

  5. Transmission Power Allocation for Cooperative Relay-BasedNeighborhood Area Networks for Smart Grid

    E-Print Network [OSTI]

    Kai, Ma; Guoqiang, Hu; Spanos, Costas

    2013-01-01T23:59:59.000Z

    Architecture for the Smart Grid, IEEE Network, vol. 25, no.Communications in Smart Grid. IEEE Communication Magazine,Infrastructure for Smart Grid. IEEE Network, vol. 25, no.5,

  6. Transmission Power Allocation for Cooperative Relay-BasedNeighborhood Area Networks for Smart Grid

    E-Print Network [OSTI]

    Spanos, Costas; Kai, Ma; Guo-Qiang, HU

    2013-01-01T23:59:59.000Z

    Architecture for the Smart Grid, IEEE Network, vol. 25, no.to-Machine Communications in Smart Grid. IEEE CommunicationInfrastructure for Smart Grid. IEEE Network, vol. 25, no.5,

  7. access control system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  8. automatic scale selection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficient and reduces complexity. By programming the PLC we control the entire system. SCADA (Supervisory Control and Data Acquisition) is used to monitor the process. unknown...

  9. acquisition system atlas: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for several monitoring and control tasks. The Supervisory, Control And Data Acquisition (SCADA) system will use PVSS, a commercial software product chosen for the CERN LHC...

  10. access ofdma systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  11. analysing access control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  12. artificial lightweight aggregate: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and are currently porting Autoscopy to actual power hardware to test computers. However, SCADA embedded control systems impose a stringent set of requirements on protectionChapter...

  13. access appointment system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  14. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  15. automated radiological monitoring: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the control applications. The data interfacing between the substation IEDs and EMS SCADA database to allow for such integration is elaborated on indicating various issues in...

  16. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  17. attack detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  18. array readout chip: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control System, which is built upon a common control framework based on an industrial SCADA system. Abstraction of different access modes and separation from the modeling of...

  19. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  20. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  1. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  2. automated process monitoring: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applications. The CPC component is composed of several platform oriented plugins PLCs and SCADA) describing the structure and the format of the generated code. It uses a resource...

  3. advanced technology lightweight: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and are currently porting Autoscopy to actual power hardware to test computers. However, SCADA embedded control systems impose a stringent set of requirements on protectionChapter...

  4. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  5. atlas online monitoring: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mixture ratio and flow. The instrument and its Supervisory, Control and Data Acquisition (SCADA) software are described in this paper. The instrument has demonstrated a resolution...

  6. access denial systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  7. access mri system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  8. atlas pixel upgrade: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mixture ratio and flow. The instrument and its Supervisory, Control and Data Acquisition (SCADA) software are described in this paper. The instrument has demonstrated a resolution...

  9. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  10. access system lacs: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  11. access control systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  12. access system analysis: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation...

  13. attack model development: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    than the traditional alert correlations. Wei Yan 89 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  14. aemt ieee ukri: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is permitted. Permission from IEEE must Engineering Websites Summary: of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption Dae-Hyun Choi, Student Member, IEEE...

  15. Handheld portable real-time tracking and communications device

    DOE Patents [OSTI]

    Wiseman, James M. (Albuquerque, NM); Riblett, Jr., Loren E. (Edgewood, NM); Green, Karl L. (Albuquerque, NM); Hunter, John A. (Albuquerque, NM); Cook, III, Robert N. (Rio Rancho, NM); Stevens, James R. (Arlington, VA)

    2012-05-22T23:59:59.000Z

    Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

  16. Acoustic system for communication in pipelines

    SciTech Connect (OSTI)

    Martin, II, Louis Peter (San Ramon, CA); Cooper, John F. (Oakland, CA)

    2008-09-09T23:59:59.000Z

    A system for communication in a pipe, or pipeline, or network of pipes containing a fluid. The system includes an encoding and transmitting sub-system connected to the pipe, or pipeline, or network of pipes that transmits a signal in the frequency range of 3-100 kHz into the pipe, or pipeline, or network of pipes containing a fluid, and a receiver and processor sub-system connected to the pipe, or pipeline, or network of pipes containing a fluid that receives said signal and uses said signal for a desired application.

  17. Hallmark Fact Sheet.cdr

    Broader source: Energy.gov (indexed) [DOE]

    Cryptographic Serial Communication Hallmark Cryptographic Serial Communication A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide...

  18. Logistical Networking Sharing More than the Wires

    E-Print Network [OSTI]

    Plank, Jim

    Network as approaches to flexible implementation of advanced network protocols. We describe the Internet. The goal of computer networking is typically taken to be communication, i.e. the transmission of data1 Logistical Networking Sharing More than the Wires Micah Beck, Terry Moore, Jim Plank, Martin

  19. Class network routing

    DOE Patents [OSTI]

    Bhanot, Gyan (Princeton, NJ); Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2009-09-08T23:59:59.000Z

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  20. Ad-hoc wireless network coverage with networked robots that cannot localize

    E-Print Network [OSTI]

    Correll, Nikolaus

    We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...

  1. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  2. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  3. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home Stationary

  4. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgram Overview Home

  5. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgram

  6. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, Dario B. (DeSoto, TX)

    1996-01-01T23:59:59.000Z

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  7. Communicating Logistics

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'sEnergyTexas1.Space Data CorporationPastCommunicating Logistics *

  8. Report: Communications

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR -Department of Energyasto|Department ofCOMMUNICATIONS

  9. Scholarly Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook Twitter Principal InvestigatorsSave Energy onofCNMS,Communication

  10. A framework for Unified Communication and Collaboration strategy for telcos

    E-Print Network [OSTI]

    Wahid, Bilal

    2008-01-01T23:59:59.000Z

    Unified Communication and Collaboration (UCC) is a product offer that is the result of fixed and mobile networks convergence and the possibility of development of applications which are interoperable. Currently there are ...

  11. Distributed services for mobile ad hoc networks

    E-Print Network [OSTI]

    Cao, Guangtong

    2005-11-01T23:59:59.000Z

    A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile ad hoc network is the mobility of the nodes. Because of the mobility, communication links form...

  12. Flexible network wireless transceiver and flexible network telemetry transceiver

    DOE Patents [OSTI]

    Brown, Kenneth D. (Grain Valley, MO)

    2008-08-05T23:59:59.000Z

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  13. A Network-based System Architecture for Remote Medical Applications

    E-Print Network [OSTI]

    Jantsch, Axel

    mobile technology [1] [2] [10]. 3G communication network provides a broadband, packet-based transmissionA Network-based System Architecture for Remote Medical Applications Huimin She1, 2 1 Dept-21-5135-5286 zhoud@fudan.edu.cn ABSTRACT Nowadays, the evolution of wireless communication and network technologies

  14. Routing for Wireless Multi Hop Networks Unifying and Distinguishing Features

    E-Print Network [OSTI]

    Graham, Nick

    -to-end communication, wireless communication provides flexible deployment and use, cost reduction, mobility, network dynamic network conditions due to interference, loss of signal power with distance and freedom of mobilityRouting for Wireless Multi Hop Networks ­ Unifying and Distinguishing Features Technical Report

  15. COMMUNICATION A comprehensive

    E-Print Network [OSTI]

    relations, or applied communication. Our program is interdisciplinary in nature, reflecting the contemporary and political science. Admission When you choose to study communication, you will be admitted to the FairmountCOMMUNICATION A comprehensive communication degree from the Elliott School of Communication

  16. Using Transmission Lines for Global On-Chip Communication

    E-Print Network [OSTI]

    Huang, Michael C.

    1 Using Transmission Lines for Global On-Chip Communication Aaron Carpenter, Jianyun Hu, Jie Xu-switched network-on-chip a less attractive option. An alternative solution uses well-engineered transmission lines as communication links. These transmission lines, along with simple, practical circuits using modern CMOS technol

  17. Edgar Nett Mobile Computer Communication SS'14 1 Mobility Support

    E-Print Network [OSTI]

    Edgar Nett Mobile Computer Communication SS'14 1 Mobility Support (Network Layer) #12;Edgar Nett updates take to long time (up to one day) è TCP connections break, security problems etc #12;Edgar Nett mobility (connection typically via a low bandwidth radio link) #12;Edgar Nett Mobile Computer Communication

  18. 1 Edgar Nett Mobile Computer Communication SS'10 Mobility Support

    E-Print Network [OSTI]

    1 Edgar Nett Mobile Computer Communication SS'10 Mobility Support (Network Layer) #12;2 Edgar Nett updates take to long time (up to one day) TCP connections break, security problems etc #12;3 Edgar Nett bandwidth radio link) #12;4 Edgar Nett Mobile Computer Communication SS'10 Roles and Definitions Mobile Node

  19. A SELF SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS

    E-Print Network [OSTI]

    Kent, University of

    attached to sensor nodes have a limited transmission range, multi-hop communication is needed to flexiblyA SELF ­ SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS SENSOR NETWORKS #Antonio Gonzalez-Velazquez1 , Ian W Marshall2 , Lionel Sacks1 1 Department of Electronic and electric engineering

  20. ECE 5332 Communications and Control in Smart Grid

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    ECE 5332 Communications and Control in Smart Grid A.H. MohsenianRad (U of T) 1Networking;Course Overview Dr. Hamed Mohsenian-Rad Texas Tech UniversityCommunications and Control in Smart Grid 2 · Graduate Course on Introduction to Smart Grid. · No Official Prerequisites: Background in the following

  1. Asian Communication Modes

    E-Print Network [OSTI]

    Zhang, Yan Bing

    2008-01-01T23:59:59.000Z

    Communication in its simplest form refers to the ongoing process of sharing and understanding meaning (? Communication: Definitions and Concepts). Much of a problematic intercultural communication stems from different ways that message is composed...

  2. Communication Standards and Recommendations

    E-Print Network [OSTI]

    Communication Standards and Recommendations Introduction & Purpose 3 Standards & Recommendations Communication 4 Training 10 Evaluation 11 PMO Workgroup Participation 12 Staffing 12 Communications-related Tracking Grantee Portal Standards and Recommendations 13

  3. Security Schemes for Wireless Sensor Networks with Mobile Sink 

    E-Print Network [OSTI]

    Rasheed, Amar Adnan

    2011-08-08T23:59:59.000Z

    components for the secure operation of such networks. Due to the sensors, limited resources designing efficient security schemes with low communication overhead to secure communication links between sensors and MS (Mobile Sink) is not a trivial task...

  4. Dynamic Electric Power Supply Chains and Transportation Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Dynamic Electric Power Supply Chains and Transportation Networks: an Evolutionary Variational energy Electric power supply chains, provide the foundations for theElectric power supply chains, provide and societies. Communication, transportation, heating, lighting, cooling,Communication, transportation, heating

  5. Project no.: IST-FP6-STREP -027513 Project full title: Critical Utility InfrastructurAL Resilience

    E-Print Network [OSTI]

    Neves, Nuno

    to the hybrid composition of those infrastructures: operational network, called generically SCADA, devoted unwittingly, the SCADA network is sometimes connected to. In consequence, in scientific terms, our problem can systems problem including interconnected SCADA/embedded networks, corporate intranets, and Internet

  6. Trends in Automotive Communication Systems Nicolas Navet

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    is given. Next, the current eorts of the automotive industry on middleware technologies which mayTrends in Automotive Communication Systems Nicolas Navet 1 , Françoise Simonot-Lion 2 May 29, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This chap- ter rst

  7. Communication and Computation in Distributed CSP Algorithms

    E-Print Network [OSTI]

    Krishnamachari, Bhaskar

    Communication and Computation in Distributed CSP Algorithms C`esar Fern`andez1 , Ram´on B´ejar1 in the context of networked distributed systems. In order to study the performance of Distributed CSP (DisCSP consider two complete DisCSP algorithms: asynchronous backtracking (ABT) and asynchronous weak commitment

  8. ORISE: Public Health Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communication Public Health Communication The Oak Ridge Institute for Science and Education (ORISE) assists government agencies and organizations in addressing public health...

  9. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  10. Pre Fall DTF Training 09/01/2009

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wind plants were expected to have in place telemetered communication links via GenICCP, SCADA ICCP, or SCADA RTU's (either BETAC or GE D20) to receive data from BPA on the status...

  11. Wireless Network Security and Interworking MINHO SHIN, JUSTIN MA, ARUNESH MISHRA, AND WILLIAM A. ARBAUGH

    E-Print Network [OSTI]

    Wireless Network Security and Interworking MINHO SHIN, JUSTIN MA, ARUNESH MISHRA, AND WILLIAM A, in- terworking between heterogeneous wireless networks is extremely important for ubiquitous and high communication technologies cover a whole spec- trum from wireless personal area networks (WPANs

  12. Distributed Resolution of Network Congestion and Potential Deadlock Using Reservation-based Scheduling

    E-Print Network [OSTI]

    Pinkston, Timothy M.

    Distributed Resolution of Network Congestion and Potential Deadlock Using Reservation multiprocessor servers and loosely coupled (and, oftentimes, heterogeneous) distributed network Abstract Efficient and reliable communication is essential for achieving high performance in a networked

  13. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities

    E-Print Network [OSTI]

    Fan, Zhong; Gormus, Sedat; Efthymiou, Costas; Kalogridis, Georgios; Sooriyabandara, Mahesh; Zhu, Ziming; Lambotharan, Sangarapillai; Chin, Woon Hau

    2011-01-01T23:59:59.000Z

    Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.

  14. Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation

    E-Print Network [OSTI]

    Heidemann, John

    Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network communication is an enabling factor in mul- tiple mobile robot systems. There is signi#12;cant interac- tion between robot controllers and communications sub- systems. We present a method for evaluating combined

  15. Edgar Nett Mobile Computer Communication SS'14 13 Access methods SDMA/FDMA/TDMA

    E-Print Network [OSTI]

    Edgar Nett Mobile Computer Communication SS'14 13 Access methods SDMA/FDMA/TDMA SDMA (Space MAC approaches in wired computer networks based on TDMA #12;Edgar Nett Mobile Computer Communication.2 MHz 915 MHz 960 MHz #12;Edgar Nett Mobile Computer Communication SS'14 15 DECT - example for static

  16. The Cost of Adding Security Services to Group Communication Systems Cristina NitaRotaru

    E-Print Network [OSTI]

    Amir, Yair

    that handles every possible combination of network events. Rather it will focus on the performance evaluationThe Cost of Adding Security Services to Group Communication Systems #3; Cristina Nita sender to many receivers are based on a group communication model. Group communication systems are used

  17. The Cost of Adding Security Services to Group Communication Systems Cristina Nita-Rotaru

    E-Print Network [OSTI]

    Amir, Yair

    that handles every possible combination of network events. Rather it will focus on the performance evaluationThe Cost of Adding Security Services to Group Communication Systems Cristina Nita-Rotaru Advisor to many receivers are based on a group communication model. Group communication systems are used

  18. IET Communications Resources Service Level Agreement for SSL VPN

    E-Print Network [OSTI]

    California at Davis, University of

    IET Communications Resources Service Level Agreement for SSL VPN The purpose of this Service, at the specified price and duration, SSL (Secure Socket Layer) VPN (Virtual Private Network) service to allow departmental VPN Administrators to configure SSL VPN for their campus department on the backbone network. SSL

  19. address generation easing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that the proposed protocol is effective to allocate addresses in a MANET with reasonable latency and communication overhead. I. INTRODUCTION A Mobile Ad hoc NETwork (MANET) is a...

  20. ambulant erworbener pneumonie: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences Websites Summary: with advanced wireless communications enables remote management of chronic conditions and detection of healthBody Area Networks for...

  1. access design considerations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for a Large-Scale Wireless Sensor Network for Substation Monitoring Asis such as transformers, circuit break- ers, and compressors. All nodes communicate over a multihop...

  2. Graph anomalies in cyber communications

    SciTech Connect (OSTI)

    Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

    2011-01-11T23:59:59.000Z

    Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

  3. Optimized data communications in a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.

    2014-08-19T23:59:59.000Z

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  4. Optimized data communications in a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A

    2014-10-21T23:59:59.000Z

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  5. Interprocessor communication

    SciTech Connect (OSTI)

    Katzman, J.A.; Bartlett, J.F.; Bixler, R.M.; Davidow, W.H.; Despotakis, J.A.; Graziano, P.J.; Green, M.D.; Greig, D.A.; Hayashi, S.J.; Mackie, D.R.

    1989-02-21T23:59:59.000Z

    A multiprocessor system is described comprising: a plurality of separate processor modules, each being capable of conducting data processing operations; bus means coupling processor modules to one another for enabling communication therebetween; request means included in the sender processor module for generating a send request on the bus means when the sender processor module is ready to transmit; polling means included in the bus controller means and responsive to the send request signal for sequentially polling the plurality of separate processor modules to identify the sender processor module by its place in the sequence; identification means included in the sender processor module and responsive to the poll for generating an identify signal for identifying one of the plurality of separate processor modules as a receiver processor module; interrogation means included in the bus controller means; acknowledgement means for generating a ready signal to indicate that the receiver processor module is ready to receive a transmission; and transmit means for enabling the sender processor module to transmit to the receiver processor module.

  6. Optical Network Testbeds Workshop

    SciTech Connect (OSTI)

    Joe Mambretti

    2007-06-01T23:59:59.000Z

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking technologies. Several years ago, when many of these optical networking research topics were first being investigated, they were the subject of controversial debate. The new techniques challenged many long-held concepts related to architecture and technology. However, today all major networking organizations are transitioning toward infrastructure that incorporates these new concepts. This progress has been assisted through the series of Optical Networking Testbed Workshops (ONT). The first (ONT1) outlined a general framework of key issues and topics and developed a series of recommendations (www.nren.nasa.gov/workshop7). The second (ONT2) developed a common vision of optical network technologies, services, infrastructure, and organizations (www.nren.nasa.gov/workshop8). Processes that allow for a common vision encourage widespread deployment of these types of resources among advanced networking communities. Also, such a shared vision enables key concepts and technologies to migrate from basic research testbeds to wider networking communities. The ONT-3 workshop built on these earlier activities by expanding discussion to include additional considerations of the international interoperability and of greater impact of optical networking technology on networking in general. In accordance with this recognition, the workshop confirmed that future-oriented research and development is indispensable to fundamentally change the current Internet architecture to create a global network incorporating completely new concepts. The workshop also recognized that the first priority to allow for this progress is basic research and development, including international collaborative activities, which are important for the global realization of interoperability of a new generation architecture.

  7. Communication Consultant Contract

    Broader source: Energy.gov [DOE]

    Communication Consultant Contract, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  8. Communications Consultant RFP

    Broader source: Energy.gov [DOE]

    Communications Consultant RFP, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  9. 1-4244-2575-4/08/$20.00 c 2008 IEEE A Cross-layer Communication Solution for Multimedia Applications

    E-Print Network [OSTI]

    Pompili, Dario

    , pollution moni- toring, offshore exploration, and assisted navigation. Wire- less acoustic communications Applications in Underwater Acoustic Sensor Networks Dario Pompili Rutgers, The State University of New Jersey Underwater multimedia acoustic sensor networks will enable new underwater applications such as multimedia

  10. Lori Garver, NASA Deputy Administrator National Network for Manufacturing Innovation

    E-Print Network [OSTI]

    Lori Garver, NASA Deputy Administrator National Network for Manufacturing Innovation Cuyahoga discussion on the President's recently announced initiative, the National Network for Manufacturing the technologies we need for tomorrow's missions. These include projects to transform space laser communications

  11. Energy scalability of on-chip interconnection networks

    E-Print Network [OSTI]

    Konstantakopoulos, Theodoros K., 1977-

    2007-01-01T23:59:59.000Z

    On-chip interconnection networks (OCN) such as point-to-point networks and buses form the communication backbone in multiprocessor systems-on-a-chip, multicore processors, and tiled processors. OCNs consume significant ...

  12. Efficient multi-resolution data dissemination in wireless sensor networks

    E-Print Network [OSTI]

    Chen, Jian

    2005-11-01T23:59:59.000Z

    A large-scale distributed wireless sensor network is composed of a large collection of small low-power, unattended sensing devices equipped with limited memory, processors, and short-range wireless communication. The network is capable...

  13. Google matrix analysis of directed networks

    E-Print Network [OSTI]

    Leonardo Ermann; Klaus M. Frahm; Dima L. Shepelyansky

    2014-09-01T23:59:59.000Z

    In past ten years, modern societies developed enormous communication and social networks. Their classification and information retrieval processing become a formidable task for the society. Due to the rapid growth of World Wide Web, social and communication networks, new mathematical methods have been invented to characterize the properties of these networks on a more detailed and precise level. Various search engines are essentially using such methods. It is highly important to develop new tools to classify and rank enormous amount of network information in a way adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency on various examples including World Wide Web, Wikipedia, software architecture, world trade, social and citation networks, brain neural networks, DNA sequences and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos and Random Matrix theory.

  14. Google matrix analysis of directed networks

    E-Print Network [OSTI]

    Leonardo Ermann; Klaus M. Frahm; Dima L. Shepelyansky

    2015-06-19T23:59:59.000Z

    In past ten years, modern societies developed enormous communication and social networks. Their classification and information retrieval processing become a formidable task for the society. Due to the rapid growth of World Wide Web, social and communication networks, new mathematical methods have been invented to characterize the properties of these networks on a more detailed and precise level. Various search engines are essentially using such methods. It is highly important to develop new tools to classify and rank enormous amount of network information in a way adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency on various examples including World Wide Web, Wikipedia, software architecture, world trade, social and citation networks, brain neural networks, DNA sequences and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos and Random Matrix theory.

  15. A Network Emulation Tool Kenneth Baclawski

    E-Print Network [OSTI]

    Baclawski, Kenneth B.

    Emulation Tool (NET) is a software sim- ulation of a computer network. NET is designed for research system. Two methods are provided for customizing NET to simulate a particular computer network. One can specify the parameters of a stan- dard network provided by NET, or one can program a new communication

  16. addition-cambridge trial protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  17. acquisition enabling real-time: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    discusses the collection of complete real time data from different source systems such as SCADA, AMR, Databases and Internet which is pushed into an On Line Transaction Process...

  18. anesthesia gas-guided protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  19. Roadmap: Communication Studies Health Communication Bachelor of Arts

    E-Print Network [OSTI]

    Sheridan, Scott

    Care or COMM 36505 Communication, Aging and Culture or COMM 46503 Health Communication and Media Communication in Health Care or COMM 36505 Communication, Aging and Culture or COMM 46503 Health Communication] COMM 36501 Communication in Health Care or COMM 36505 Communication, Aging and Culture or COMM 46503

  20. POSTGRADUATE MONTEREY, CALIFORNIA

    E-Print Network [OSTI]

    is unlimited. IDENTIFYING SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS ON A NETWORK VIA REMOTE Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance 6. AUTHOR And Data Acquisition (SCADA) and other control systems which operate the critical infrastructure