Powered by Deep Web Technologies
Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Definition: Supervisory Control and Data Acquisition (SCADA) Communications  

Open Energy Info (EERE)

and Data Acquisition (SCADA) Communications and Data Acquisition (SCADA) Communications Network Jump to: navigation, search Dictionary.png Supervisory Control and Data Acquisition (SCADA) Communications Network SCADA communication networks are used to control geographically dispersed devices. The electricity grid has employed them for 15 years; smart grid implements SCADA more extensively both in geographic density and automated control of distribution system functionality. "SCADA systems are highly distributed systems used to control geographically dispersed assets, often scattered over thousands of square kilometers, where centralized data acquisition and control are critical to system operation." NIST Guide to Supervisory and Data Acquisition - SCADA and Industrial Control Systems Security (2007).[1]

2

sSCADA: securing SCADA infrastructure communications  

Science Conference Proceedings (OSTI)

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems ... Keywords: DCS, SCADA, authenticated broadcast channels, authenticated emergency channels, authentication, critical infrastructures, cyber attacks, data acquisition, distributed control systems, infrastructure protection, secure channels, secure communications, smart grid security, supervisory control

Yongge Wang

2011-12-01T23:59:59.000Z

3

Protection of SCADA communication channels  

Science Conference Proceedings (OSTI)

The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and ...

Abdelmajid Khelil; Daniel Germanus; Neeraj Suri

2012-01-01T23:59:59.000Z

4

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

5

Forensic analysis of SCADA systems and networks  

Science Conference Proceedings (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems are commonly used to automate and control industrial processes. Modern SCADA protocols leverage TCP/IP to transport sensor data and control signals. Also, corporate IT infrastructures ... Keywords: DCSs, Modbus, SCADA, data acquisition, distributed control systems, industrial environments, inforensics, network forensics, network monitoring, process monitoring, security, supervisory control

T. Kilpatrick; J. Gonzalez; R. Chandia; M. Papa; S. Shenoi

2008-02-01T23:59:59.000Z

6

Secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-05-01T23:59:59.000Z

7

Low-Latency Cryptographic Protection for SCADA Communications  

E-Print Network (OSTI)

Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber attack. A retrofit solution to protect existing SCADA communications links must assure the integrity of commands and responses that are typically transmitted over serial lines at speeds from 300 to 19200 bits per second, while introducing minimal additional latency into the real-time SCADA traffic. This paper describes the key aspects of a cryptographic protocol for retrofit SCADA link protection that leverages the Cyclic Redundancy Checks (CRC) transmitted by existing SCADA equipment to achieve strong integrity while introducing minimal latency. The protocol is based on a new position embedding encryption mode which, for a b-bit block cipher, ensures that any unauthentic message an adversary can construct (i) includes at least b randomly chosen bits, and therefore, by a new result proved for error detection by systematic shortened cyclic codes, (ii) contains a correct h-bit CRC with probability 2 ?h. The low speed of the communications channel limits the rate at which an adversary can make trials, enabling detection of potential attacks before enough trials can be made to achieve any significant likelihood of success. The protocol avoids the need for a decrypting link protection module to buffer decrypted data until an end-of-message integrity check is verified, which would otherwise add significant latency. 1

Andrew K. Wright; John A. Kinast; Joe Mccarty

2004-01-01T23:59:59.000Z

8

Hallmark Project Commercialization of the Secure SCADA Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Commercialization of the Secure SCADA Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy infrastructure have improved system functionality, but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has

9

Research trend on secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, SCADA systems, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-08-01T23:59:59.000Z

10

Communication security for SCADA in smart grid environment  

Science Conference Proceedings (OSTI)

Supervisory Control and Data Acquisition systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Conventionally, SCADA is connected only in a limited private network ... Keywords: SCADA, crossed crypto-scheme, encryption, security issues, smart gird

Rosslin John Robles; Tai-Hoon Kim

2010-11-01T23:59:59.000Z

11

Network Traffic Analysis and SCADA Security  

E-Print Network (OSTI)

Con- trol and Data Acquisition (SCADA) protocol. However, on the other hand, in spite of a recommended, the most dominant legacy SCADA protocol used in current North American power systems [24], [34], towards

Hu, Jiankun

12

sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu  

E-Print Network (OSTI)

useless. Thus we assume that control centers are trusted in our protocol. 4 sSCADA protocol suite The sSCADA which are not acceptable to SCADA protocols. Semantic security property [17] is used to ensure.g., at off-peak time). A simple counter synchronization protocol is proposed for the sSCADA protocol suite

13

SCADA system for monitoring water supply networks  

Science Conference Proceedings (OSTI)

Water supply represents a vital problem for people, and this imposes the need to know the information regarding consumptions, resources and production. This implies a continuous supervision of the water supply process in order to allow any problem that ... Keywords: PLCs, SCADA, analysis, control, data acquisition, data transmission, monitoring

Mircea Dobriceanu; Alexandru Bitoleanu; Mihaela Popescu; Sorin Enache; Eugen Subtirelu

2008-10-01T23:59:59.000Z

14

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

15

The geological disasters defense expert system of the massive pipeline network SCADA system based on FNN  

Science Conference Proceedings (OSTI)

The SCADA system plays an important role in monitoring the long distance operation of mass pipeline network, which may experience huge damage due to landslides geological hazards. It is critical to detect the deformation and displacement of rock to forecast ... Keywords: FNN, SCADA system, TDR, expert system, geologic hazard

Xiedong Cao; Cundang Wei; Jie Li; Li Yang; Dan Zhang; Gang Tang

2012-04-01T23:59:59.000Z

16

Wind Power Plant SCADA and Controls  

SciTech Connect

Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.

Badrzadeh, Babak [IEEE PES Wind Plant Collector System Design Working Group; Castillo, Nestor [IEEE PES Wind Plant Collector System Design Working Group; Bradt, M. [IEEE PES Wind Plant Collector System Design Working Group; Janakiraman, R. [IEEE PES Wind Plant Collector System Design Working Group; Kennedy, R. [IEEE PES Wind Plant Collector System Design Working Group; Klein, S. [IEEE PES Wind Plant Collector System Design Working Group; Smith, Travis M [ORNL; Vargas, L. [IEEE PES Wind Plant Collector System Design Working Group

2011-01-01T23:59:59.000Z

17

Good Practice Guide on Firewall Deployment for SCADA and Process Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Good Practice Guide on Firewall Deployment for SCADA and Process Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both critical and non-critical communications. While beneficial in other areas, use of these common protocols and operating systems has resulted in significantly less isolation from the outside world for vital SCADA and Process Control Networks (PCNs). These systems are now under risk of attack from a variety of threats. One commonly suggested security solution is to isolate the SCADA and PCN systems from the Internet and corporate enterprise network (EN) through the

18

Good Practice Guide on Firewall Deployment for SCADA and Process...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years,...

19

Good practice guide on firewall deployment for SCADA and process control networks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FIREWALL DEPLOYMENT FOR SCADA AND FIREWALL DEPLOYMENT FOR SCADA AND PROCESS CONTROL NETWORKS GOOD PRACTICE GUIDE 15 FEBRUARY 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) - a predecessor organisation to the Centre for the Protection of National Infrastructure (CPNI). Hyperlinks in this document may refer to resources that no longer exist. Please see CPNI's website (www.cpni.gov.uk) for up-to-date information. Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by CPNI. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes.

20

Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation  

E-Print Network (OSTI)

redundancy. Future work will consist of determining, for various SCADA protocols, prac- tical implementations

Sheldon, Nathan D.

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect

There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

22

Early History of Networks Basis for Modern Communication  

E-Print Network (OSTI)

HA.1 Internet history and architecture HA.2 PSTN history and architecture HA.3 SCADA networks overview HA.4 Other networks

James P. G. Sterbenz; James P. G. Sterbenz; James P. G. Sterbenz; James P. G. Sterbenz; James P. G. Sterbenz

2010-01-01T23:59:59.000Z

23

Smart Grid Communication Networks  

Science Conference Proceedings (OSTI)

... ITL staff led the evaluation of networking technologies for Smart Grid communication applications. ITL's staff lead the SGIP Priority Action Plans ...

2013-04-29T23:59:59.000Z

24

Routing SCADA data through an enterprise WAN  

SciTech Connect

Houston Lighting and Power (HL and P) and many other large utilities have investigated substantial resources in developing integrated enterprise wide area networks (WANs). The WAN provides unprecedented opportunities for integrating information throughout the corporation, resulting in improved efficiency and reduced costs of operation. In contrast, present dedicated point-to-point SCADA data circuits from the energy management system (EMS) to remote terminal units (RTUs) are not currently integrated with the network, nor replicated in any offsite backup system. An integrated approach might integrate communications from selected RTUs over the WAN to a backup system or the EMS. Such an approach would potentially provide improved disaster recovery, more efficient use of communications, reduced maintenance costs, and improved availability of operational data. RTU data, however, is fundamentally different from most other WAN traffic in that it is critical to the moment-to-moment operation of the utility and consists of a large number of messages repeated frequently and continuously. There are valid concerns as to whether the stability, availability, and inherent latency of the WAN would be adequate to support operations of a backup or primary SCADA system. There are also concerns about the adverse effects that SCADA traffic might have on the WAN. These concerns led to the project featured in this article, which tested the operational suitability and effectiveness of routing SCADA data between selected RTUs and a central site on the WAN.

Flowers, T.; Houle, B. [Houston Lighting and Power, TX (United States); Retzer, J.; Ramanathan, R. [National Systems and Research, Camas, WA (United States)

1995-07-01T23:59:59.000Z

25

State-based network intrusion detection systems for SCADA protocols: a proof of concept  

Science Conference Proceedings (OSTI)

We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere ... Keywords: IDS, SCADA systems, critical infrastructures, security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-09-01T23:59:59.000Z

26

Semantic security analysis of SCADA networks to detect malicious control commands in power grids  

Science Conference Proceedings (OSTI)

In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes ... Keywords: contingency analysis, intrusion detection system, scada, semantic analysis

Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer

2013-11-01T23:59:59.000Z

27

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network (OSTI)

the message to 1 A typical SCADA message has a length of roughly 20 bytes. However, some SCADA protocols allow-3032-2, support all standard SCADA protocols, including DNP3-Serial and Modbus/RTU, at data rates up an insecure SCADA protocol into their Secure SCADA Communications Protocol (SSCP). PNNL's technology is being

Smith, Sean W.

28

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network (OSTI)

Background 6 2.1 SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. Communication protocols used in these systems, or serial-based SCADA protocols, are very compact some background on SCADA protocols and cryp- tographic tools, and review several existing BITW

29

Supporting Advanced Communications Networks  

Science Conference Proceedings (OSTI)

... it will rely on revolutionary advances in network architecture. ... telemedicine), sensor and control networks (eg, Smart Grid, environmental monitoring ...

2012-02-13T23:59:59.000Z

30

DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ  

E-Print Network (OSTI)

-testing community. We also introduce some tools that are available for fuzzing SCADA protocols. General Network available that have been built for fuzzing non-proprietary SCADA protocols. In 2007 Ganesh Devarajan from standardized SCADA protocols such as IEC61850, MODBUS, and DNP3. 3. The LZFuzz Project 3.1 Our Approach Often

Smith, Sean W.

31

Technology Diffusion in Communication Networks  

E-Print Network (OSTI)

In the rich and growing literature on diffusion and cascade effects in social networks, it is assumed that a node's actions are influenced only by its immediate neighbors in the social network. However, there are other contexts in which this highly-local view of influence is not applicable. The diffusion of technologies in communication networks is one important example; here, a node's actions should also be influenced by remote nodes that it can communicate with using the new technology. We propose a new model of technology diffusion inspired by the networking literature on this topic. Given the communication network $G(V,E)$, we assume that node $u$ activates (i.e. deploys the new technology) when it is adjacent to a connected component of active nodes in $G$ of size exceeding node $u$'s threshold $\\theta(u)$. We focus on an algorithmic problem that is well understood in the context of social networks, but thus far has only heuristic solutions in the context of communication networks: determining the smalle...

Goldberg, Sharon

2012-01-01T23:59:59.000Z

32

Sandia SCADA Program -- High Surety SCADA LDRD Final Report  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteria Protection Profile. This report provides the status of work completed and discusses several challenges ahead.

CARLSON, ROLF E.

2002-04-01T23:59:59.000Z

33

A Hybrid Network Emergency Communication Model  

Science Conference Proceedings (OSTI)

To communicate within disaster scenarios, different devices/systems need to cooperate with specific protocols. The key communication protocol needs to provide interoperability among these systems and provide the solution for emergency services. The paper ... Keywords: Ad Hoc Network, Hybrid Network Emergency Communication Protocol HNEC, Inter-Domain Messaging IDM, Network Disaster Recovery, Routing Protocols, Sensor Network

Abdussalam Nuri Baryun, Khalid Al Begain, David Villa

2013-04-01T23:59:59.000Z

34

Security aspects of SCADA and DCS environments  

Science Conference Proceedings (OSTI)

SCADA Systems can be seen as a fundamental component in Critical Infrastructures, having an impact in the overall performance of other Critical Infrastructures interconnected. Currently, these systems include in their network designs different types ...

Cristina Alcaraz; Gerardo Fernandez; Fernando Carvajal

2012-01-01T23:59:59.000Z

35

Social Network and Communications Institutional Change Principle |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network and Communications Institutional Change Principle Network and Communications Institutional Change Principle Social Network and Communications Institutional Change Principle October 8, 2013 - 10:59am Addthis Federal agencies can use social networks and communications to spark and reinforce behavior change for meeting sustainability goals. This principle is based on research findings showing that people and institutions often are strongly influenced by the behaviors and expectations of others. Methods The social network and communications behavior change principle involves informing staff about others' sustainability efforts, especially those that are successful. Methods for social networking and communicating include many internal or external media channels, such as websites, blogs, newsletters, and emails.

36

Covert computer and network communications  

Science Conference Proceedings (OSTI)

The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be ... Keywords: covert channels, covert storage channels, security, steganography

Robert C. Newman

2007-09-01T23:59:59.000Z

37

Quantum network communication: the butterfly and beyond  

Science Conference Proceedings (OSTI)

We study the problem of k-pair communication (or multiple unicast problem) of quantum information in networks of quantum channels. We consider the asymptotic rates of high fidelity quantum communication between specific sender-receiver pairs. ... Keywords: k-pair communication problem, multiple unicast, network coding, quantum communication, routing

Debbie Leung; Jonathan Oppenheim; Andreas Winter

2010-07-01T23:59:59.000Z

38

Definition: Customer System Communications Network | Open Energy  

Open Energy Info (EERE)

System Communications Network System Communications Network Jump to: navigation, search Dictionary.png Customer System Communications Network The communications network or networks between the customers' premise and the utility, designed to provide two-way communications between customer systems and utility information systems. These networks can utilize wired or wireless connections, and can be utility-owned or provided as services by a third party.[1] Related Terms system References ↑ https://www.smartgrid.gov/category/technology/customer_system_communications_network [[C LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitions|Template:BASEPAGENAME]] Retrieved from "http://en.openei.org/w/index.php?title=Definition:Customer_System_Communications_Network&oldid=480382"

39

PIPELINES AS COMMUNICATION NETWORK LINKS  

SciTech Connect

This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

2005-03-14T23:59:59.000Z

40

SCADA -- AM/FM interface: Platforms, technology  

SciTech Connect

Efficient utility operations is enhanced by close interoperation between automated mapping/facility management (AM/FM) and supervisory control and data acquisition (SCADA) systems. Important benefits of such integration are improvements in service quality and reduced maintenance costs. Development of an AM/FM -- SCADA interface to provide automatic database and display generation for SCADA through AM/FM functions is continuing by Valmet Automation. To minimize or eliminate vendor-dependence, the AM/FM-SCADA interface is compliant with the Electric Power Research Institute's (EPRI) utility communication architecture (UCA). The utility industry is changing at an unprecedented rate. To remain a leader, or even to keep pace, utilities must be flexible and innovative. Competition forces companies to become more streamlined and efficient. These forces make the requirements for automation go beyond simple SCADA. Among several developing trends in the industry is the emergence of AM/FM. Collectively, these trends indicate the need to increase efficiency in the design, operation and maintenance of the transmission and distribution system. To accomplish its mission, SCADA and AM/FM must be a highly integrated system to provide timely information to its users. Open systems, the client-server paradigm and better information integration tools facilitate meeting these needs. UCA specification provides the technological glue, to achieve application integration between heterogeneous systems.

Gilbert, R.F. (Valmet, Automation, Inc., Houston, TX (United States))

1994-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Definition: Distribution Automation Communications Network | Open Energy  

Open Energy Info (EERE)

Automation Communications Network Automation Communications Network Jump to: navigation, search Dictionary.png Distribution Automation Communications Network A communications network or networks designed to deliver control signals and information between distribution automation devices, and between these devices and utility grid control systems. These networks can utilize wired or wireless connections, and can be utility-owned or provided as services by a third party.[1] Related Terms distribution automation References ↑ https://www.smartgrid.gov/category/technology/distribution_automation_communications_network [[C LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from

42

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications, and many other vital parts of our everyday lives all rely on SCADA systems. In this issue we look at some of the different SCADA systems and their applications. The CIP Report More Documents & Publications The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security Introduction SCADA Security for Managers and Operators

43

Review of Supervisory Control and Data Acquisition (SCADA) Systems  

SciTech Connect

A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

Reva Nickelson; Briam Johnson; Ken Barnes

2004-01-01T23:59:59.000Z

44

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

45

Definition: Synchrophasor Communications Network | Open Energy Information  

Open Energy Info (EERE)

Synchrophasor Communications Network Synchrophasor Communications Network Jump to: navigation, search Dictionary.png Synchrophasor Communications Network A communications network to transport the digital information from phasor measurement units (PMUs) to where the data will be used. Typically implemented using a private wide-area network (WAN), this network can be any digital transport system that offers acceptable security and availability. Functional requirements have been developed as part of the North American SynchroPhasor Initiative (NASPI) to provide for flexible, fast, vendor-agnostic, and secure communication of phasor measurements from data collection points to various levels of phasor data concentrators (PDCs) and phasor application use points.[1] Related Terms sustainability, fuel cell, smart grid

46

Definition: Meter Communications Network | Open Energy Information  

Open Energy Info (EERE)

Definition Definition Edit with form History Facebook icon Twitter icon » Definition: Meter Communications Network Jump to: navigation, search Dictionary.png Meter Communications Network The communications infrastructure that supports two-way delivery of information between smart meters and data collectors or access points. This infrastructure can be wired or wireless, and can be owned by the utility or a third party service provider. This network is sometimes referred to as a "field area network".[1] Related Terms smart grid References ↑ https://www.smartgrid.gov/category/technology/meter_communications_network [[C Like Like You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitions|Template:BASEPAGENAME]] Retrieved from "http://en.openei.org/w/index.php?title=Definition:Meter_Communications_Network&oldid=493063"

47

Effective Protocols for Mobile Communications and Networking  

SciTech Connect

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

48

National SCADA Test Bed | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sites Power Marketing Administration Other Agencies You are here Home National SCADA Test Bed National SCADA Test Bed Supervisory Control and Data Acquisition (SCADA) systems...

49

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

50

Trends in the development of communication networks: Cognitive networks  

Science Conference Proceedings (OSTI)

One of the main challenges already faced by communication networks is the efficient management of increasing complexity. The recently proposed concept of cognitive network appears as a candidate that can address this issue. In this paper, we survey the ... Keywords: Autonomic networks, Cognition loop, Cognitive networks, Cross-layer, Knowledge representation, Learning, OSI, Protocol stack, Reasoning, Self-aware

Carolina Fortuna; Mihael Mohorcic

2009-06-01T23:59:59.000Z

51

Fundamentals of SCADA and automated meter reading  

SciTech Connect

This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated with a central receiving facility.

Kwok, A. (Data Acquisition, BC Gas Inc., Burnaby, British Columbia (CA))

1992-02-01T23:59:59.000Z

52

Securing Supervisory Control and Data Acquisition (SCADA) ...  

Science Conference Proceedings (OSTI)

... Acquisition (SCADA) and Industrial Control Systems (ICS) Linkage of Security and Safety in SCADA and Industrial Control Systems ...

2013-04-09T23:59:59.000Z

53

National SCADA Test Bed | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Cybersecurity Energy Delivery Systems Cybersecurity National SCADA Test Bed National SCADA Test Bed Electricity Advisory Committee Transmission Planning...

54

Multiaccess and fading in communication networks  

E-Print Network (OSTI)

Two fundamental issues in the design of wireless communication networks are the interference among multiple users and the time-varying nature of the fading wireless channel. We apply fundamental techniques in information ...

Yeh, Edmund Meng, 1971-

2001-01-01T23:59:59.000Z

55

Scada Malware, a Proof of Concept  

Science Conference Proceedings (OSTI)

Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such ... Keywords: Critical infrastructures, Malware, SCADA Systems, Security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-08-01T23:59:59.000Z

56

National SCADA Test Bed | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Cybersecurity » Energy Delivery Systems Cybersecurity Cybersecurity » Energy Delivery Systems Cybersecurity » National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems. Core and Frontier Research The NSTB core capabilities combine a network of the national labs' state-of-the-art operational system testing facilities with expert research, development, analysis, and training to discover and address critical security vulnerabilities and threats the energy sector faces. NSTB offers testing and research facilities, encompassing field-scale control

57

Switch for serial or parallel communication networks  

DOE Patents (OSTI)

A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

Crosette, Dario B. (DeSoto, TX)

1994-01-01T23:59:59.000Z

58

Energy Harvesting Communication Networks: Optimization and Demonstration  

E-Print Network (OSTI)

of energy. E-CROPS will combine theoret- ical modelling and performance analysis with experimen- tal1 Energy Harvesting Communication Networks: Optimization and Demonstration (The E-CROPS Project of Electrical Engineering, Imperial College London, London, UK 2 Mobile Communications Department, Institut

Uysal-Biyikoglu, Elif

59

Switch for serial or parallel communication networks  

DOE Patents (OSTI)

A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

Crosette, D.B.

1994-07-19T23:59:59.000Z

60

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol  

Science Conference Proceedings (OSTI)

When SCADA systems are exposed to public networks, attackers can more easily penetrate the control systems that operate electrical power grids, water plants, and other critical infrastructures. To detect such attacks, SCADA systems require an intrusion ... Keywords: Bro, DNP3, SCADA, specification-based intrusion detection system

Hui Lin; Adam Slagell; Catello Di Martino; Zbigniew Kalbarczyk; Ravishankar K. Iyer

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Embodied communication in the distributed network  

Science Conference Proceedings (OSTI)

Through the adaptation of new technologies, the creative industries are proposing new forms of interaction for the distributed network. This paper considers the new media artwork Intimate Transactions as an example of a creative, experimental approach ... Keywords: co-presence, embodied interaction, flow, interaction design, network communication, new media art, telepresence

Jillian Hamilton

2007-09-01T23:59:59.000Z

62

Communication switch for serial and parallel network  

DOE Patents (OSTI)

This is a communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network, linking a multiprocessor or parallel processing system. It has a very low software processing overhead and accommodates random burst of high density data. Each processor has a communication switch which may have a data source, data destination, sensor or a robot associated with it. The configuration of the switches are coordinated through a master processor node and depends on the operational phase of the multiprocessor network:data acquisition, data processing and data exchange. The communication system design maximizes data routing while maintaining data integrity which is achieved through the reduction of communication protocol overhead and amplification of signals.

Crosetto, D.B.

1992-01-01T23:59:59.000Z

63

JAMMING COMMUNICATION NETWORKS UNDER COMPLETE ...  

E-Print Network (OSTI)

Most papers on network interdiction are about preventing jam- ... cumulative energy received from all jamming devices exceeds some threshold value E: ?i.

64

Hallmark Cryptographic Serial Communication | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Serial Communication A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide secure serial communications for existing and new...

65

U.S. DOE/OE National SCADA Test Bed Supports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. DOE/OE National SCADA Test Bed Supports U.S. DOE/OE National SCADA Test Bed Supports U.S. DOE/OE National SCADA Test Bed Supports To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) efforts to enhance control system security in the energy sector, DOE's Office of Electricity Delivery and Energy Reliability (OE) recently awarded a total of nearly $8 million to fund five industry-led projects: Hallmark Project. (PDF 789 KB) Will commercialize the Secure SCADA Communications Protocol (SSCP), which marks SCADA messages with a unique identifier that must be authenticated before the function is carried out, ensuring message integrity. (Lead: Schweitzer Engineering Laboratories; Partners: Pacific Northwest National Laboratories, CenterPoint Energy) Detection and Analysis of Threats to the Energy Sector (DATES) (PDF

66

Optimization and Control of Communication Networks  

Science Conference Proceedings (OSTI)

Recently, there has been a surge in research activities that utilize the power of recent developments in nonlinear optimization to tackle a wide scope of work in the analysis and design of communication systems, touching every layer of the layered network ...

Mung Chiang; Steven Low

2005-06-01T23:59:59.000Z

67

Optimal Design of Remote Terminal Unit (RTU) for Wireless SCADA System for Energy Management  

Science Conference Proceedings (OSTI)

For energy deficit countries, the design of Supervisory Control and Data Acquisition (SCADA) based energy management systems for optimal distribution is of high interest. Such design involves development of Remote Terminal Unit (RTU) which is considered ... Keywords: Field Programmable Gate Array (FPGA), Programmable Logic Controller (PLC), Remote Terminal Unit (RTU), Supervisory Control and Data Acquisition (SCADA), Tele-Control Interface (TCI), Wireless Communication

Muhammad Aamir; Javier Poncela; Muhammad Aslam Uqaili; B. S. Chowdhry; Nishat Ahmad Khan

2013-04-01T23:59:59.000Z

68

Communication services for advanced network applications.  

SciTech Connect

Advanced network applications such as remote instrument control, collaborative environments, and remote I/O are distinguished by traditional applications such as videoconferencing by their need to create multiple, heterogeneous flows with different characteristics. For example, a single application may require remote I/O for raw datasets, shared controls for a collaborative analysis system, streaming video for image rendering data, and audio for collaboration. Furthermore, each flow can have different requirements in terms of reliability, network quality of service, security, etc. They argue that new approaches to communication services, protocols, and network architecture are required both to provide high-level abstractions for common flow types and to support user-level management of flow creation and quality. They describe experiences with the development of such applications and communication services.

Bresnahan, J.; Foster, I.; Insley, J.; Toonen, B.; Tuecke, S.

1999-06-10T23:59:59.000Z

69

Incentive Pricing in Multi-Class Communication Networks  

Science Conference Proceedings (OSTI)

We consider a communication network that offers multi-class services to multiple types of traffic. Users choose service classes so as to optimize their own performance. The network associates with each traffic type a nominal service class. Optimal prices ... Keywords: Network pricing, multi-class networks, network control, network design and management, game theory, broadband networking

Ariel Orda; Nahum Shimkin

1997-04-01T23:59:59.000Z

70

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

71

Position estimation of transceivers in communication networks  

DOE Patents (OSTI)

This invention provides a system and method using wireless communication interfaces coupled with statistical processing of time-of-flight data to locate by position estimation unknown wireless receivers. Such an invention can be applied in sensor network applications, such as environmental monitoring of water in the soil or chemicals in the air where the position of the network nodes is deemed critical. Moreover, the present invention can be arranged to operate in areas where a Global Positioning System (GPS) is not available, such as inside buildings, caves, and tunnels.

Kent, Claudia A. (Pleasanton, CA); Dowla, Farid (Castro Valley, CA)

2008-06-03T23:59:59.000Z

72

Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA  

E-Print Network (OSTI)

encryption and authentication capabilities to the devices that control the transmission of data across grid within the power grid to collect data and transmit it back to a central unit for processing. SCADA power SCADA systems that seeks to take advantage of the full security capacity of a given network

73

Web based multilayered distributed SCADA/HMI system in refinery application  

Science Conference Proceedings (OSTI)

The paper describes system synthesis and architecture of a multilayered distributed SCADA/HMI system. The system is used for monitoring and control of refinery terminals for truck loading and oil products pipeline shipping. Network-centered, distributed ... Keywords: Data server, Fieldbuses, OPC protocols, Real time systems, SCADA/HMI

Adnan Salihbegovic; Vlatko Marinkovi?; Zoran Cico; Elvedin Karavdi?; Nina Delic

2009-03-01T23:59:59.000Z

74

GAS MAIN SENSOR AND COMMUNICATIONS NETWORK SYSTEM  

SciTech Connect

Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the New York Gas Group (NYGAS), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. A prototype system was built for low-pressure cast-iron mains and tested in a spider- and serial-network configuration in a live network in Long Island with the support of Keyspan Energy, Inc. The prototype unit combined sensors capable of monitoring pressure, flow, humidity, temperature and vibration, which were sampled and combined in data-packages in an in-pipe master-slave architecture to collect data from a distributed spider-arrangement, and in a master-repeater-slave configuration in serial or ladder-network arrangements. It was found that the system was capable of performing all data-sampling and collection as expected, yielding interesting results as to flow-dynamics and vibration-detection. Wireless in-pipe communications were shown to be feasible and valuable data was collected in order to determine how to improve on range and data-quality in the future.

Hagen Schempf, Ph.D.

2003-02-27T23:59:59.000Z

75

Toward in vivo nanoscale communication networks: utilizing an active network architecture  

Science Conference Proceedings (OSTI)

A safe and reliable in vivo nanoscale communication network will be of great benefit for medical diagnosis and monitoring as well as medical implant communication. This review article provides a brief introduction to nanoscale and molecular ... Keywords: active network, in vivo network, molecular communication, molecular motor, nanoscale network, neural coding

Stephen F. Bush

2011-09-01T23:59:59.000Z

76

First-use analysis of communication in a social network  

Science Conference Proceedings (OSTI)

The study of communication activity in social networks is aimed at understanding and promoting communications in groups, organizations and communities. In this paper, we propose a method for the analysis of communication records to extract content-based ... Keywords: e-mail analysis, information propagation, social network

Satoko Itaya; Naoki Yoshinaga; Peter Davis; Rie Tanaka; Taku Konishi; Shinich Doi; Keiji Yamada

2010-10-01T23:59:59.000Z

77

An Underwater Sensor Network with Dual Communications, Sensing, and  

E-Print Network (OSTI)

An Underwater Sensor Network with Dual Communications, Sensing, and Mobility Carrick Detweiller an underwater sensor network with dual communication and sup- port for sensing and mobility. The nodes developed. We describe the hardware details of the underwater sensor node and the communication

Farritor, Shane

78

An event buffer flooding attack in DNP3 controlled SCADA systems  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized ...

Dong Jin; David M. Nicol; Guanhua Yan

2011-12-01T23:59:59.000Z

79

On cost-effective communication network designing  

E-Print Network (OSTI)

How to efficiently design a communication network is a paramount task for network designing and engineering. It is, however, not a single objective optimization process as perceived by most previous researches, i.e., to maximize its transmission capacity, but a multi-objective optimization process, with lowering its cost to be another important objective. These two objectives are often contradictive in that optimizing one objective may deteriorate the other. After a deep investigation of the impact that network topology, node capability scheme and routing algorithm as well as their interplays have on the two objectives, this letter presents a systematic approach to achieve a cost-effective design by carefully choosing the three designing aspects. Only when routing algorithm and node capability scheme are elegantly chosen can BA-like scale-free networks have the potential of achieving good tradeoff between the two objectives. Random networks, on the other hand, have the built-in character for a cost-effective design, especially when other aspects cannot be determined beforehand.

Guoqiang Zhang

2009-10-12T23:59:59.000Z

80

A survey on communication networks for electric system automation  

Science Conference Proceedings (OSTI)

In today's competitive electric utility marketplace, reliable and real-time information become the key factor for reliable delivery of power to the end-users, profitability of the electric utility and customer satisfaction. The operational and commercial ... Keywords: Electric system automation, Internet based Virtual Private Network, Power line communication, Satellite communication, WiMAX, Wireless mesh networks, Wireless sensor networks

V. C. Gungor; F. C. Lambert

2006-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

GAS MAIN SENSOR AND COMMUNICATIONS NETWORK SYSTEM  

Science Conference Proceedings (OSTI)

Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the New York Gas Group (NYGAS), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. In Phase II of this three-phase program, an improved prototype system was built for low-pressure cast-iron and high-pressure steel (including a no-blow installation system) mains and tested in a serial-network configuration in a live network in Long Island with the support of Keyspan Energy, Inc. The experiment was carried out in several open-hole excavations over a multi-day period. The prototype units (3 total) combined sensors capable of monitoring pressure, flow, humidity, temperature and vibration, which were sampled and combined in data-packages in an in-pipe master-repeater-slave configuration in serial or ladder-network arrangements. It was verified that the system was capable of performing all data-sampling, data-storage and collection as expected, yielding interesting results as to flow-dynamics and vibration-detection. Wireless in-pipe communications were shown to be feasible and the system was demonstrated to run off in-ground battery- and above-ground solar power. The remote datalogger access and storage-card features were demonstrated and used to log and post-process system data. Real-time data-display on an updated Phase-I GUI was used for in-field demonstration and troubleshooting.

Hagen Schempf

2004-09-30T23:59:59.000Z

82

Communications Security Analysis for Control System Networks: Preliminary Report  

Science Conference Proceedings (OSTI)

Communications capabilities in the control system network are expanding and security issues are becoming more important as the electric power industry migrates from relatively slow, serial communications to high-speed, asynchronous communications. This report surveys current and evolving wired and wireless high-speed communication technologies to create a roadmap for planning control system network upgrades before regulation or equipment obsolescence and reliability concerns become issues. Technologies s...

2007-02-15T23:59:59.000Z

83

Reliable Data Communication and Storage in Underwater Acoustic Networks.  

E-Print Network (OSTI)

??Underwater acoustic communications (UAC) and networking (UAN) are promising paradigms for various oceanic applications. However, acoustic signal transmissions are characterized by long propagation delay, frequency-dependent… (more)

Cao, Rui

2011-01-01T23:59:59.000Z

84

Green networking for major components of information communication technology systems  

Science Conference Proceedings (OSTI)

Green Networking can be the way to help reduce carbon emissions by the Information and Communications Technology (ICT) Industry. This paper presents some of the major components of Green Networking and discusses how the carbon footprint of these components ...

Naveen Chilamkurti; Sherali Zeadally; Frank Mentiplay

2009-01-01T23:59:59.000Z

85

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

86

National SCADA Test Bed Enhancing control systems security in the energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

87

ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA/EMS System INEEL Baseline Summary Test Report (November SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security evaluation of the "baseline" or "as delivered" system performed in the Idaho National Engineering and Environmental Laboratory (INEEL) SCADA test bed as part of the Critical Infrastructure Test Range Development Program, which is funded by the U.S. Department of Energy; Office of Energy Assurance (DOE/OEA). This report is a nonproprietary version of the report sent to ABB that identified specific issues related to the security vulnerabilities in the ABB SCADA/EMS system. Work was performed by specialists in the fields of control system development, networking, software engineering, and cybersecurity. This

88

The Communication Networks Guidebook for Intelligent Distribution Systems  

Science Conference Proceedings (OSTI)

This report describes communication networks relevant to electric utility applications for utility members. Details to further an understanding of functional and technical capabilities and comparisons of such networks are included. The report also provides a detailed, systematic analysis of issues directly related to the integration, interoperability, and performance of the communication networks for distribution applications. The focus is to better understand the behavior of individual networks, especia...

2010-03-31T23:59:59.000Z

89

Increasing the resilience of critical SCADA systems using peer-to-peer overlays  

Science Conference Proceedings (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, ...

Daniel Germanus; Abdelmajid Khelil; Neeraj Suri

2010-06-01T23:59:59.000Z

90

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure  

Science Conference Proceedings (OSTI)

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. ... Keywords: Computer Science, Security

Jack Wiles

2008-07-01T23:59:59.000Z

91

A Protocol for Multimedia CDMA Personal Communication Networks  

Science Conference Proceedings (OSTI)

In this paper, a joint CDMA/TDMA protocol has been proposed for integrated video-phone/voice/data traffic in personal communication networks (PCN). The videophone service is implemented according to H.261 standard. The concept of dynamic boundary ... Keywords: CDMA, MAC, multimedia, personal communication networks, protocol

P. Xie; E. Gunawan; B. H. Soong; C. B. Soh

2000-09-01T23:59:59.000Z

92

A survey of communication/networking in Smart Grids  

Science Conference Proceedings (OSTI)

Smart Grid is designed to integrate advanced communication/networking technologies into electrical power grids to make them ''smarter''. Current situation is that most of the blackouts and voltage sags could be prevented if we have better and faster ... Keywords: Communication, Control and management, Networking, Optimization, QoS, Smart Grid

Jingcheng Gao; Yang Xiao; Jing Liu; Wei Liang; C.L. Philip Chen

2012-02-01T23:59:59.000Z

93

On Nonblocking Folded-Clos Networks in Computer Communication Environments  

E-Print Network (OSTI)

--Folded-Clos networks, also referred to as fat-trees, have been widely used as interconnects in large scale high, and establishes nonblocking conditions. Keywords-Clos Networks; fat-tree; nonblocking; computer communications; I. INTRODUCTION Clos networks and their variations such as folded-Clos (also referred to as fat-trees) have been

Yuan, Xin

94

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

95

SCADA architecture with mobile remote components  

Science Conference Proceedings (OSTI)

With the advent of new technologies, the demand of connecting IT systems to the Internet is increasing. This is also the case for Control systems specifically SCADA (Supervisory Control and Data Acquisition) systems. Traditional SCADA systems are connected ... Keywords: SCADA, control systems, mobility, remote components

Tai-Hoon Kim

2010-08-01T23:59:59.000Z

96

Collaborative Gain in Resource Sharing Communication Networks  

E-Print Network (OSTI)

We consider a Multi-Hopping communication network of users transmitting information on a shared medium with limited resources, e.g., limited time and limited bandwidth. Users are able to transmit, receive, retrieve and reply information in a collaborative way. We assume that two users collaborate (one acts as a relay for another) only if, as a result of the collaboration, they gain more capacity, save on resources or save power. We perform optimal resource allocation for three problems: 1) maximizing the capacity given limited resource and energy, 2) minimizing the resource usage given capacity and energy and 3) minimizing energy usage given capacity and resources. By comparing the collaboration gain as a function of the channels and available energies, one may decide either to collaborate or not and select a collaborator among candidates. We find the conditions in which acting as relay results in capacity gain, resource or power saving. We show that a significant gain is attained only if the channel energy g...

Akhavan-Astaneh, Saeed

2007-01-01T23:59:59.000Z

97

Communication Reliability in Network on Chip Designs  

E-Print Network (OSTI)

The performance of low latency Network on Chip (NoC) architectures, which incorporate fast bypass paths to reduce communication latency, is limited by crosstalk induced skewing of signal transitions on link wires. As a result of crosstalk interactions between wires, signal transitions belonging to the same flit or bit vector arrive at the destination at different times and are likely to violate setup and hold time constraints for the design. This thesis proposes a two-step technique: TransSync- RecSync, to dynamically eliminate packet errors resulting from inter-bit-line transition skew. The proposed approach adds minimally to router complexity and involves no wire overhead. The actual throughput of NoC designs with asynchronous bypass designs is evaluated and the benefits of augmenting such schemes with the proposed design are studied. The TransSync, TransSync-2-lines and RecSync schemes described here are found to improve the average communication latency by 26%, 20% and 38% respectively in a 7X7 mesh NoC with asynchronous bypass channel. This work also evaluates the bit-error ratio (BER) performance of several existing crosstalk avoidance and error correcting schemes and compares them to that of the proposed schemes. Both TransSync and RecSync scheme are dynamic in nature and can be switched on and off on-the-fly. The proposed schemes can therefore be employed to impart unequal error protection (UEP) against intra-flit skewing on NoC links. In the UEP, a larger fraction of the energy budget is spent in providing protection to those parts of the data being transmitted on the link which have a higher priority, while expending smaller effort in protecting relatively less important parts of the data. This allows us to achieve the prescribed level of performance with lower levels of power. The benefits of the presented technique are illustrated using an H.264 video decoder system-on-chip (SoC) employing NoC architecture. We show that for Akyio test streams transmitted over 3mm long link wires, the power consumption can be reduced by as much as 20% at the cost of an acceptable degradation in average peak signal to noise ratio (PSNR) with UEP.

Kumar, Reeshav

2011-08-01T23:59:59.000Z

98

National SCADA Test Bed Fact Sheet  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. Increasing use of common software and operating systems and connection to public telecommunication networks and the Internet have made systems more reliable and efficient-but also more

99

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING  

E-Print Network (OSTI)

Development and validation of time-series synthesizers of rain attenuation for Ka-band and Q=V-band satellite communication systems

Laurent Castanet; Carlo Riva; Uwe-carsten Fiebig; Max Van De Kamp; Antonio Martellucci

2007-01-01T23:59:59.000Z

100

CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

Marco Carvalho; Richard Ford

2012-05-14T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

2010-12-16T23:59:59.000Z

102

Securing SCADA communication using hybrid cryptographyNOTE FROM ACM: It has been determined that the authors of this article plagiarized the contents from a previously published paper. Therefore ACM has shut off access to this paper.  

Science Conference Proceedings (OSTI)

NOTE FROM ACM: It has been determined that the authors of this article plagiarized the contents from a previously published paper. Therefore ACM has shut off access to this paper. For further information, contact the ACM ... Keywords: cryptography algorithms, security issues, supervisory control and data acquisition (SCADA)

AAmir Shahzad; Shahrulniza Musa

2012-02-01T23:59:59.000Z

103

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

104

"Supervisory Control and Data Acquisition (SCADA) Systems." The...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

105

National SCADA Test Bed Consequence Modeling Tool | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National SCADA Test Bed Consequence Modeling Tool National SCADA Test Bed Consequence Modeling Tool This document presents a consequence modeling tool that provides, for asset...

106

National SCADA Test Bed Enhancing control systems security in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of...

107

On optical communications networks and wideband network architecture  

Science Conference Proceedings (OSTI)

The optical networks of today are just beginning to realize their abilities to carry a tremendous amount of information in the forms of voice, data and video signals on a single optical fiber. However, many challenges lay ahead as designers and system ... Keywords: Optical networks, Wave division multiplexing and optical switching, Wideband network architecture

K Makki; J Broussard; N Pissinou

2000-05-01T23:59:59.000Z

108

The Communication Networks Guidebook for Intelligent Transmission Systems  

Science Conference Proceedings (OSTI)

A Smart Grid will provide a wide-area view of system performance and health and anticipate events and take action to avoid disruptions or minimize their impact. With these capabilities, utilities can improve reliability and optimize utilization of assets. Robust and highly integrated communications and distributed computing infrastructures will be needed to create a Smart Grid. However, there are numerous communication technologies; and identifying, analyzing, and selecting the right networks to support ...

2009-12-21T23:59:59.000Z

109

Network Communication as a Service-Oriented Capability  

Science Conference Proceedings (OSTI)

In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as"services" -- they can be allocated and used with service guarantees that allows them to be integrated into systems that perform complex tasks. Network communication is currently not a service -- it is provided, in general, as a"best effort" capability with no guarantees and only statistical predictability. In order for Grids (and most types of systems with widely distributed components) to be successful in performing the sustained, complex tasks of large-scale science -- e.g., the multi-disciplinary simulation of next generation climate modeling and management and analysis of the petabytes of data that will come from the next generation of scientific instrument (which is very soon for the LHC at CERN) -- networks must provide communication capability that is service-oriented: That is it must be configurable, schedulable, predictable, and reliable. In order to accomplish this, the research and education network community is undertaking a strategy that involves changes in network architecture to support multiple classes of service; development and deployment of service-oriented communication services, and; monitoring and reporting in a form that is directly useful to the application-oriented system so that it may adapt to communications failures. In this paper we describe ESnet's approach to each of these -- an approach that is part of an international community effort to have intra-distributed system communication be based on a service-oriented capability.

Johnston, William; Johnston, William; Metzger, Joe; Collins, Michael; Burrescia, Joseph; Dart, Eli; Gagliardi, Jim; Guok, Chin; Oberman, Kevin; O'Conner, Mike

2008-01-08T23:59:59.000Z

110

Int. J. Communication Networks and Distributed Systems, Vol. 6, No. 1, 2011 59 Copyright 2011 Inderscience Enterprises Ltd.  

E-Print Network (OSTI)

have cryptographic capabilities while others not 9 accommodate to different SCADA protocols: SCADA are trusted in our protocol. 4 sSCADA protocol suite The sSCADA protocol suite is proposed to overcome transmission which are not acceptable to SCADA protocols. Semantic security property (Goldwasser and Michali

Wang, Yongge

111

Link power coordination for energy conservation in complex communication networks  

E-Print Network (OSTI)

Communication networks consume huge, and rapidly growing, amount of energy. However, a lot of the energy consumption is wasted due to the lack of global link power coordination in these complex systems. This paper proposes several link power coordination schemes to achieve energy-efficient routing by progressively putting some links into energy saving mode and hence aggregating traffic during periods of low traffic load. We show that the achievable energy savings not only depend on the link power coordination schemes, but also on the network topologies. In the random network, there is no scheme that can significantly outperform others. In the scale-free network, when the largest betweenness first (LBF) scheme is used, phase transition of the networks' transmission capacities during the traffic cooling down phase is observed. Motivated by this, a hybrid link power coordination scheme is proposed to significantly reduce the energy consumption in the scale-free network. In a real Internet Service Provider (ISP)'...

Zhang, Guo-Qiang

2010-01-01T23:59:59.000Z

112

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

113

E-print Network: Research Communications for Scientists and Engineers  

Office of Scientific and Technical Information (OSTI)

E-print Web Log E-print Web Log E-print Network E-print Network About Search Browse by Discipline Find Scientific Societies Receive E-print Alerts Contact Us Help Home Site Map OSTI DOE For Immediate Release January 10, 2005 For more information, contact: Alison Buckholtz, SPARC, alison@arl.org Susan Tackett, OSTI, tacketts@osti.gov DOE/OSTI's E-PRINT NETWORK SELECTED AS SPARC PARTNER Provides Research Communications and Full-Text Searching of Science Websites and Databases Washington, DC -SPARC (the Scholarly Publishing and Academic Resources Coalition) today announced that the E-print Network, a free service of the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI), has been chosen as a SPARC Scientific Communities partner. The selection recognizes the contribution of the E-print Network to expanded availability and use of open-access scientific and technical research on the Internet.

114

A new communication paradigm for mobile TV over cellular network Dr. Hongxiang Li  

E-Print Network (OSTI)

A new communication paradigm for mobile TV over cellular network Dr. Hongxiang Li Electrical terrestrial TV network and propose a new mobile TV communication paradigm that is radically different from and communication theory (i.e., Network Coding and Dirty Paper Coding) in the new mobile TV system design. Despite

115

On the use of ultrasonic waves as a communications medium in biosensor networks  

Science Conference Proceedings (OSTI)

In this paper, the problem ofwireless communications in human tissue is addressed for biosensor network applications. Today's offered solutions involve the usage of RF communication systems, which have shown to provide adequate performance to ensure ... Keywords: biosensor networks, body area networks, channel model, implanted sensors, ultrasonic communications

Yiannis Davilis; Antonis Kalis; Antonis Ifantis

2010-05-01T23:59:59.000Z

116

Defenses against Covert-Communications in Multimedia and Sensor Networks  

E-Print Network (OSTI)

Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the dissertation looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This dissertation also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert-communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption.

Jainsky, Julien Sebastien 1981-

2012-12-01T23:59:59.000Z

117

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. (2009)  

E-Print Network (OSTI)

in fiber-optics continuous- variable quantum key distribution. Physical Review 2005; 72: 050303(R). 37 and quantum cryptography services in optical burst switching networks Yuhua Chen1, , Pramode K. Verma2 University, Stillwater, OK 74078, U.S.A. Summary Optical burst switching (OBS) is the most promising optical

Kak, Subhash

118

Challenges for Efficient Communication in Underwater Acoustic Sensor Networks  

E-Print Network (OSTI)

Abstract — Ocean bottom sensor nodes can be used for oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. Moreover, Unmanned or Autonomous Underwater Vehicles (UUVs, AUVs), equipped with sensors, will find application in exploration of natural undersea resources and gathering of scientific data in collaborative monitoring missions. Underwater acoustic networking is the enabling technology for these applications. Underwater Networks consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area. In this paper, several fundamental key aspects of underwater acoustic communications are investigated. Different architectures for two-dimensional and three-dimensional underwater sensor networks are discussed, and the underwater channel is characterized. The main challenges for the development of efficient networking solutions posed by the underwater environment are detailed at all layers of the protocol stack. Furthermore, open research issues are discussed and possible solution approaches are outlined. I.

Ian F. Akyildiz; Dario Pompili; Tommaso Melodia

2004-01-01T23:59:59.000Z

119

Communication synthesis of networks-on-chip (NoC)  

E-Print Network (OSTI)

The emergence of networks-on-chip (NoC) as the communication infrastructure solution for complex multi-core SoCs presents communication synthesis challenges. This dissertation addresses the design and run-time management aspects of communication synthesis. Design reuse and the infeasibility of Intellectual Property (IP) core interface redesign, requires the development of a Core-Network Interface (CNI) which allows them to communicate over the on-chip network. The absence of intelligence amongst the NoC components, entails the introduction of a CNI capable of not only providing basic packetization and depacketization, but also other essential services such as reliability, power management, reconguration and test support. A generic CNI architecture providing these services for NoCs is proposed and evaluated in this dissertation. Rising on-chip communication power costs and reliability concerns due to these, motivate the development of a peak power management technique that is both scalable to dierent NoCs and adaptable to varying trac congurations. A scalable and adaptable peak power management technique - SAPP - is proposed and demonstrated. Latency and throughput improvements observed with SAPP demonstrate its superiority over existing techniques. Increasing design complexity make prediction of design lifetimes dicult. Post SoC deployment, an on-line health monitoring scheme, is essential to maintain con- dence in the correct operation of on-chip cores. The rising design complexity and IP core test costs makes non-concurrent testing of the IP cores infeasible. An on-line scheme capable of managing IP core test in the presence of executing applications is essential. Such a scheme ensures application performance and system power budgets are eciently managed. This dissertation proposes Concurrent On-Line Test (COLT) for NoC-based systems and demonstrates how a robust implementation of COLT using a Test Infrastructure-IP (TI-IP) can be used to maintain condence in the correct operation of the SoC.

Bhojwani, Praveen Sunder

2007-12-01T23:59:59.000Z

120

Communication synthesis of networks-on-chip (noc)  

E-Print Network (OSTI)

The emergence of networks-on-chip (NoC) as the communication infrastructure solution for complex multi-core SoCs presents communication synthesis challenges. This dissertation addresses the design and run-time management aspects of communication synthesis. Design reuse and the infeasibility of Intellectual Property (IP) core interface redesign, requires the development of a Core-Network Interface (CNI) which allows them to communicate over the on-chip network. The absence of intelligence amongst the NoC components, entails the introduction of a CNI capable of not only providing basic packetization and depacketization, but also other essential services such as reliability, power management, reconguration and test support. A generic CNI architecture providing these services for NoCs is proposed and evaluated in this dissertation. Rising on-chip communication power costs and reliability concerns due to these, motivate the development of a peak power management technique that is both scalable to dierent NoCs and adaptable to varying trac congurations. A scalable and adaptable peak power management technique - SAPP - is proposed and demonstrated. Latency and throughput improvements observed with SAPP demonstrate its superiority over existing techniques. Increasing design complexity make prediction of design lifetimes dicult. Post SoC deployment, an on-line health monitoring scheme, is essential to maintain con- dence in the correct operation of on-chip cores. The rising design complexity and IP core test costs makes non-concurrent testing of the IP cores infeasible. An on-line scheme capable of managing IP core test in the presence of executing applications is essential. Such a scheme ensures application performance and system power budgets are eciently managed. This dissertation proposes Concurrent On-Line Test (COLT) for NoC-based systems and demonstrates how a robust implementation of COLT using a Test Infrastructure-IP (TI-IP) can be used to maintain condence in the correct operation of the SoC.

Bhojwani, Praveen Sunder

2007-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

NBP RFI: Communications Requirements- Comments of Great River...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and 11 electric generating facilities. The IP network transports data information for SCADA, mobile radio voice traffic, metering information, corporate data and voice traffic...

122

Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges  

E-Print Network (OSTI)

Smart grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this work we present our vision on smart grid from the perspective of wireless communications and networking technologies. We present wireless communication and networking paradigms for four typical scenarios in the future smart grid and also point out the research challenges of the wireless communication and networking technologies used in smart grid

Fang, Xi; Xue, Guoliang

2011-01-01T23:59:59.000Z

123

The Role of Communication and Trust in Global Virtual Teams: A Social Network Perspective  

Science Conference Proceedings (OSTI)

The importance of communication and trust in the context of global virtual teams has been noted and reiterated in the information systems (IS) literature. Yet precisely how communication and trust influence certain outcomes within virtual teams remains ... Keywords: Communication, Distributed Teams, Global Virtual Teams, Hybrid Teams, Individual Performance, Mediation, Networked Individualism, Social Network Analysis, Trust

Saonee Sarker; Manju Ahuja; Suprateek Sarker; Sarah Kirkeby

2011-07-01T23:59:59.000Z

124

Design of QoS in Intelligent Communication Environments Based on Neural Network  

Science Conference Proceedings (OSTI)

Due to the latest developments in communication and computing, smart services and applications are being deployed for various applications such as entertainment, health care, smart homes, security and surveillance. In intelligent communication environments, ... Keywords: Congestion control, High-speed computer network, Intelligent communication environments, Neural network

N. Xiong; L. T. Yang; Y. Yang; J. H. Park; G. Wei

2011-01-01T23:59:59.000Z

125

An approach for location area planning in a personal communication services network (PCSN)  

Science Conference Proceedings (OSTI)

This paper deals with an approach for planning location areas (LAs) in a personal communication services network (PCSN) to be overlaid on an existing wired network. Given the average speed of mobile terminals, the number of mobile switching centers (MSCs), ... Keywords: CMRs, Call-to-mobility ratios, LA, LU, PCSN, cost optimization, heuristic, location area, location update, paging, personal communication services network

P. S. Bhattacharjee; D. Saha; A. Mukherjee

2004-07-01T23:59:59.000Z

126

A testbed for secure and robust SCADA systems  

Science Conference Proceedings (OSTI)

The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a ...

Annarita Giani; Gabor Karsai; Tanya Roosta; Aakash Shah; Bruno Sinopoli; Jon Wiley

2008-07-01T23:59:59.000Z

127

Intermediate SCADA Security Training Course Slides (September 2006)  

Energy.gov (U.S. Department of Energy (DOE))

Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to...

128

Scada: Supervisory Control And Data Acquisition, 4th edition  

Science Conference Proceedings (OSTI)

Supervisory control and data acquisition (SCADA) technology has evolved over the past 30 years as a method of monitoring and controlling large processes. This reference book offers overviews of SCADA's component technologies, as well as details necessary ...

Stuart A. Boyer

2009-06-01T23:59:59.000Z

129

A peer-to-peer overlay approach for emergency mobile ad hoc network based multimedia communications  

Science Conference Proceedings (OSTI)

Overlay networks are located on top of the physical network and are generally favored for the implementation of peer-to-peer (P2P) networks providing services such as voice over IP (VoIP) communications. The operation of the overlay network results in ... Keywords: ad hoc networking, emergency, overlays, peer-to-peer

Grant P. Millar; Tipu A. Ramrekha; Christos Politis

2009-09-01T23:59:59.000Z

130

Communication network modeling for simulation of wide area monitoring and control applications in power systems.  

E-Print Network (OSTI)

??This thesis has mainly focused on investigating the effect of communication network on the power system operation. The main objective of this research has been… (more)

MUDIYANSELAGE, SARANGA D. EDIRISINGHE DISSANAYAKE TENNAKOON

2013-01-01T23:59:59.000Z

131

Impact of communication infrastructure on forwarding in pocket switched networks  

E-Print Network (OSTI)

Recently, it has been established on multiple experimental data sets that human contact processes exhibit heavy-tailed inter-event distributions. This characteristic makes it difficult to transport data with a finite transfer time in a network of mobile devices, relying on opportunistic contacts only. Using various experimental data sets, we analyze how different types of communication infrastructure impact the feasibility of data transfers among mobile devices. The first striking result is that the heavy tailed nature of the contact processes persists after infrastructure is introduced. We establish experimentally that infrastructure improves significantly multiple opportunistic contact properties, relevant to opportunistic forwarding algorithms. We discuss how infrastructure can be used to design simpler and more efficient (in terms of delay and number of hops) opportunistic forwarding algorithms. In addition to this, for the first time in a study like this, the communication pattern of nodes is taken into account in the analysis. We also show that node pairs that have a real-life history of communication have contact properties that are better for opportunistic message forwarding to each other than what other node pairs have.

Anders Lindgren; Christophe Diot; James Scott

2006-01-01T23:59:59.000Z

132

Exponential random graph modeling of communication networks to understand organizational crisis  

Science Conference Proceedings (OSTI)

In recent social network studies, exponential random graph models have been used comprehensively to model global social network structure as a function of their local features. In this study, we describe the exponential random graph models and demonstrate ... Keywords: email communications, exponential random graph models, organizational disintegration, p* models, social networks, statistical models for social networks

Jafar Hamra; Shahadat Uddin; Liaquat Hossain

2011-05-01T23:59:59.000Z

133

The DRL Underwater Sensor Network: Supporting Dual Communications, Sensing, and Mobility  

E-Print Network (OSTI)

The DRL Underwater Sensor Network: Supporting Dual Communications, Sensing, and Mobility Iuliu Vasilescu, Carrick Detweiler and Daniela Rus We propose to demonstrate the underwater sensor network are anchored with weights and form a static underwater network. This network self-localizes a range based 3D

Farritor, Shane

134

Increasing capacity of baseband digital data communication networks  

DOE Patents (OSTI)

This invention provides broadband network capabilities for baseband digital collision detection transceiver equipment for communication between a plurality of data stations by affording simultaneous transmission of multiple channels over a broadband pass transmission link such as a coaxial cable. Thus, a fundamental carrier wave is transmitted on said link, received at local data stations and used to detect signals on different baseband channels for reception. For transmission the carrier wave typically is used for segregating a plurality of at least two transmission channels into typically single sideband upper and lower pass bands of baseband bandwidth capability adequately separated with guard bands to permit simple separation for receiving by means of pass band filters, etc.

Frankel, Robert S. (Centereach, NY); Herman, Alexander (Hertzelia, IL)

1985-01-01T23:59:59.000Z

135

Cellular Controlled Short-Range Communication for Cooperative P2P Networking  

Science Conference Proceedings (OSTI)

This article advocates a novel communication architecture and associated collaborative framework for future wireless communication systems. In contrast to the dominating cellular architecture and the upcoming peer-to-peer architecture, the new approach ... Keywords: Energy efficiency, Medium access control, Peer-to-peer networking, Wireless cooperative networking

Frank H. Fitzek; Marcos Katz; Qi Zhang

2009-01-01T23:59:59.000Z

136

Simulator for PROSIMOS (priority communications for critical situations on mobile networks) service  

Science Conference Proceedings (OSTI)

Public Mobile Networks (PMN) are at the very heart of nowadays communications. They are not only used by individuals, but also by a large number of Agencies committed to Security and Safety. This will be even more common in near future, when cities become ... Keywords: EMSOA enabler technology, business models, priority communications, wireless emergency communications

Roberto Gimenez; Inmaculada Luengo; Anna Mereu; Diego Gimenez; Rosa Ana Casar; Judith Pertejo; Salvador Díaz; Jose F. Monserrat; Vicente Osa; Javier Herrera; Maria Amor Ortega; Iñigo Arizaga

2010-12-01T23:59:59.000Z

137

Energy-aware real-time communication in wireless ad-hoc micro sensors network  

Science Conference Proceedings (OSTI)

Perfect functioning not only at hardware level but also at software level design is indispensable to quench the thirst of an ideal real time communication. From software perspective, in the timeless sensitive communication context, Real-Time Operating ... Keywords: energy awareness, real-time communication, real-time operating system, sensor network

Sohail Jabbar; Abid Ali Minhas

2009-12-01T23:59:59.000Z

138

Real-time var control by SCADA  

SciTech Connect

This paper outlines the operation and advantages of the SCADA capacitor control called CAPCON, developed by the Virginia Electric and Power Company (Virginia Power). CAPCON is used to control vars system-wide by switching substation capacitor banks based on real-time var and voltage data instead of the traditional time clock method.

Girotti, T.B.; Tweed, N.B.; Houser, N.R. (Virginia Power Co., Richmond, VA (USA))

1990-02-01T23:59:59.000Z

139

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)  

E-Print Network (OSTI)

.1 SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2 A Classification of Legacy SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . 7 3.3 Formalizing BITW SCADA protocols, including DNP3-Serial and Modbus/RTU, at data rates up to 115200 bps. The SEL-3021

140

Improving Security of Oil Pipeline SCADA Systems Using Service-Oriented Architectures  

Science Conference Proceedings (OSTI)

Oil pipeline Supervisory Control and Data Acquisition (SCADA) systems monitor and help control pipes transporting both crude and refined petroleum products. Typical SCADA system architectures focus on centralized data collection and control --- however, ... Keywords: SCADA, architecture, petroleum, pipeline, security, services

Nary Subramanian

2008-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Advanced Network Toolkit for Assessments and Remote Mapping ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tool Maps Control System Networks to Help Implement Cyber Security Standards National SCADA Test Bed Enhancing control systems security in the energy sector TOP 10...

142

Smartgrid supervisory control and data acquisition (SCADA) system security issues and counter measures.  

E-Print Network (OSTI)

??This project discusses security issues, countermeasures and research issues in the Supervisory Control And Data Acquisition (SCADA) system. SCADA system is used in power sector… (more)

Sunku Ravindranath, Raksha

2010-01-01T23:59:59.000Z

143

Use of SCADA Data for Failure Detection in Wind Turbines  

SciTech Connect

This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

2011-10-01T23:59:59.000Z

144

Introduction SCADA Security for Managers and Operators | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA...

145

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems ?  

E-Print Network (OSTI)

We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide the necessary security within timing constraints; the previous solution that does provide the necessary security is not BITW. At a comparable hardware cost, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency. A microcontroller prototype of our

Patrick P. Tsang; Sean W. Smith

2007-01-01T23:59:59.000Z

146

Network Communication as a Service-Oriented Capability  

E-Print Network (OSTI)

21] “Measuring Circuit Based Networks,” Joe Metzger, ESnet.http://www.es.net/pub/esnet- doc/index.html#JM021307 [22] “ESnet Network Measurements,” Joe Metzger,

Johnston, William

2008-01-01T23:59:59.000Z

147

Microsoft Word - Johnston.IOS.Network Communication as a Service...  

NLE Websites -- All DOE Office Websites (Extended Search)

diagnostic transparency, etc. * Robustness and stability (network reliability) are essential. Large-scale investment in science facilities and experiments makes network...

148

Microsoft Word - SCADA CX.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2010 8, 2010 REPLY TO ATTN OF: Claire Bingaman KEC-4 SUBJECT: Environmental Clearance Memorandum James Hall Project Manager - TPC-TPP-4 Proposed Action: SCADA Upgrades at BPA's Hungry Horse, Bonneville, and Grand Coulee Substations Budget Information: Hungry Horse: WO# 00246171, Task 01 Bonneville: WO# 00246173, Task 01 Grand Coulee: WO# 00246244, Task 01 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B4.6 Additions or modifications to electric power facilities that would not affect the environment beyond the previously developed facility area.... Location: Grant County, Washington Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA proposes to install Supervisory Control and Data Acquisition (SCADA) upgrades at the

149

The design of a transceiver for packet video communication on an integrated services network  

Science Conference Proceedings (OSTI)

This article describes the architecture of a special Packet Video Transceiver, which is appropriate for the communication of broadcast television signals between two stations of an Integrated Services Network. The system performs line processing and ...

A. S. Andreatos; E. N. Protonotarios; G. De Grandi

1993-10-01T23:59:59.000Z

150

The use of MIMO technologies in wireless communication networks  

Science Conference Proceedings (OSTI)

This paper provides a detailed picture on computer networks and especially on wireless networks, focusing on specific characteristics of wireless systems. By using MIMO technology (Multiple Input Multiple Output), network logon ca be realized at distances ... Keywords: IEEE standards, MIMO technology, routers, wireless networks

Marius-Constantin O. S. Popescu; Nikos E. Mastorakis

2009-12-01T23:59:59.000Z

151

Sparse Multichannel Estimation Algorithm for Cooperative Underwater Acoustic Communication Networks  

E-Print Network (OSTI)

Introduction: Cooperative Underwater Acoustic Communicationsgain for wireless and underwater network in interference-

Richard, Nick; Mitra, Urbasi

2007-01-01T23:59:59.000Z

152

Weather condition double checking in internet SCADA environment  

Science Conference Proceedings (OSTI)

The function of SCADA is collecting of the information, transferring it back to the central site, carrying out any necessary analysis and control and then displaying that information on a number of operator screens. Systems automatically control the ... Keywords: API, SCADA, control systems, telecontrol

Tai-Hoon Kim

2010-08-01T23:59:59.000Z

153

Double checking weather condition in internet SCADA environment  

Science Conference Proceedings (OSTI)

The function of SCADA is collecting of the information, transferring it back to the central site, carrying out any necessary analysis and control and then displaying that information on a number of operator screens. Systems automatically control the ... Keywords: API, SCADA, control systems, teleControl

Rosslin John Robles; Tai-Hoon Kim

2010-05-01T23:59:59.000Z

154

Implementation of a fuzzy-based level control using SCADA  

Science Conference Proceedings (OSTI)

This paper presents a SCADA (supervisory control and data acquisition) control via PLC (programmable logic controller) for a fluid level control system with fuzzy controller. For this purpose, a liquid level control set and PLC have been assembled together. ... Keywords: Fuzzy logic, Level control, Programmable logic controller, SCADA

Zafer Aydogmus

2009-04-01T23:59:59.000Z

155

A survey SCADA of and critical infrastructure incidents  

Science Conference Proceedings (OSTI)

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can ... Keywords: critical infrastructure, cyber attack, cyber security, information assurance and security, scada, security

Bill Miller; Dale Rowe

2012-10-01T23:59:59.000Z

156

Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines  

Science Conference Proceedings (OSTI)

The Internet has become essential to all aspects of modern life, and thus the consequences of network disruption have become increasingly severe. It is widely recognised that the Internet is not sufficiently resilient, survivable, and dependable, and ... Keywords: Availability, Communication network, Critical infrastructure, Defence, Defense, Dependability, Detection, Diagnosis, Disruption tolerance, Fault tolerance, Future Internet resilience, Metrics, Performability, Recovery, Refinement, Reliability, Remediation, Restoration, Security, Survivability

James P. G. Sterbenz; David Hutchison; Egemen K. Çetinkaya; Abdul Jabbar; Justin P. Rohrer; Marcus Schöller; Paul Smith

2010-06-01T23:59:59.000Z

157

Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are increasingly being used in applications where the communication between nodes needs to be protected from eavesdropping and tampering. Such protection is typically provided using techniques from symmetric key cryptography. ... Keywords: Energy efficient key distribution, Key management, Key refreshment, Sensor network security, Symmetric cryptography

Issa Khalil; Saurabh Bagchi; Ness Shroff

2007-04-01T23:59:59.000Z

158

Communication Delay in Wormhole-Switched Tori Networks under Bursty Workloads  

Science Conference Proceedings (OSTI)

Workloads generated by the real-world parallel applications that are executed on a multicomputer have a strong effect on the performance of its interconnection network—the hardware fabric supporting communication among individual processors. Existing ... Keywords: interconnection networks, message latency, multicomputers, multimedia applications, performance modeling/analysis

G. Min; M. Ould-khaoua

2003-08-01T23:59:59.000Z

159

Line-plane broadcasting in a data communications network of a parallel computer  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

Archer, Charles J. (Rochester, MN); Berg, Jeremy E. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-11-23T23:59:59.000Z

160

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

SSN comments to DOE NBP RFI communications requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comms Requirements Comms Requirements 12 July 2010 1/6 Michael Jung // Policy Director // Silver Spring Networks 888.406.1882 // mjung@silverspringnet.com (1) What are the current and future communications needs of utilities, including for the deployment of new Smart Grid applications, and how are these needs being met? Utilitiesʼ current communications needs are diverse, with considerable variation from utility to utility. Current communications needs that are related to, but generally pre-date, smart grid include: * System control and data acquisition (SCADA) * Drive-by meter reading * One-way direct load control * Mobile workforce management * Demand response, dynamic pricing for commercial/industrial customers In the smart grid-enabled future, utility smart grid applications will require

162

Towards a Metric for Communication Network Vulnerability to ...  

Science Conference Proceedings (OSTI)

... power law model where the value of a network is ... between the value function and the critical subset of ... a backup one), and the attacker has a budget ...

2012-06-07T23:59:59.000Z

163

Wireless communication network architecture for the smart grid applications.  

E-Print Network (OSTI)

??Masters Research - Master of Philosophy (MPhil) Smart grid is a novel initiative in the power electric distribution network that aims to provide an intelligent,… (more)

Castellanos, German

2012-01-01T23:59:59.000Z

164

About efficiency in wireless communication frameworks on vehicular networks  

Science Conference Proceedings (OSTI)

Nowadays, the Intelligent Transport Systems (ITS) attract many attentions. ITS applications would indeed increase the road safety and the transport efficiency, limit the impact of the vehicles on the environment, improve the overall productivity... However, ... Keywords: ITS, VANET, distributed framework, dynamic ad hoc networks, embedded architecture, road experiments, vehicular networks

Bertrand Ducourthial

2007-08-01T23:59:59.000Z

165

Network-Centric Quantum Communications with Application to Critical Infrastructure Protection  

E-Print Network (OSTI)

Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: quantum identification; verifiable quantum secret sharing; multi-party authenticated key establishment, including group keying; and single-fiber quantum-secured communications that can be applied as a security retrofit/upgrade to existing optical fiber installations. A demonstration that NQC meets the challenging simultaneous latency and security requirements of electric grid control communications, which cannot be met without compromises using conventional cryptography, is described.

Richard J. Hughes; Jane E. Nordholt; Kevin P. McCabe; Raymond T. Newell; Charles G. Peterson; Rolando D. Somma

2013-05-01T23:59:59.000Z

166

Temporal motifs reveal homophily, gender-specific patterns and group talk in mobile communication networks  

E-Print Network (OSTI)

Electronic communication records provide detailed information about temporal aspects of human interaction. Previous studies have shown that individuals' communication patterns have complex temporal structure, and that this structure has system-wide effects. In this paper we use mobile phone records to show that interaction patterns involving multiple individuals have non-trivial temporal structure that cannot be deduced from a network presentation where only interaction frequencies are taken into account. We apply a recently introduced method, temporal motifs, to identify interaction patterns in a temporal network where nodes have additional attributes such as gender and age. We then develop a null model that allows identifying differences between various types of nodes so that these differences are independent of the network based on interaction frequencies. We find gender-related differences in communication patters, and show the existence of temporal homophily, the tendency of similar individuals to partic...

Kovanen, Lauri; Kertész, János; Saramäki, Jari

2013-01-01T23:59:59.000Z

167

Frontal Rainfall Observation by a Commercial Microwave Communication Network  

Science Conference Proceedings (OSTI)

A novel approach for reconstruction of rainfall spatial–temporal dynamics from a wireless microwave network is presented. It employs a stochastic space–time model based on a rainfall advection model, assimilated using a Kalman filter. The ...

Artem Zinevich; Hagit Messer; Pinhas Alpert

2009-07-01T23:59:59.000Z

168

Design considerations for a fiber optic communications network for power systems  

Science Conference Proceedings (OSTI)

The design of a fiber optic communication network for monitoring and control in power systems is discussed. It is shown that by appropriate choice of protocols, a fault-tolerant system can be built that operates in any arbitrary configuration. Since the network is based on fiber optics, it can be made fast enough for substation monitoring and control. In this application, a relatively small number of cables is required to implement a high reliability system. The network can also be used for distribution automation. In this application the network is required to reach all parts of the power system, and the fiber cable itself becomes a significant fraction of the cost of communications. However, since many applications can be supported at once, the cost per function can be reasonable.

Kirkham, H.; Johnston, A.R. [Jet Propulsion Lab., Pasadena, CA (United States); Allen, G.D. [American Electric Power Service Corp., Columbus, OH (United States)

1993-08-01T23:59:59.000Z

169

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi-tions, responsibilities, references, revision history, enforce-ment, and exceptions for various subjects relevant for system security. It covers topics including the overall security risk management program, data security, platforms,

170

Development of extensible virtual instruments for SCADA applications  

Science Conference Proceedings (OSTI)

This paper presents an architecture and design of a solution for virtual instrumentation in SCADA systems. The aim of this approach is to propose a way to design virtual instrumentation based on software components, which ensures uniform, consistent ...

Traian Turc; Adrian Gligor; Cristian Dumitru; Alexandru Morar

2010-05-01T23:59:59.000Z

171

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

172

Deployable aerial communication networks: challenges for futuristic applications  

Science Conference Proceedings (OSTI)

Aerial (or airborne) telecommunications have been investigated for three decades through the design and the evaluation of stratospheric platforms able to offer multiple types of wireless services. More recently though, a wide range of lower altitude ... Keywords: aerial networks, high altitude platforms, low altitude platforms, unmanned aerial vehicles

Laurent Reynaud; Tinku Rasheed

2012-10-01T23:59:59.000Z

173

Study of location management for next generation personal communication networks  

Science Conference Proceedings (OSTI)

The main target of location management is to maintain location of users while minimizing the system operation. The process consists of location update, paging, and database consideration. The location update and paging manages the user-network interaction ... Keywords: centralized database (CDB), distributed database (DDB), location area scheme, location update, timer-based update strategy, velocity paging (VP)

Teerapat Sanguankotchakorn; Panuvit Wibullanon

2005-03-01T23:59:59.000Z

174

Bounding Communication Energy Overhead in Parallel Networks with Power-Delay Scalability  

Science Conference Proceedings (OSTI)

We propose the energy scalability and power-delay product scalability as new metrics for calculating and estimating boundaries on the energy overhead of parallel processing systems. Because both properties consider network topology and the algorithm ... Keywords: energy overhead, communication overhead, energy scalability, power-delay scalability

James S. Tandon; Steven E. Butner

2008-12-01T23:59:59.000Z

175

Locating hardware faults in a data communications network of a parallel computer  

DOE Patents (OSTI)

Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

Archer, Charles J. (Rochester, MN); Megerian, Mark G. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-01-12T23:59:59.000Z

176

DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOEOE...

177

Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security  

E-Print Network (OSTI)

and important trend toward open SCADA protocols, allowing third party tools to manipulate the data. More than

Heidemann, John

178

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

179

Hallmark Project Commercialization of the Secure SCADA Communications...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system...

180

Research on memory access vulnerability analysis technique in SCADA protocol implementation  

Science Conference Proceedings (OSTI)

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ... Keywords: SCADA protocol implementation, dynamic analysis, memory access vulnerability

Fang Lan; Wang Chunlei; He Ronghui

2010-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Follow-up Review of Control and Accountability of Emergency Communication Network Equipment, INS-L-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control and Control and Accountability of Emergency Communication Network Equipment INS-L-12-01 December 2011 Department of Energy Washington, DC 20585 December 21, 2011 MEMORANDUM FOR THE ASSOCIATE ADMINISTRATOR FOR EMERGENCY OPERATIONS FROM: Sandra D. Bruce Assistant Inspector General for Inspections Office of Inspector General SUBJECT: INFORMATION: Inspection Report on "Follow-up Review of Control and Accountability of Emergency Communication Network Equipment" BACKGROUND The Department of Energy's (Department) Emergency Communications Network (ECN) mission is to enable the exchange of classified and unclassified voice, data and video capabilities during national or Department emergencies. ECN connects approximately 80 remote Department sites

182

Design and fabrication of ring networks for high-speed communications between computers (multiprocessing systems)  

SciTech Connect

The results are presented of a design study of several possible implementations of a multinode pierce-type ring communications network. Using commercially available components, one ECL and two different TTL implementations were compared on the basis of performance (maximum system clock rate) and fabrication cost per node for a large ring. The ECL implementation was demonstrated to have a factor of nine better performance than the LS-TTL implementation, for a cost increase of only a few percent. A demonstration five-node ring network was then fabricated and tested; the performance results confirm the performance estimates. 16 references.

Gilbert, B.K.; Schwab, D.J.; Kinter, T.M.

1983-01-01T23:59:59.000Z

183

Microsoft Word - Johnston.IOS.Network Communication as a Service-Oriented Capability.5.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication as a Service-Oriented Communication as a Service-Oriented Capability William JOHNSTON, Joe METZGER, Mike O'CONNOR, Michael COLLINS, Joseph BURRESCIA, Eli DART, Jim GAGLIARDI, Chin GUOK, and Kevin OBERMAN ESnet, Lawrence Berkeley National Laboratory Abstract. In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as "services" - they can be allocated and used with service guarantees that allows them to be integrated into systems that perform complex tasks. Network communication is currently not a service - it is provided, in general, as a "best effort" capability with no guarantees and only statistical predictability. In order for Grids (and most types of systems with widely

184

JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, DECEMBER 2007 1 Energy-Efficiency and Transmission Strategy Selection in  

E-Print Network (OSTI)

for the same throughput and bit error rate (BER) target. However, concerning the analysis of energy efficiency information. Energy analysis on cooperative MIMO in sensJOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, DECEMBER 2007 1 Energy

Dai, Huaiyu

185

Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling  

Science Conference Proceedings (OSTI)

As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical ...

Francis Minhthang Bui; Dimitrios Hatzinakos

2008-01-01T23:59:59.000Z

186

On improving communication in emergency response at network and organizational levels  

E-Print Network (OSTI)

A variety of communication technologies have been deployedto a good choice of communication technology. This effortincorporates communication technology and organizational

Dilmaghani, Raheleh B.

2010-01-01T23:59:59.000Z

187

Monitoring of the electrical distribution network operation  

Science Conference Proceedings (OSTI)

Distribution network operation is determined by the behaviour of the load. To plan and analyse the electrical network operation, precise modelling of load is substantial. The adequate approach to understand the electrical distribution network operation ... Keywords: SCADA, busloads, distribution network, load monitoring, mathematical model of load, network operation monitoring, state estimation

Jako Kilter; Mati Meldorf

2009-02-01T23:59:59.000Z

188

October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security  

E-Print Network (OSTI)

SCADA protocols: SCADA devices are man- ufactured by different vendors with different proprietary:49 World Scientific Review Volume - 9in x 6in ywangsmartgrid SCADA Security 13 3.3. sSCADA protocol suite The sSCADA protocol suite19 is proposed to overcome the challenges that we have discussed

Wang, Yongge

189

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:546554  

E-Print Network (OSTI)

in fiber-optics continuous- variable quantum key distribution. Physical Review 2005; 72: 050303(R). 37 framework for integrated classical and quantum cryptography services in optical burst switching networks of Computer Science, Oklahoma State University, Stillwater, OK 74078, U.S.A. Summary Optical burst switching

Kak, Subhash

190

Effects of Spatial and Temporal Heterogeneity of Channel Bandwidth on Performance of Individual Messages in Heterogeneous Communication Networks  

Science Conference Proceedings (OSTI)

Channel bandwidth available for a message on a communication network varies with time and link. This variation (heterogeneity) can have a significant effect on performance of an individual message and also that of the network as a whole. Therefore, it ... Keywords: Channel bandwidth, End-to-end delay, Multipath data transfer, Path selection, Spatial heterogeneity, Temporal heterogeneity, Throughput

Soo-Young Lee; Jun Huang

2004-08-01T23:59:59.000Z

191

WILEY WCMC SPECIAL ISSUE ON UNDERWATER SENSOR NETWORKS (INVITED) 1 Prospects and Problems of Wireless Communication for Underwater  

E-Print Network (OSTI)

WILEY WCMC SPECIAL ISSUE ON UNDERWATER SENSOR NETWORKS (INVITED) 1 Prospects and Problems of Wireless Communication for Underwater Sensor Networkss Lanbo Liu, Shengli Zhou, and Jun-Hong Cui The work ISSUE ON UNDERWATER SENSOR NETWORKS (INVITED) 2 Abstract This paper reviews the physical fundamentals

Cui, Jun-Hong

192

Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned

193

Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic  

Science Conference Proceedings (OSTI)

Networked critical infrastructures are of national importance. However, such infrastructures are running 24/7. The supervisory control and data acquisition system (SCADA) of the critical infrastructure will generate enormous network traffic continuously. ... Keywords: Critical infrastructure, Sampling, Traffic analysis

Abdun Naser Mahmood; Jiankun Hu; Zahir Tari; Christopher Leckie

2010-07-01T23:59:59.000Z

194

Communication and Energy Efficiency in Visual Sensor Networks for People Localization  

Science Conference Proceedings (OSTI)

This paper addresses the communication and energy efficiency in collaborative visual sensor networks (VSNs) for people localization, a challenging computer vision problem of its own. We focus on the design of a light-weight and energy efficient solution where people are localized based on distributed camera nodes integrating the so-called certainty map generated at each node, that records the target non-existence information within the camera s field of view. We first present a dynamic itinerary for certainty map integration where not only each sensor node transmits a very limited amount of data but that a limited number of camera nodes is involved. Then, we perform a comprehensive analytical study to evaluate communication and energy efficiency between different integration schemes, i.e., centralized and distributed integration. Based on results obtained from analytical study and real experiments, the distributed method shows effectiveness in detection accuracy as well as energy and bandwidth efficiency.

Karakaya, Mahmut [ORNL; Qi, Hairong [ORNL

2012-01-01T23:59:59.000Z

195

Design of an Enhanced Handover Algorithm Based on a New Adaptive SR-ARQ for Next-Generation Mobile Communication Networks  

Science Conference Proceedings (OSTI)

Next-generation mobile communication networks are supposed to provide various high capacity multimedia services to mobile users using various kinds of access networks. Among them, the WiNGS system developed by ETRI as one of 4G mobile system provides ... Keywords: Mobile communication networks, handover performance, SR-ARQ, reordering, WiNGS system

Man Kyu Park; Yun Chul Choi; Jae Yone Lee; Byung Chul Kim; Dae Young Kim; Jae Ho Kim

2008-12-01T23:59:59.000Z

196

Communication Systems Chair of Communication Systems  

E-Print Network (OSTI)

, porn sites, web services, ... :-)) #12;8 | 28 Communication Systems network insecurity Inner and intra

Schindelhauer, Christian

197

Microsoft Word - Utilities Form Consortium to Fund SCADA Testing_v3.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. The utilities, located in the United States and Australia, will fund SCADA system assessments at NSTB testing facilities at Idaho National Laboratory. The consortium began taking shape last fall at an ABB User Group meeting, where ABB and some of its energy management system (EMS) customers asked other ABB system users to join in on

198

DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National SCADA Test Bed Program Multi-Year Plan National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure, and facilitate recovery from disruptions to the energy supply. The Plan covers the planning period of fiscal year 2008 to 2013. DOE National SCADA Test Bed Program Multi-Year Plan More Documents & Publications DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

199

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

200

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Review Article: A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network  

Science Conference Proceedings (OSTI)

A robust communication infrastructure is the touchstone of a smart grid that differentiates it from the conventional electrical grid by transforming it into an intelligent and adaptive energy delivery network. To cope with the rising penetration of renewable ... Keywords: AMI, AMR, ANSI, Applications, Communication architecture, Communication technologies, DAP, DER, DR, ESI, EV, FAN, GOOSE, HAN, HV, IEC, IED, IEEE, IP, M2M, MDMS, MU, NAN, P&C, PMU, QoS, SMV, SOC, Smart grid, Traffic requirements, WAMS, WLAN, WMN, WiMAX

Reduan H. Khan; Jamil Y. Khan

2013-02-01T23:59:59.000Z

202

QoS-driven adaptive resource allocation for mobile wireless communications and networks  

E-Print Network (OSTI)

Quality-of-service (QoS) guarantees will play a critically important role in future mobile wireless networks. In this dissertation, we study a set of QoS-driven resource allocation problems for mobile wireless communications and networks. In the first part of this dissertation, we investigate resource allocation schemes for statistical QoS provisioning. The schemes aim at maximizing the system/network throughput subject to a given queuing delay constraint. To achieve this goal, we integrate the information theory with the concept of effective capacity and develop a unified framework for resource allocation. Applying the above framework, we con-sider a number of system infrastructures, including single channel, parallel channel, cellular, and cooperative relay systems and networks, respectively. In addition, we also investigate the impact of imperfect channel-state information (CSI) on QoS pro-visioning. The resource allocation problems can be solved e±ciently by the convex optimization approach, where closed-form allocation policies are obtained for different application scenarios. Our analyses reveal an important fact that there exists a fundamental tradeoff between throughput and QoS provisioning. In particular, when the delay constraint becomes loose, the optimal resource allocation policy converges to the water-filling scheme, where ergodic capacity can be achieved. On the other hand, when the QoS constraint gets stringent, the optimal policy converges to the channel inversion scheme under which the system operates at a constant rate and the zero-outage capacity can be achieved. In the second part of this dissertation, we study adaptive antenna selection for multiple-input-multiple-output (MIMO) communication systems. System resources such as subcarriers, antennas and power are allocated dynamically to minimize the symbol-error rate (SER), which is the key QoS metric at the physical layer. We propose a selection diversity scheme for MIMO multicarrier direct-sequence code- division-multiple-access (MC DS-CDMA) systems and analyze the error performance of the system when considering CSI feedback delay and feedback errors. Moreover, we propose a joint antenna selection and power allocation scheme for space-time block code (STBC) systems. The error performance is derived when taking the CSI feedback delay into account. Our numerical results show that when feedback delay comes into play, a tradeoff between performance and robustness can be achieved by dynamically allocating power across transmit antennas.

Tang, Jia

2006-12-01T23:59:59.000Z

203

A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA  

Science Conference Proceedings (OSTI)

For more efficient and economical management of substations under SCADA (Supervisory Control and Data Acquisition) systems, the concept of a smart substation has been introduced using intelligent and ubiquitous IT (Information Technology) techniques. ... Keywords: Embedded platform, Intelligent system, SCADA system, Smart substations, Ubiquitous

Hak-Man Kim; Jong-Joo Lee; Myong-Chul Shin; Seok-Soo Kim

2009-11-01T23:59:59.000Z

204

A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control  

Science Conference Proceedings (OSTI)

SCADA is a set of systems with a higher automatic level of the long-distance pipeline. When the sub-transmission stations in the state of full load, the automatic control of sub-output capacity is quite stable working at certain settings. However, partly ... Keywords: PID control, SCADA system, small flow, sub-output control

Youqiang Guo; Zijun Zhang; Xuezhu Pei

2009-07-01T23:59:59.000Z

205

Investigation of broadband over power line channel capacity of shipboard power system cables for ship communications networks  

E-Print Network (OSTI)

Broadband over Power Line (BPL) technology has garnered significant attention lately due to recent advancements in solid state technologies and channel coding schemes. The successful application of BPL technology for in-home automation and networking has led to suggestions of applying BPL in other systems including ships. The application of BPL technology using the Shipboard Power System (SPS) as a potential communications network for ship automation systems has been proposed, to achieve recent U.S. Navy ship management concepts geared toward reducing ship manning while improving operational efficiency. This thesis presents an analytical model developed to examine the channel response characteristics and estimated throughput capacity of SPS cables. The work used a multiconductor transmission line theory based approach to model the channel response of SPS distribution lines and estimated the channel throughput capacity using a “water-filling” communication technique. This work found that BPL using the SPS holds a strong potential for use as a communications network for ship communication systems.

Akinnikawe, Ayorinde

2008-12-01T23:59:59.000Z

206

Metrics for the National SCADA Test Bed Program  

Science Conference Proceedings (OSTI)

The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

2008-12-05T23:59:59.000Z

207

Bayesian networks  

E-Print Network (OSTI)

g causal independence in Bayesian network inference. Journalworld ap- plications of Bayesian networks. Communications ofJensen. An Introduction to Bayesian Networks. Springer, New

Judea Pearl

2011-01-01T23:59:59.000Z

208

Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure  

Science Conference Proceedings (OSTI)

The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

ZAKRAJSEK, M.F.

2000-10-17T23:59:59.000Z

209

Supervisory Control and Data Acquisition System (SCADA) Substation C3S4 Acceptance Test Procedure  

Science Conference Proceedings (OSTI)

The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

ZAKRAJSEK, M.F.

2000-10-17T23:59:59.000Z

210

Degree project in Communication Systems  

E-Print Network (OSTI)

physical devices utilizing common SCADA protocols. The testbed can then be used to analyze how cyber

Maguire Jr., Gerald Q.

211

Communication protocols for underwater data collection using a robotic sensor network  

E-Print Network (OSTI)

We examine the problem of collecting data from an underwater sensor network using an autonomous underwater vehicle (AUV). The sensors in the network are equipped with acoustic modems that provide noisy, range-limited ...

Singh, Hanumant

2013-05-01T23:59:59.000Z

212

Design and implementation of a framework for persistent identification and communication in emerging networks  

Science Conference Proceedings (OSTI)

The Internet Protocol (IP) is currently used to provide inter-networking among heterogeneous access networks. However, the evolution of and the innovation within these networks is greatly hindered by the geographical and topological rigidness of the ... Keywords: mobility, persistent identification, testbed

Joud S. Khoury; Henry Jerez; Luca De Cicco

2008-03-01T23:59:59.000Z

213

Discovery of email communication networks from the Enron corpus with a genetic algorithm using social network analysis  

Science Conference Proceedings (OSTI)

During the legal investigation of Enron Corporation, the U.S. Federal Regulatory Commission (FERC) made public a substantial data set of the company's internal corporate emails. This work presents a genetic algorithm (GA) approach to social network analysis ...

Garnett Wilson; Wolfgang Banzhaf

2009-05-01T23:59:59.000Z

214

Advances in integrating autonomy with acoustic communications for intelligent networks of marine robots  

E-Print Network (OSTI)

Autonomous marine vehicles are increasingly used in clusters for an array of oceanographic tasks. The effectiveness of this collaboration is often limited by communications: throughput, latency, and ease of reconfiguration. ...

Schneider, Toby Edwin

2013-01-01T23:59:59.000Z

215

A framework for longitudinal influence measurement between communication content and social networks  

Science Conference Proceedings (OSTI)

Artificial intelligence has a long history of learning from domain problems ranging from chess to jeopardy. In this work, we look at a problem stemming from social science, namely, how do social relationships influence communication content and vice ...

Shenghui Wang; Paul Groth

2011-07-01T23:59:59.000Z

216

Discrete-Time Queueing Systems and Their Application to Analysis of Optical-Fiber Communication Networks  

Science Conference Proceedings (OSTI)

A double-bus optical-fiber communication system is studied. The request and transmission buses are modeled by a priority and cyclic queueing system, respectively. Their probabilistic-time characteristics are determined. Theoretical results are compared ...

A. A. Nazarov; S. U. Urazbaeva

2002-12-01T23:59:59.000Z

217

A bit more to it: scholarly communication forums as socio-technical interaction networks  

Science Conference Proceedings (OSTI)

In this article, we examine the conceptual models that help us understand the development and sustainability of scholarly and professional communication forums on the Internet, such as conferences, pre-print servers, field-wide data sets, and collaboratories. ...

Rob Kling; Geoffrey McKim; Adam King

2003-01-01T23:59:59.000Z

218

E-print Network Web Log News: Research Communications for Scientists...  

Office of Scientific and Technical Information (OSTI)

Description This Web Log provides the latest information about changes to E-print Network - its content, features, and functionality - as well as news or information of interest...

219

Provenance-based trustworthiness assessment in sensor networks  

Science Conference Proceedings (OSTI)

As sensor networks are being increasingly deployed in decision-making infrastructures such as battlefield monitoring systems and SCADA (Supervisory Control and Data Acquisition) systems, making decision makers aware of the trustworthiness of the collected ... Keywords: data provenance, sensor network, trustworthiness

Hyo-Sang Lim; Yang-Sae Moon; Elisa Bertino

2010-09-01T23:59:59.000Z

220

Error-resilient video communications over CDMA networks with a bandwidth constraint  

E-Print Network (OSTI)

allocation for wire- less video over CDMA networks,” IEEERegunathan, and K. Rose, “Video coding with op- timal inter/channel coding for scalable video over DS-CDMA multipath

Shen, Yushi Dr.; Cosman, P C Prof.; Milstein, L B Prof.

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

An energy-efficient communication system for ad hoc wireless and sensor networks  

E-Print Network (OSTI)

Existing ad hoc wireless and sensor network systems often trade off energy against performance. As such, it is hard to find a single deployable system that supports high data rates while maintaining energy-efficient ...

Tetteh, William Nii Adjetey

2007-01-01T23:59:59.000Z

222

Moving HomePlug to Industrial Applications with Power-Line Communication Network  

E-Print Network (OSTI)

Home networking is becoming an attractive application not only for the Internet access but also for home automation. Being a high-speed and dominant standard presently, HomePlug has an important role in home LAN connecting ...

Zhao, Z.W.

223

Wireless Networking to Support Data and Voice Communication Using Spread Spectrum Technology in The Physical Layer  

E-Print Network (OSTI)

Wireless networking is rapidly growing and becomes an inexpensive technology which allows multiple users to simultaneously access the network and the internet while roaming about the campus. In the present work, the software development of a wireless LAN(WLAN) is highlighted. This WLAN utilizes direct sequence spread spectrum (DSSS) technology at 902MHz RF carrier frequency in its physical layer. Cost effective installation and antijaming property of spread spectrum technology are the major advantages of this work.

Dhar, Sourav

2007-01-01T23:59:59.000Z

224

Leveraging coherent distributed space-time codes for noncoherent communication in relay networks via training  

Science Conference Proceedings (OSTI)

For point to point multiple input multiple output systems, Dayal-Brehler-Varanasi have proved that training codes achieve the same diversity order as that of the underlying coherent space time block code (STBC) if a simple minimum mean squared error ... Keywords: cooperative diversity, distributed space time block code, noncoherent communication, training

G. Susinder Rajan; B. Sundar Rajan

2009-02-01T23:59:59.000Z

225

Protocols for purpose-restricted anonymous communications in IP-based wireless networks  

Science Conference Proceedings (OSTI)

Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications (e.g. net counselling and whistle blowing). On the other hand, anonymity may be abused for various malicious activities (e.g. redistribution ... Keywords: Anonymous authentication, Anonymous communication, IP address assignment, Password-based authenticated key exchange, Sender anonymity

Hanane Fathi; SeongHan Shin; Kazukuni Kobara; Hideki Imai

2008-09-01T23:59:59.000Z

226

Wireless networks: from the physical layer to communication, computing, sensing and control [Book Review  

Science Conference Proceedings (OSTI)

This book is a mixture of lectures held on the island on Capri in Italy in 2004 in which not only the currently important but also possible future characteristics of wireless communications are presented. This book should be treated as a helpful reference ...

K. Kosek

2007-11-01T23:59:59.000Z

227

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

228

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

229

Field Area Network Demo - September 2013 Advisors Meeting - Presentations and Minutes (Hydro One Networks)  

Science Conference Proceedings (OSTI)

The field area network (FAN) concept is emerging as a ubiquitous, high-performance, secure, reliable network providing "last mile" acquisition (SCADA) and advanced metering infrastructure (AMI)systems, as well as network access services for advanced distribution management and automation, distributed energy resources, and any future smart grid applications requiring connectivity from within and beyond the distribution substation.One objective of this project is to establish ...

2013-11-13T23:59:59.000Z

230

An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions  

E-Print Network (OSTI)

that aim to achieve those goals. For example a grid connected so- lar powered house may need to take in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission to deliver robust plan selection. We examine the approach in the context of a simplified power supply

Liu, Weiru

231

Security of industrial sensor network-based remote substations in the context of the Internet of Things  

Science Conference Proceedings (OSTI)

The main objective of remote substations is to provide the central system with sensitive information from critical infrastructures, such as generation, distribution or transmission power systems. Wireless sensor networks have been recently applied in ... Keywords: Industrial Control Networks, Internet of Things, Supervisory Control and Data Acquisition (SCADA) Systems, The Internet, Wireless Sensor Networks

Cristina Alcaraz; Rodrigo Roman; Pablo Najera; Javier Lopez

2013-05-01T23:59:59.000Z

232

NIST Posts Comments on Public Safety Communications ...  

Science Conference Proceedings (OSTI)

NIST Posts Comments on Public Safety Communications Network. From NIST Tech Beat: November 22, 2011. ...

2011-11-22T23:59:59.000Z

233

Estimating link availability and timing delays in ethernet-based networks  

Science Conference Proceedings (OSTI)

Availability is an important requirement in networks used to control physical processes such as those present in the U.S. Critical Infrastructure, also known as Process Control Systems (PCS) or Supervisory Control and Data Acquisition (SCADA) systems. ... Keywords: network performance, security, substation automation

Jeyasingam Nivethan; Mauricio Papa; Peter J. Hawrylak

2013-01-01T23:59:59.000Z

234

Network  

NLE Websites -- All DOE Office Websites (Extended Search)

network - launched in November 2012. The network was built in collaboration with Internet2, an advanced network, which connects the nation's research universities. Leveraging...

235

FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL  

E-Print Network (OSTI)

the SCADA networks protocols. Here the critical features of some common SCADA protocols will be presented

Dutertre, Bruno

236

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

237

Airborne wireless communication systems, airborne communication methods, and communication methods  

SciTech Connect

An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

Deaton, Juan D. (Menan, ID); Schmitt, Michael J. (Idaho Falls, ID); Jones, Warren F. (Idaho Falls, ID)

2011-12-13T23:59:59.000Z

238

RECA: a ring-structured energy-efficient clustering architecture for robust communication in wireless sensor networks  

Science Conference Proceedings (OSTI)

Clustering methods have shown their promising effects in the conservation of energy in Wireless Sensor Networks (WSNs). In this paper, we present a Ring-structured Energy-efficient Clustering Architecture (RECA) for WSNs to prolong ... Keywords: WSNs, cluster head management, energy efficiency, load balancing algorithms, network lifetime, ring-structured clustering, simulation, wireless networks, wireless sensor networks

Guanfeng Li; Taieb Znati

2007-04-01T23:59:59.000Z

239

Video communications system  

DOE Patents (OSTI)

A video communications system having at least one command network formed by a combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for point-to-point real-time teleconferencing. 4 figs.

Smith, R.L.

1990-03-09T23:59:59.000Z

240

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Quantum Enabled Security (QES) for Optical Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled Security (QES), a revolutionary new cybersecurity capability using quantum (single-photon) communications integrated with optical communications to provide a strong, innate, security foundation at the photonic layer for optical fiber networks. July 10, 2013 Quantum Enabled Security (QES) for Optical Communications Available for thumbnail of Feynman Center (505) 665-9090 Email Quantum Enabled Security (QES) for Optical Communications Applications: Secure communication over optical or free space networks Financial networks Transparent access networks: fiber to the home (FTTH); fiber to the

242

Cooperative Communication over Underwater Acoustic Channels.  

E-Print Network (OSTI)

??As diverse and data-heavy underwater applications emerge, demanding requirements are further imposed on underwater wireless communication systems. Future underwater wireless communication networks might consist of… (more)

Aldharrab, Suhail Ibrahim

2013-01-01T23:59:59.000Z

243

Topics in network communications  

E-Print Network (OSTI)

capacities by introducing parallel edges. For a given ?nite alphabet, an edge function is a mapping,

Cannons, Jillian Leigh

2008-01-01T23:59:59.000Z

244

A communication-optimizing middleware for efficient wireless communication in rural environments  

Science Conference Proceedings (OSTI)

The realization of wireless communication in rural environments suffers from long distances, unknown node mobility and discontinuous communication paths. Combination of delay-tolerant mobile ad-hoc networks and infrastructure-based mobile communications ... Keywords: DTNs, MANETs, cellular networks, communication predictions, communication-optimizing middleware, machine learning, rural environments

Frank Nordemann

2012-12-01T23:59:59.000Z

245

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Béla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

246

Public Safety Broadband Network  

Science Conference Proceedings (OSTI)

... EMNTG) performs RF network analysis and optimization of ... Network analyses can be used to predict ... of an incident area communication scenario. ...

2012-02-22T23:59:59.000Z

247

Securing group communication in dynamic, disadvantaged networks : implementation of an elliptic-curve pairing-based cryptography library  

E-Print Network (OSTI)

This thesis considers the problem of securing communication among dynamic groups of participants without relying on an online group keying service. As a solution, we offer the design and implementation of the Public Key ...

Figueiredo, Rob

2006-01-01T23:59:59.000Z

248

Microsoft Word - 4March08_SCADA_Procurement.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL is a U.S. Department of Energy National Laboratory INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance INL/EXT-06-11516 Revision 3 Cyber Security Procurement Language for Control Systems Version 1.8 Sponsor: Department of Homeland Security, National Cyber Security Division Contributors: Idaho National Laboratory, State of New York Multi-State Information Sharing Analysis Center (MSISAC), System Audit Network Security (SANS) February 2008 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency thereof, nor any employee, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for any third party's use, or the results of such use, or any

249

National SCADA Test Bed Substation Automation Evaluation Report  

Science Conference Proceedings (OSTI)

Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

Kenneth Barnes; Briam Johnson

2009-10-01T23:59:59.000Z

250

Field Area Network Demo - October 2013 Vendor Forum Presentations (Palo Alto)  

Science Conference Proceedings (OSTI)

The field area network (FAN) concept is emerging as a ubiquitous, high-performance, secure, reliable network providing "last mile" backhaul service for distribution supervisory control and data acquisition (SCADA) and advanced metering infrastructure (AMI) systems, as well as network access services for advanced distribution management and automation, distributed energy resources, and any future smart grid applications requiring connectivity from within and beyond the distribution ...

2013-11-13T23:59:59.000Z

251

Field Area Network Demo - May 2013 Advisors Meeting: Presentations and Minutes (United Illuminating)  

Science Conference Proceedings (OSTI)

The field area network (FAN) concept is emerging as a ubiquitous, high-performance, secure, reliable network providing "last mile" acquisition (SCADA) and advanced metering infrastructure (AMI)systems, as well as network access services for advanced distribution management and automation, distributed energy resources, and any future smart grid applications requiring connectivity from within and beyond the distribution substation.One objective of this project is to establish ...

2013-11-13T23:59:59.000Z

252

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 10, OCTOBER 2011 3343 Cognitive Multiple Access Network with  

E-Print Network (OSTI)

Access Network with Outage Margin in the Primary System Behrouz Maham, Member, IEEE, Petar Popovski 197565/V30 entitled "Theoretical Foundations of Mobile Flexible Networks ­ THEFONE." B. Maham is currently with the School of Electrical and Computer Engineering, University of Tehran (e-mail: b.maham

Zhou, Xiangyun "Sean"

253

Atacama: An Open FPGA-Based Platform for Mixed-Criticality Communication in Multi-segmented Ethernet Networks  

Science Conference Proceedings (OSTI)

Ethernet is widely recognized as an attractive networking technology for modern distributed real-time systems. However, standard Ethernet components require specific modifications and hardware support to provide strict latency guarantees necessary for ... Keywords: Real-Time Ethernet, safety-critical systems, open-source hardware design, multi-segmented networks

Gonzalo Carvajal, Miguel Figueroa, Robert Trausmuth, Sebastian Fischmeister

2013-04-01T23:59:59.000Z

254

Demo: Achieving robust sensor networks through close coordination between narrow-band power line and low-power wireless communications  

Science Conference Proceedings (OSTI)

Sensor networks are increasingly available in home and industry automation applications. The use of battery-powered wireless sensor nodes eases network deployment, but the dynamic wireless medium, along with energy and bandwidth constraints, poses a ... Keywords: PLC, coordination, hybrid, robustness, wireless

Yanjun Sun; Sandeep Bhadra; Soon-Hyeok Choi; Minghua Fu; Xiaolin Lu

2011-11-01T23:59:59.000Z

255

Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations  

E-Print Network (OSTI)

activities based on communication technology choices: early-of what their communications technology choices may revealall avail- able communications technology use records over

Drozdova, Katya; Samoilov, Michael

2010-01-01T23:59:59.000Z

256

Lighting Group: Controls and Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Communications Communications Controls and Communications The Controls and Communications research activity investigates how digital technologies, such as Bluetooth, can be applied to building lighting control systems to increase building efficiency and improve occupant comfort and productivity. Projects range from embedded device networks applied to building lighting systems, to WiFi and environmental sensing and monitoring. light switch Current Projects IBECS (Integrated Building Environmental Communications System) Wireless Lighting Controls (with DUST Networks) HPCBS Advanced Digital Controls Building Control Systems Integration Completed Projects CEC Public Interest Energy Research (PIER) Projects 450 Golden Gate Project New Publications Standardizing Communication Between Lighting Devices: A Role for

257

Evaluating Equipment Performance Using SCADA/PMS Data for Thermal Utility Plants - Case Studies  

E-Print Network (OSTI)

The equipment in cogeneration plants and thermal energy plants such as gas tubing generators, boilers, steam turbine generators, chillers and cooling towers are often critical to satisfying building needs. Their actual energy performance is very important when implementing the continuous Commissioning (CC) process. The actual performance can be used to develop optimal operation strategies, to conduct thermo-economy analysis, to perform fault diagnostics, and so forth. Because the standard performance test such as chiller test per ARI standard and cooling tower test per CTI standard often require the equipment to be operated under specific test conditions; however, in reality the dynamics of the system load normally do not allow the equipment to be operated under such conditions. It is costly and even impossible to take such critical equipment offline for test purposes. In order to facilitate the plant processes and on-going operations, utility plants usually employ Supervisory Control and Data Acquisition Plant Monitoring Systems (SCADA/PMS) or Energy Management and Control Systems (EMCS) to monitor sensors, display data, control equipment, activate alarms and log information. However, the utilization and interpretation of the logged data are often at the minimum level especially in old systems without automatic operation and control optimization capabilities. Through three case studies, this paper presents methods for evaluating equipment performance using SCADA/PMS or EMSC data.

Deng, X.; Chen, Q.; Xu, C.

2007-01-01T23:59:59.000Z

258

Sustainable Security for Infrastructure SCADA Jason Stamp Phil Campbell Jennifer DePoy John Dillinger William Young  

E-Print Network (OSTI)

, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04- 941 Sustainable Security for Infrastructure SCADA Jason Stamp Phil Campbell Jennifer DePoy John of these systems, but this approach does not foster effective security because of the fluid IT environment

259

Molecular Communication for Nanomachines Using Intercellular Calcium Signaling  

E-Print Network (OSTI)

Molecular Communication for Nanomachines Using Intercellular Calcium Signaling Tadashi Nakano, Irvine, Irvine, CA 92697, USA Abstract -- Molecular communication is engineered biological communication the design of a molecular communication system based on intercellular calcium signaling networks. This paper

Baykal, Buyurman

260

Smart Grid Communications System Blueprint  

Science Conference Proceedings (OSTI)

Telecommunications operators are well versed in deploying 2G and 3G wireless networks. These networks presently support the mobile business user and/or retail consumer wishing to place conventional voice calls and data connections. The electrical power industry has recently commenced transformation of its distribution networks by deploying smart monitoring and control devices throughout their networks. This evolution of the network into a ‘smart grid’ has also motivated the need to deploy wireless technologies that bridge the communication gap between the smart devices and information technology systems. The requirements of these networks differ from traditional wireless networks that communications operators have deployed

Adrian Clark; Chris Pavlovski

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Static and dynamic virtual channel allocation for high performance, in-order communication in on-chip networks  

E-Print Network (OSTI)

Most routers in on-chip interconnection networks (OCINs) have multiple virtual channels (VCs) to mitigate the effects of head-of-line blocking. Multiple VCs necessitate VC allocation schemes since packets or flows must ...

Shim, Keun Sup

2010-01-01T23:59:59.000Z

262

Network-Adaptive Video Communication Using Packet Path Diversity and Rate-Distortion Optimized Reference Picture Selection  

Science Conference Proceedings (OSTI)

In this paper, we present error-resilient Internet video transmission using path diversity and rate-distortion optimized reference picture selection. Under this scheme, the optimal packet dependency is determined adapting to network characteristics and ... Keywords: Path diversity, error-resilient video coding, low-latency, network-adaptive video coding, rate-distortion optimization, reference picture selection, source-channel coding, video streaming

Yi J. Liang; Eric Setton; Bernd Girod

2005-11-01T23:59:59.000Z

263

The Development of Social E-Enterprises, Mobile Communication and Social Networks: A Social Cognitive Perspective of Technological Innovation  

Science Conference Proceedings (OSTI)

As technological innovations have progressed, the ability of social enterprises to find creative solutions to social problems in the global economy has increased. Social electronic enterprises e-enterprises contribute to the well-being of society by ... Keywords: E-Enterprise, Mobile Communication, Online Communities, Social Entrepreneurs, Social Entrepreneurship, Social Software, Social Value, Technological Innovation

Vanessa Ratten

2013-07-01T23:59:59.000Z

264

On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network  

E-Print Network (OSTI)

-duplex links requires the total system data capacity be divided between the generated channels, which can lead of sensor grids, ad hoc communications links to covert forces, or positive control of unmanned, forward-deployed weapons systems. However, the capacity limitations and extreme propagation delays of acoustic

Xie, Geoffrey

265

IEEE Network May/June 20126 0890-8044/12/$25.00 2012 IEEE he dramatic penetration of wireless communications,  

E-Print Network (OSTI)

A unique characteristic of the smart grid is the integration of distributed renewable energy sources (e- cations, and study its potentials in the smart grid. We first identi- fy the motivations in exploiting is identified and discussed. After that, a CM2M communications architecture for the smart grid is presented

Zhang, Yan

266

Wireless Underwater Communications  

Science Conference Proceedings (OSTI)

The depths of the oceans have a high potential for future industrial development and applications. Robotic autonomous systems will greatly depend on a reliable communications channel with operators and equipment either performing joint operations or ... Keywords: Acoustic communications, Channel modelling, Networking mechanisms, Underwater

J. Poncela; M. C. Aguayo; P. Otero

2012-06-01T23:59:59.000Z

267

552 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 2, FEBRUARY 2011 On the Capacity of WDM Passive Optical Networks  

E-Print Network (OSTI)

--To lower costs, WDM PONs may share the usage of wavelengths, transmitters, and receivers among ONUs are with the Advanced Networking Laboratory, Department of Electrical and Computer Engineering, New Jersey Institute in the number of ONUs. Many architectures have been proposed to lower the cost of WDM PONs since the first WDM

Ansari, Nirwan

268

Hawaii International Conference on Systems Sciences, January 2002, Hawaii. IEEE Growth and Propagation of Disturbances in a Communication Network Model  

E-Print Network (OSTI)

, distribution systems, and electrical power transmission grids which run near their operational limits, can of the probability distribution function of this data is suggestive of SOC type dynamics. Although sophisticated distribution network models with different levels of complexity are examined and compared to each other

Newman, David

269

Graceful network state migrations  

Science Conference Proceedings (OSTI)

A significant fraction of network events (such as topology or route changes) and the resulting performance degradation stem from premeditated network management and operational tasks. This paper introduces a general class of Graceful Network State Migration ... Keywords: communication system operations and management, computer network management, network maintenance, network upgrade

Saqib Raza; Yuanbo Zhu; Chen-Nee Chuah

2011-08-01T23:59:59.000Z

270

Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System  

SciTech Connect

We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

2006-01-01T23:59:59.000Z

271

Network protection with service guarantees  

E-Print Network (OSTI)

With the increasing importance of communication networks comes an increasing need to protect against network failures. Traditional network protection has been an "all-or-nothing" approach: after any failure, all network ...

Kuperman, Gregory

2013-01-01T23:59:59.000Z

272

Robust Offshore Networks for Oil and Gas Facilities.  

E-Print Network (OSTI)

??Offshore Communication Networks utilize multiple of communication technologies to eradicate any possibilities of failures, when the network is operational. Offshore Oil and Gas platforms and… (more)

Maheshwari, D.

2010-01-01T23:59:59.000Z

273

Network scheduling for data archiving applications in sensor networks  

Science Conference Proceedings (OSTI)

Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An example is FPS, an adaptive power scheduling algorithm that combines slotted ...

Yong Yao; S. M. Nazrul Alam; Johannes Gehrke; Sergio D. Servetto

2006-09-01T23:59:59.000Z

274

Predicting faculty job centrality in communication  

Science Conference Proceedings (OSTI)

Data from 1,581 faculty members affiliated with 98 doctoral-granting Communication programs in the United States were analyzed to determine normative publication rates and predictors of position centrality in the faculty hiring network. The Communication ... Keywords: Advisor, Centrality, Communication, Hiring, Network, Publications

Thomas Hugh Feeley; Katherine Hart Lavail; George A. Barnett

2011-05-01T23:59:59.000Z

275

Optimization Online - Energy Savings in Wireless Mesh Networks in ...  

E-Print Network (OSTI)

Jan 24, 2011 ... Abstract: Energy consumption of communication systems is ... Keywords: Energy savings, wireless Mesh Networks, Green networking.

276

Large wireless networks : fundamental limits and design issues  

E-Print Network (OSTI)

design and operation of wireless networks? Unfortunately notWireless Communications: Scaling Laws and Optimal Operation”,

Minero, Paolo

2010-01-01T23:59:59.000Z

277

Report: Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

COMMUNICATIONS COMMUNICATIONS Background In September 2006, the Environmental Management Advisory Board (EMAB) issued a report to the Assistant Secretary that contained recommendations pertaining to communications. These recommendations were approved and implemented to varying degrees. Recommendation 2006-06: Establish a permanent position to provide the needed communications role in the Office of the Assistant Secretary. Recommendation 2006-07: Incorporate communications into all aspects of decision-making. Recommendation 2006-08: Incorporate a communications element or standard to performance appraisal plans for key managers, especially field managers. Recommendation 2006-09: Measure the effectiveness of current communications tools.

278

Re: NBP RFI: Communications Requirements | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Communications Requirements NBP RFI: Communications Requirements Re: NBP RFI: Communications Requirements CTIA - The Wireless Association® ("CTIA")1 submits this response to the Department of Energy's ("DOE") Request for Information ("RFI") regarding the communications requirements of utilities pursuant to the National Broadband Plan.2 Wireless communications are a critical component of "Smart Grids" and commercial wireless networks can readily satisfy the communications requirements of Smart Grid applications. As CTIA explains below, (1) commercial wireless solutions are already meeting communications needs to implement the Smart Grid with both utility network and consumer applications; (2) commercial wireless networks" ubiquity, security and reliability support the operational requirements of Smart Grid

279

Communication in Home Area Networks  

E-Print Network (OSTI)

277 VAC transformer EV EV EV EV EV Adapter Power Line Cabledistribution power line). A typical transformer equivalentpower line in commercial buildings in America/Japan needs additional transformer.

Wang, Yubo

2012-01-01T23:59:59.000Z

280

Communication in Home Area Networks  

E-Print Network (OSTI)

Vehicle Supply Equipment Green PHY PEV Plug-in Electricaldata rate. HomePlug Green PHY (GP), AV and AV2 are developedstandards Netricity Green PHY AV AV2 Bandwidth(Hz) 10–490 k

Wang, Yubo

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Communication in Home Area Networks  

E-Print Network (OSTI)

Linking and Embedding EVSE OSI Open Systems InterconnectionVehicle Supply Equipment (EVSE), by using PLC no additionalcost of deploying a 6-node EVSE HAN as shown in Fig. 5.5.

Wang, Yubo

2012-01-01T23:59:59.000Z

282

Energy-efficient communication protocols  

Science Conference Proceedings (OSTI)

Wireless networking has experienced a great deal of popularity, and significant advances have been made in wireless technology. However, energy efficiency of radio communication systems is still a critical issue due to the limited battery capacity of ... Keywords: battery charge recovery, energy efficiency, wireless networks

Carla F. Chiasserini; Pavan Nuggehalli; Vikram Srinivasan

2002-06-01T23:59:59.000Z

283

Efficient Communication Interfaces for Distributed Energy Resources  

Science Conference Proceedings (OSTI)

The IEC 61850 standard originally was developed for the substation automation. During the past years it was adapted for the integration of distributed energy resources into communication networks, however, with specific requirements. Many small and midsize ... Keywords: Client-Server, Data Modeling, Distributed Systems, Information and Communication Technologies, Networks

Heinz Frank; Sidonia Mesentean

2010-04-01T23:59:59.000Z

284

Data communications  

SciTech Connect

The purpose of this paper is to recommend regulatory guidance for reviewers examining computer communication systems used in nuclear power plants. The recommendations cover three areas important to these communications systems: system design, communication protocols, and communication media. The first area, system design, considers three aspects of system design--questions about architecture, specific risky design elements or omissions to look for in designs being reviewed, and recommendations for multiplexed data communication systems used in safety systems. The second area reviews pertinent aspects of communication protocol design and makes recommendations for newly designed protocols or the selection of existing protocols for safety system, information display, and non-safety control system use. The third area covers communication media selection, which differs significantly from traditional wire and cable. The recommendations for communication media extend or enhance the concerns of published IEEE standards about three subjects: data rate, imported hazards and maintainability.

Preckshot, G.G. [Lawrence Livermore National Lab., CA (United States)

1993-08-01T23:59:59.000Z

285

Quantum Communication Technology  

E-Print Network (OSTI)

Quantum communication is built on a set of disruptive concepts and technologies. It is driven by fascinating physics and by promising applications. It requires a new mix of competencies, from telecom engineering to theoretical physics, from theoretical computer science to mechanical and electronic engineering. First applications have already found their way to niche markets and university labs are working on futuristic quantum networks, but most of the surprises are still ahead of us. Quantum communication, and more generally quantum information science and technologies, are here to stay and will have a profound impact on the XXI century.

Gisin, Nicolas

2010-01-01T23:59:59.000Z

286

Network Coding based Information Security in Multi-hop Wireless Networks.  

E-Print Network (OSTI)

??Multi-hop Wireless Networks (MWNs) represent a class of networks where messages are forwarded through multiple hops of wireless transmission. Applications of this newly emerging communication… (more)

Fan, Yanfei

2010-01-01T23:59:59.000Z

287

MFC Communications Infrastructure Study  

SciTech Connect

Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

2012-01-01T23:59:59.000Z

288

Synchrophasor Communication Infrastructure  

Science Conference Proceedings (OSTI)

This project evaluated the benefits of various approaches to wide-area communications used for the transport of synchrophasor measurements both within the utility and to external entities such as regional transmission organizations (RTOs) and independent system operators (ISOs). The project also assessed the North American SynchroPhasor Initiative net (NASPInet) concept developed by the North American Synchrophasors Initiative's Data and Network Management Task Team. The NASPInet is a major effort by the...

2011-11-08T23:59:59.000Z

289

Synchrophasor Communication Infrastructure  

Science Conference Proceedings (OSTI)

This report details ongoing work begun in 2011 evaluating benefits of various wide-area communications approaches for transport of synchrophasor measurements, with a focus on latency. Recent discussions on synchrophasor use in the North American SynchroPhasor Initiative (NASPI) community have included consideration of automated closed-loop control over an Internet protocol (IP) network infrastructure.The project’s focus in 2012 has been twofold: NASPInet architecture design and ...

2012-11-26T23:59:59.000Z

290

Quantum Communications  

Science Conference Proceedings (OSTI)

... In summary, we perform research and development (R&D) in quantum communication and related measurement areas with an emphasis on ...

2013-07-24T23:59:59.000Z

291

Communication constraints multi-agent territory exploration task  

Science Conference Proceedings (OSTI)

A common assumption made in multi-robot research is the connectedness of the underlying network. Although this seems a valid assumption for static networks, it is not realistic for mobile robotic networks, where communication between robots usually is ... Keywords: Communication, Environment exploration, Leader-follower, Multi-agent robotics systems

Anshika Pal; Ritu Tiwari; Anupam Shukla

2013-04-01T23:59:59.000Z

292

Towards Autonomic Communication Mechanisms for Service Composability Management  

Science Conference Proceedings (OSTI)

The Autonomic Communication Forum dedicates itself to leverage innovative mechanisms in order to provide new levels of integrated autonomicity to a future self-managed networks and network elements. Current trends in networking technologies are applying ... Keywords: Autonomic Communication, Service Composability Management

Thomas Magedanz; José A. Lozano; Florian Schreiner; Fabricio Gouveia; Juan M. González

2008-03-01T23:59:59.000Z

293

Overcoming Communication Latency Barriers in Massively Parallel Scientific Computation  

Science Conference Proceedings (OSTI)

Anton, a massively parallel special-purpose machine that accelerates molecular dynamics simulations by orders of magnitude, uses a combination of specialized hardware mechanisms and restructured software algorithms to reduce and hide communication latency. ... Keywords: Data communications, interprocessor communications, multiprocessor systems, network communication, parallel systems, special-purpose hardware, Anton

Ron Dror; J. P. Grossman; Kenneth Mackenzie; Brian Towles; Edmond Chow; John Salmon; Cliff Young; Joseph Bank; Brannon Batson; David Shaw; Jeffrey S. Kuskin; Richard H. Larson; Mark A. Moraes; David E. Shaw

2011-05-01T23:59:59.000Z

294

Internal Communication  

NLE Websites -- All DOE Office Websites (Extended Search)

9 Internal Communication Process 11_0303 Page 1 of 6 9 Internal Communication Process 11_0303 Page 1 of 6 EOTA - Business Process Document Title: Internal Communication Process Document Number: P-009 Rev 11_0303 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001 Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): N/A P-009 Internal Communication Process 11_0303 Page 2 of 6 Revision History: Rev. Description of Change A Initial Release 09_0902 Modified process to better fit current practice. 10_0831 Added verbiage to clarify process. Added initiation phrase to process steps. 11_0303 Added QAM to the last step and made minor editorial updates. P-009 Internal Communication Process 11_0303 Page 3 of 6 I. Purpose

295

Scheduling in switched queueing networks with heavy-tailed trac  

E-Print Network (OSTI)

We study scheduling problems arising in switched queueing networks, a class of stochastic systems that are often used to model data communication networks, such as uplinks and downlinks of cellular networks, networks of ...

Markakis, Mihalis G

2013-01-01T23:59:59.000Z

296

Survey Paper: A survey on the communication architectures in smart grid  

Science Conference Proceedings (OSTI)

The next-generation electric power systems (smart grid) are studied intensively as a promising solution for energy crisis. One important feature of the smart grid is the integration of high-speed, reliable and secure data communication networks to manage ... Keywords: Communication networks, Communication protocols, Grid standards, Power communications, Smart grid

Wenye Wang; Yi Xu; Mohit Khanna

2011-10-01T23:59:59.000Z

297

RE: NBP RFI Reply Comments: Communications Requirements | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

RE: NBP RFI Reply Comments: Communications Requirements RE: NBP RFI Reply Comments: Communications Requirements RE: NBP RFI Reply Comments: Communications Requirements The National Rural Electric Cooperative Association and American Public Power Association file these brief reply comments in support of the comments and reply comments filed by the Utilities Telecom Council ("UTC"). Both organizations strongly believe that the Administration should ensure that adequate spectrum is available for internal, utility networks. Integrating Smart Grid technologies into Cooperative and Public Power Systems will necessitate enhanced communications networks. In some instances, Cooperatives and Public Power Systems may choose a commercial provider for at least some portion of their communication network service

298

DOE Encourages Utility Sector Nominations to the Federal Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Federal the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council DOE Encourages Utility Sector Nominations to the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council March 29, 2011 - 5:22pm Addthis Because of the role communications technologies will play in the evolution toward a smarter national grid, DOE recommended in its October 2010 report, The Communications Requirements of Smart Grid Technologies, that members of the utility sector become more engaged in the federal advisory committees that consider key policy issues related to the Smart Grid, including the reliability of communications networks. Last week, the Federal Communications Commission announced that it is seeking nominations

299

Adoption of Vehicular Ad Hoc Networking Protocols by Networked Robots  

Science Conference Proceedings (OSTI)

This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several ... Keywords: Networked robot, Robotic ad hoc network, V2I, V2V, Vehicular ad hoc network, Wireless robot

Wim Vandenberghe; Ingrid Moerman; Piet Demeester

2012-06-01T23:59:59.000Z

300

Communicating Logistics  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Logistics Logistics * Delayed or nonexistent communication * Lack of consistency-follow protocols * No overarching coordination * DUF6 communication is poor * Lesson learned: need enhanced, on-going, open communication prior to planning Routing * Re-examine avoiding population centers * Analyze delta between mixed vs. dedicated trains * Flexibility is key component of planning * Selection needs to include state infrastructure Inspections * Cooperate with federal, state, local parties for an integrated role * Schedule during planning process * Coordination to improve use of limited resources * Integrate new technologies TRANSCOM * Needs full funding * Continuous improvement of technology * Great when working * Protocols for assuring data accuracy * Back-up procedure when system is down Incidents & Accidents

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

16.36 Communication Systems Engineering, Spring 2003  

E-Print Network (OSTI)

Introduces the fundamentals of digital communications and networking. Topics covered include elements of information theory, sampling and quantization, coding, modulation, signal detection and system performance in the ...

Modiano, Eytan H.

302

Host Event Based Network Monitoring  

SciTech Connect

The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

Jonathan Chugg

2013-01-01T23:59:59.000Z

303

Recommended Practices Guide For Securing ZigBee Wireless Networks...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

networks. ZigBee is a protocol specification and industry standard for a type of wireless communications technology generically known as Low-Rate Wireless Personal Area Networks...

304

Delay-tolerant networking: an approach to interplanetary Internet  

Science Conference Proceedings (OSTI)

Increasingly, network applications must communicate with counterparts across disparate networking environments characterized by significantly different sets of physical and operational constraints; wide variations in transmission latency are particularly ...

S. Burleigh; A. Hooke; L. Torgerson; K. Fall; V. Cerf; B. Durst; K. Scott; H. Weiss

2003-06-01T23:59:59.000Z

305

Use of an acoustic network as an underwater positioning system .  

E-Print Network (OSTI)

??Underwater acoustic networks provide an interface between UUVs and surface or land-based control systems. By exploiting range data measured incidental to communications on these networks… (more)

Reed, Michael S.

2006-01-01T23:59:59.000Z

306

Practical comprehensive bounds on surreptitious communication over DNS  

Science Conference Proceedings (OSTI)

DNS queries represent one of the most common forms of network traffic, and likely the least blocked by sites. As such, DNS provides a highly attractive channel for attackers who wish to communicate surreptitiously across a network perimeter, and indeed ...

Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula Rao, Reiner Sailer, Douglas Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema, Nicholas Weaver

2013-08-01T23:59:59.000Z

307

Design of a mobile coastal communications buoy  

E-Print Network (OSTI)

In response to a growing interest in networked communications at sea as well as the needs of our vital commercial fishing industry, the Northeast Consortium funded a novel research initiative to establish wireless acoustic ...

Hendry-Brogan, Meghan

2004-01-01T23:59:59.000Z

308

Energy and quality scalable wireless communication  

E-Print Network (OSTI)

Nodes for emerging, high-density wireless networks will face the dual challenges of continuous, multi-year operation under diverse and challenging operating conditions. The wireless communication subsystem, a substantial ...

Min, Rex K. (Rex Kee), 1976-

2003-01-01T23:59:59.000Z

309

New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New No-Cost ANTFARM Tool Maps Control System Networks to Help New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in meeting the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) standards. New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards More Documents & Publications Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)

310

Public Safety Communications  

Science Conference Proceedings (OSTI)

Public Safety Communication. Summary: ... the development of quantitative requirements for public safety communications. ...

2011-12-12T23:59:59.000Z

311

Application Opportunities in Wireless Communications  

Science Conference Proceedings (OSTI)

This report presents results of examining applications of wireless technologies that may present business potential for energy companies. Five different wireless technology areas are reviewed. Three areas -- Communication Networks, Monitored Security Services, and Home Automation -- potentially represent new business ventures for utilities. Two areas -- Automatic Vehicle Location and Automated Field-Force Management -- represent wireless applications with potential for reduced operating costs and improve...

1998-08-20T23:59:59.000Z

312

Visual analysis of implicit social networks for suspicious behavior detection  

Science Conference Proceedings (OSTI)

In this paper we show how social networks, implicitly built from communication data, can serve as a basis for suspicious behavior detection from large communications data (landlines and mobile phone calls) provided by communication services providers ...

Amyn Bennamane; Hakim Hacid; Arnaud Ansiaux; Alain Cagnati

2011-04-01T23:59:59.000Z

313

TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS  

E-Print Network (OSTI)

TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS Ljiljana Trajkovi Communication Networks;March 12, 2004 Kwantlen College Ljiljana Trajkovic, Simon Fraser University 2 Road map Tesla in 1890's Alternate currents Tesla left Edison in 1885. He formed his own laboratory "Tesla Electric Company" in 1887

Trajkovic, Ljiljana

314

TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS  

E-Print Network (OSTI)

TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS Ljiljana Trajkovi Communication Networks;January 17, 2005 UBC Ljiljana Trajkovic, Simon Fraser University 2 Road map Tesla in 1890's First wireless;January 17, 2005 UBC Ljiljana Trajkovic, Simon Fraser University 4 Alternate currents Tesla left Edison

Trajkovic, Ljiljana

315

Data and Computer Communications, 6th edition  

Science Conference Proceedings (OSTI)

From the Publisher:Data and Computer Communications provides a clear and comprehensive survey of the whole field of data communications and provides an up-to-date tutorial on leading-edge network technologies. This is the only book that covers the full ...

William Stallings

1999-11-01T23:59:59.000Z

316

Robust video communication over an urban VANET  

Science Conference Proceedings (OSTI)

Video communication within a Vehicular Ad Hoc Network (VANET) has the potential to be of considerable benefit in an urban emergency, as it allows emergency vehicles approaching the scene to better understand the nature of the emergency. However, the ... Keywords: Error resilience, IEEE 802.11p, VANET, multiple path delivery, redundant frames, video communication

N. Qadri; M. Altaf; M. Fleury; M. Ghanbari

2010-08-01T23:59:59.000Z

317

Internet and political communication - Macedonian case  

E-Print Network (OSTI)

Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party.

Emruli, Sali

2011-01-01T23:59:59.000Z

318

Final Project Report: DOE Award FG02?04ER25606 Overlay Transit Networking for Scalable, High Performance Data Communication across Heterogeneous Infrastructure  

SciTech Connect

As the flood of data associated with leading edge computational science continues to escalate, the challenge of supporting the distributed collaborations that are now characteristic of it becomes increasingly daunting. The chief obstacles to progress on this front lie less in the synchronous elements of collaboration, which have been reasonably well addressed by new global high performance networks, than in the asynchronous elements, where appropriate shared storage infrastructure seems to be lacking. The recent report from the Department of Energy on the emerging 'data management challenge' captures the multidimensional nature of this problem succinctly: Data inevitably needs to be buffered, for periods ranging from seconds to weeks, in order to be controlled as it moves through the distributed and collaborative research process. To meet the diverse and changing set of application needs that different research communities have, large amounts of non-archival storage are required for transitory buffering, and it needs to be widely dispersed, easily available, and configured to maximize flexibility of use. In today's grid fabric, however, massive storage is mostly concentrated in data centers, available only to those with user accounts and membership in the appropriate virtual organizations, allocated as if its usage were non-transitory, and encapsulated behind legacy interfaces that inhibit the flexibility of use and scheduling. This situation severely restricts the ability of application communities to access and schedule usable storage where and when they need to in order to make their workflow more productive. (p.69f) One possible strategy to deal with this problem lies in creating a storage infrastructure that can be universally shared because it provides only the most generic of asynchronous services. Different user communities then define higher level services as necessary to meet their needs. One model of such a service is a Storage Network, analogous to those used within computation centers, but designed to operate on a global scale. Building on a basic storage service that is as primitive as possible, such a Global Storage Network would define a framework within which higher level services can be created. If this framework enabled a variety of more specialized middleware and supported a wide array of applications, then interoperability and collaboration could occur based on that common framework. The research in Logistical Networking (LN) carried out under the DOE's SciDAC program tested the value of this approach within the context of several SciDAC application communities. Below we briefly describe the basic design of the LN storage network and some of the results that the Logistical Networking community has achieved.

Micah Beck; Terry Moore

2007-08-31T23:59:59.000Z

319

Safety Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Communications Communications New Staff & Guests Safety Topics ISM Plan Safety Communications Questions about safety and environmental compliance should first be directed to your supervisor or work lead. The Life Sciences Division Safety Coordinator Scott Taylor at setaylor@lbl.gov , 486-6133 (office), or (925) 899-4355 (cell); and Facilities Manager Peter Marietta at PMarietta@lbl.gov, 486-6031 (office), or 967-6596 (cell), are also sources of information. Your work group has a representative to the Division Environment, Health, & Safety Committee. This representative can provide safety guidance and offer a conduit for you to pass on your concerns or ideas. A list of current representatives is provided below. Additional safety information can be obtained on-line from the Berkeley Lab

320

Connectivity, throughput, and end-to-end latency in infrastructureless wireless Networks with beamforming-enabled devices  

E-Print Network (OSTI)

Infrastructureless wireless networks are an important class of wireless networks best fitted to operational situations with temporary, localized demand for communication ability. These networks are composed of wireless ...

Carey, Matthew F. (Matthew Francis)

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

The Common Communication Interface (CCI)  

SciTech Connect

There are many APIs for connecting and exchanging data between network peers. Each interface varies wildly based on metrics including performance, portability, and complexity. Specifically, many interfaces make design or implementation choices emphasizing some of the more desirable metrics (e.g., performance) while sacrificing others (e.g., portability). As a direct result, software developers building large, network-based applications are forced to choose a specific network API based on a complex, multi-dimensional set of criteria. Such trade-offs inevitably result in an interface that fails to deliver some desirable features. In this paper, we introduce a novel interface that both supports many features that have become standard (or otherwise generally expected) in other communication interfaces, and strives to export a small, yet powerful, interface. This new interface draws upon years of experience from network-oriented software development best practices to systems-level implementations. The goal is to create a relatively simple, high-level communication interface with low barriers to adoption while still providing important features such as scalability, resiliency, and performance. The result is the Common Communications Interface (CCI): an intuitive API that is portable, efficient, scalable, and robust to meet the needs of network-intensive applications common in HPC and cloud computing.

Shipman, Galen M [ORNL; Atchley, Scott [ORNL; Dillow, David A [ORNL; Geoffray, Patrick [ORNL; Bosilca, George [University of Tennessee, Knoxville (UTK); Squyres, Jeffrey M [ORNL; Minnich, Ronald [Sandia National Laboratories (SNL)

2011-01-01T23:59:59.000Z

322

Definition: Backhaul Communications | Open Energy Information  

Open Energy Info (EERE)

Backhaul Communications Backhaul Communications Jump to: navigation, search Dictionary.png Backhaul Communications The infrastructure used to connect the AMI head-end system to the AMI data collectors or access points. Backhaul communications typically utilize fiber-optic cables, high speed wireless connections, or other networks that can handle large amounts of data. Backhaul communications can utilize utility-owned infrastructure or third party communications providers.[1] Related Terms advanced metering infrastructure References ↑ https://www.smartgrid.gov/category/technology/backhaul_communications [[C LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from

323

DTN Communication in a Mine Philip Ginzboorg  

E-Print Network (OSTI)

coal mine monitoring with wireless sensor networks. volume 5, pages 1­29, New York, NY, USA, 2009. ACM. [11] W. Yang and Y. Huang. Wireless sensor network based coal mine wireless and integrated securityDTN Communication in a Mine Philip Ginzboorg Nokia Research Center Teemu Kärkkäinen Aalto

Ott, Jörg

324

Impact of Information and Communications Technologies on  

E-Print Network (OSTI)

Systems LAN Local-area network LEOS Low-Earth Orbiting Satellites KCP&L Kansas City Power & Light NII communications systems. Several utilities (Kansas City Power & Light, Public Service of Colorado, Baltimore Gas that are delivered via modern telecommunications systems (e.g., fiber-optic and coaxial cable networks, fixed

325

A lightweight, high performance communication protocol for grid computing  

Science Conference Proceedings (OSTI)

This paper describes a lightweight, high-performance communication protocol for the high-bandwidth, high-delay networks typical of computational Grids. One unique feature of this protocol is that it incorporates an extremely accurate classification mechanism ... Keywords: Bayesian analysis, Classification mechanisms, Grid computing, High-performance communication protocols, High-performance networking

Phillip M. Dickens

2010-03-01T23:59:59.000Z

326

News Release: Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No-Cost ANTFARM Tool Maps Control System Networks to Help Implement No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in meeting the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) standards. The Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM) helps utilities meet NERC CIP-005, which requires that they identify their electronic security perimeter (ESP), inside which all critical cyber assets and external access points reside. By using a utility's existing network information and

327

Netgauge: a network performance measurement framework  

Science Conference Proceedings (OSTI)

This paper introduces Netgauge, an extensible open-source framework for implementing network benchmarks. The structure of Netgauge abstracts and explicitly separates communication patterns from communication modules. As a result of this separation of ...

Torsten Hoefler; Torsten Mehlan; Andrew Lumsdaine; Wolfgang Rehm

2007-09-01T23:59:59.000Z

328

Resilience and security of opportunistic communications for emergency evacuation  

Science Conference Proceedings (OSTI)

We describe an autonomous emergency support system (ESS) based on opportunistic communications (oppcomms) to support navigation and evacuation of civilians in built environments. In our proposed system, civilians are equipped with low-cost human wearable ... Keywords: building evacuation, communications security, delay tolerant network, disaster management, emergency support, identity-based cryptography, opportunistic communication

Gokce Gorbil; Erol Gelenbe

2012-10-01T23:59:59.000Z

329

A Uniform Balancing Energy Routing Protocol for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

In wireless sensor network, the power supply is, generally, a non-renewable battery. Consequently, energy effectiveness is a crucial factor. To maximize the battery life and therefore, the duration of network service, a robust wireless communication ... Keywords: Ad-hoc networks, Energy balancing, Energy efficiency, Sensor networks, Wireless communications

Ouadoudi Zytoune; Mohamed El Aroussi; Driss Aboutajdine

2010-10-01T23:59:59.000Z

330

Automotive ethernet: in-vehicle networking and smart mobility  

Science Conference Proceedings (OSTI)

This paper discusses novel communication network topologies and components and describes an evolutionary path of bringing Ethernet into automotive applications with focus on electric mobility. For next generation in-vehicle networking, the automotive ... Keywords: EV communication architecture, automotive, domain based commuication, electric vehicle, ethernet, in-vehicle networking, smart grid, vehicle network topology

Peter Hank, Steffen Müller, Ovidiu Vermesan, Jeroen Van Den Keybus

2013-03-01T23:59:59.000Z

331

Cognitive maritime wireless mesh/ad hoc networks  

Science Conference Proceedings (OSTI)

Cognitive maritime wireless mesh/ad hoc networks are proposed in this paper, for the purpose to provide high-speed and low-cost communications for the current maritime users by incorporating the licensed but unused frequency bands opportunistically. ... Keywords: Cognitive radio networks, IEEE 802.16, Maritime communications, Maritime mesh networks, Mesh/ad hc networks, White Space

Ming-Tuo Zhou; Hiroshi Harada

2012-03-01T23:59:59.000Z

332

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

333

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

security efforts by establishing the national SCADA test bed program INL [INL/EXT- 05-00671, Idaho National Laboratory. US-CERT [2008], Control Systems Security

Amin, Saurabh

2011-01-01T23:59:59.000Z

334

System and Network Management  

Science Conference Proceedings (OSTI)

This document covers Systems and Network Management Requirements and is the first deliverable in a joint EPRI and Utility User Project to develop Network Management capability for Electric Utility Automation Systems (UAS) using international communication standards such as IEC 61850. The management of substation automation systems is critical since tools are now based, for the most part, on proprietary hardware and software. In modern state-of-the art substations, traditional network management has ...

2012-12-20T23:59:59.000Z

335

Body Area Networks: A Survey  

Science Conference Proceedings (OSTI)

Advances in wireless communication technologies, such as wearable and implantable biosensors, along with recent developments in the embedded computing area are enabling the design, development, and implementation of body area networks. This class of ... Keywords: body area networks, survey, wireless sensor networks

Min Chen; Sergio Gonzalez; Athanasios Vasilakos; Huasong Cao; Victor C. Leung

2011-04-01T23:59:59.000Z

336

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

337

Energy-aware network coding circuit and system design  

E-Print Network (OSTI)

Network Coding (NC) has been shown to provide several advantages in communication networks in terms of throughput, data robustness and security. However, its applicability to networks with resource constrained nodes, like ...

Angelopoulos, Georgios, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

338

ASAP: automatic semantics-aware analysis of network payloads  

Science Conference Proceedings (OSTI)

Automatic inspection of network payloads is a prerequisite for effective analysis of network communication. Security research has largely focused on network analysis using protocol specifications, for example for intrusion detection, fuzz testing and ...

Tammo Krueger; Nicole Krämer; Konrad Rieck

2010-09-01T23:59:59.000Z

339

Meteorological Network Expansion Using Information Decay Concept  

Science Conference Proceedings (OSTI)

A generalized network design methodology was developed by using the basic entropy concept introduced by Shannon in communication engineering. In order to select potential sites for meteorological network expansion purposes, the meteorological ...

Tahir Husain; Mustafa A. Ukayli; Hasin U. Khan

1986-03-01T23:59:59.000Z

340

Virtual infrastructure for wireless ad hoc networks  

E-Print Network (OSTI)

One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...

Gilbert, Seth, 1976-

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Design of reliable SONET feeder networks  

Science Conference Proceedings (OSTI)

We address the physical SONET network design problem of selecting stackable, unidirectional rings connecting central office nodes (COs) and remote nodes (RNs). This problem frequently arises in designing feeder transport networks to support centralized ... Keywords: Communications, Heuristic, Integer Programming

June S. Park; Byung Ha Lim; Larry J. Leblanc

2007-03-01T23:59:59.000Z

342

Network Security for Substation Automation Systems  

Science Conference Proceedings (OSTI)

The protection of critical infrastructure against electronic and communication network based attacks becomes more and more important. This work investigates the threat of network-based attacks on substations, the nodes of the electric power grid. Three ...

Martin Naedele; Dacfey Dzung; Michael Stanimirov

2001-09-01T23:59:59.000Z

343

Mutual Exclusion on Multihop, Mobile Wireless Networks  

Science Conference Proceedings (OSTI)

The system considered in this paper is a mobile wireless network, commonly known as an ad hoc network. Mobile nodes in this dynamic topology function both as processors and routers to provide communication between nodes which are not within wireless ...

Jennifer Walter; Savita Kini

1997-12-01T23:59:59.000Z

344

Opportunistic packet scheduling in body area networks  

Science Conference Proceedings (OSTI)

Significant research efforts are being devoted to Body Area Networks (BAN) due to their potential for revolutionizing healthcare practices. Energy-efficiency and communication reliability are critically important for these networks. In an experimental ...

K. Shashi Prabh; Jan-Hinrich Hauer

2011-02-01T23:59:59.000Z

345

A survey on wireless sensor network infrastructure for agriculture  

Science Conference Proceedings (OSTI)

The hybrid wireless sensor network is a promising application of wireless sensor networking techniques. The main difference between a hybrid WSN and a terrestrial wireless sensor network is the wireless underground sensor network, which communicates ... Keywords: Agriculture, Hybrid wireless sensor network, Information collection, Monitoring, Wireless underground sensor network

Xiaoqing Yu; Pute Wu; Wenting Han; Zenglin Zhang

2013-01-01T23:59:59.000Z

346

Berkeley Lab Public Affairs Department: Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Communications and Media Relations Communications and Media Relations Communications and Media Relations Government and Community Relations Workforce Development & Education Creative Services Office (CSO) Image of Communications Dept. staff Berkeley Lab's Communications and Media Relations Group is responsible for gathering, reporting, and disseminating news about the Lab to both internal and external audiences, including employees, the media, and the community. The latest news can be found at the News Center, which includes press releases, feature stories, announcements, multimedia features, and employee news. The site is searchable and offers web feeds and social networking tools. In addition to the News Center, the Communications and Media Relations Group, together with the Creatives Services Office, also maintains the

347

Implementing the National Broadband Plan by Studying the Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Studying the Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy The Department of Energy (DOE) is seeking comments and information from interested parties to assist DOE in understanding the communications requirements of utilities, including, but not limited to, the requirements of the Smart Grid. This RFI also seeks to collect information about electricity infrastructure's current and projected communications requirements, as well as the types of networks and communications services that may be used for grid modernization. Specifically, DOE seeks information on what types of communications capabilities that the utilities

348

Contextual and Applications-Aware Communications Protocol Design for Vehicle-to-Vehicle Communications  

Science Conference Proceedings (OSTI)

Cooperative vehicular ad-hoc networks are currently under development for improving traffic safety and efficiency. The strict requirements of traffic safety applications demand robust communication protocols that are able to efficiently operate under ... Keywords: Context-awareness, Cooperative protocols, Intelligent transportation systems, Vehicular ad-hoc networks

Miguel Sepulcre; Javier Gozalvez

2013-06-01T23:59:59.000Z

349

Communications Technology and Urban Governance Reform: Project Highlights  

E-Print Network (OSTI)

In this paper, we describe highlights of a research project funded by the NSF Digital Government program. The study has examined the impacts of advanced communication technologies in the implementation of a system of neighborhood councils in Los Angeles. It employs social network analysis to chart the development of political networks engendered by the reform and the role of email in shaping these networks.

Christopher Weare

2005-01-01T23:59:59.000Z

350

Regulation, public policy, and investment in communications infrastructure  

Science Conference Proceedings (OSTI)

A growing number of countries are reexamining telecommunications policies in search of approaches that better support investment and innovation in advanced communication networks and services. In addition to regulatory instruments, a broad range of fiscal ... Keywords: Broadband, Innovation, Network investment, Next-generation networks, Public policy, Regulation, Ultrabroadband

Johannes M. Bauer

2010-02-01T23:59:59.000Z

351

Overall Requirements for Global Information Multimedia Communication Village 10th Strategic Workshop  

Science Conference Proceedings (OSTI)

The foundations for the definition of the network of the future should be based on a correct user and community characterizations to minimize the fragmentation of the experiences during the global interactions with information communication infrastructures. ... Keywords: Access networks, Network evolution, Smart environments domotics, User identity, WiMax, Wireless communications

Antonio Cimmino; Pasquale Donadio

2009-05-01T23:59:59.000Z

352

Review: Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification  

Science Conference Proceedings (OSTI)

Vehicular Ad hoc NETworks (VANETs) allow vehicles to form a self-organized network without the need for a permanent infrastructure. As a prerequisite to communication, an efficient route between network nodes must be established, and it must adapt to ... Keywords: Inter-vehicle communication, Mobile ad hoc network, Routing, VANET, Vehicular ad hoc networks

James Bernsen; D. Manivannan

2009-02-01T23:59:59.000Z

353

Acoustic system for communication in pipelines  

DOE Patents (OSTI)

A system for communication in a pipe, or pipeline, or network of pipes containing a fluid. The system includes an encoding and transmitting sub-system connected to the pipe, or pipeline, or network of pipes that transmits a signal in the frequency range of 3-100 kHz into the pipe, or pipeline, or network of pipes containing a fluid, and a receiver and processor sub-system connected to the pipe, or pipeline, or network of pipes containing a fluid that receives said signal and uses said signal for a desired application.

Martin, II, Louis Peter (San Ramon, CA); Cooper, John F. (Oakland, CA)

2008-09-09T23:59:59.000Z

354

Power-Aware Communication for Mobile Computers  

E-Print Network (OSTI)

Recently, the mobile community has focused on techniques for reducing energy consumption for mobile hosts. These power management techniques typically target communication devices such as wireless network interfaces, aiming to reduce usage, and thus energy consumption, of the particular device itself. We observe that optimization of a single device's energy consumption, without considering the effect of the strategy on the rest of the machine, can have negative consequences. We propose power management techniques addressing mobile host communications that encompass all components of a mobile host in an effort to optimize total energy consumption. Specifically, we propose runtime adaptation of communication parameters in order to minimize the energy consumed during active data transfer. Information about the network environment is used to drive such adaptations in an effort to compensate for the effect of dynamic service from wireless communication device on the energy consume...

Robin Kravets; Karsten Schwan; Ken Calvert

1999-01-01T23:59:59.000Z

355

PROCEEDINGS OF FOURTH BERKELEY CONFERENCE ON DISTRIBUTED DATA MANAGEMENT AND COMPUTER NETWORKS.  

E-Print Network (OSTI)

packet switching for local computer networks. Comm. of theaddressing capabilities for computer networks. Proe. IEEE,InternatIonal Conference on,Computer CommunIcatIon, August

Hall, Dennis

2011-01-01T23:59:59.000Z

356

Flexible network wireless transceiver and flexible network telemetry transceiver  

DOE Patents (OSTI)

A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

Brown, Kenneth D. (Grain Valley, MO)

2008-08-05T23:59:59.000Z

357

Smart Grid Communications:  

E-Print Network (OSTI)

Interoperability is a key requirement for data communications in the “smart grid”. It has been articulated at great length by the GridWise Architecture Council (GWAC). However, the interoperability issues identified here to date include only interoperability of the data exchange. In this paper, we first argue that middleware is a key enabling technology for helping meet interoperability requirements and avoid stovepipe systems in the smart grid. We then argue that the smart grid’s data communications must support interoperability of Quality of Service (QoS) and security mechanisms across an entire power grid; this will necessarily involve traversing multiple organizations ’ IT infrastructures that may have different network-level mechanisms for providing QoS and security. We introduce the concept of QoS stovepipes to illustrate how such QoS and security interoperability may occur. We then argue that the application programmer interface for such QoS and security requirements must be kept as high-level as possible to avoid QoS stovepipes. Finally, we argue that middleware-level mechanisms are a much better way to provide this end-to-end QoS and security, compared to the usual technique in the power grid of using (and getting locked into) network-level mechanisms (which the middleware is built on top of). 1 This paper is a reformatted version of one from the Grid-Interop 2009 meeting in Denver, Colorado, USA on November 18, 2009, and appearing there in its online proceedings (it won the Best Paper award for the “Connectivity ” Track). URL for this document:

Qos Stovepipes; Qos Interoperability; David E. Bakken; Richard E. Schantz

2009-01-01T23:59:59.000Z

358

Handheld portable real-time tracking and communications device  

DOE Patents (OSTI)

Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

Wiseman, James M. (Albuquerque, NM); Riblett, Jr., Loren E. (Edgewood, NM); Green, Karl L. (Albuquerque, NM); Hunter, John A. (Albuquerque, NM); Cook, III, Robert N. (Rio Rancho, NM); Stevens, James R. (Arlington, VA)

2012-05-22T23:59:59.000Z

359

Networked control of distributed energy resources: application to solid oxide fuel cells  

Science Conference Proceedings (OSTI)

This paper presents a model-based networked control approach for managing Distributed Energy Resources (DERs) over communication networks. As a model system, we consider a solid oxide fuel cell (SOFC) plant that communicates with the central controller ...

Yulei Sun; Sathyendra Ghantasala; Nael H. El-Farra

2009-06-01T23:59:59.000Z

360

Transmission Power Allocation for Cooperative Relay-BasedNeighborhood Area Networks for Smart Grid  

E-Print Network (OSTI)

Architecture for the Smart Grid, IEEE Network, vol. 25, no.to-Machine Communications in Smart Grid. IEEE CommunicationInfrastructure for Smart Grid. IEEE Network, vol. 25, no.5,

Kai, Ma; Guoqiang, Hu; Spanos, Costas

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Connectivity problem in wireless networks  

Science Conference Proceedings (OSTI)

We study the complexity of the following connectivity problem in wireless networks: for a given placement of n nodes in the plane, the goal is to compute a channel and power assignment that forms strongly connected communication structure spanning ...

Dariusz R. Kowalski; Mariusz A. Rokicki

2010-09-01T23:59:59.000Z

362

Design of a backup network for catastrophe scenarios  

Science Conference Proceedings (OSTI)

Communication networks play a fundamental role in the response to a massive catastrophe, like an earthquake or a large-scale terrorist attack to a major urban area. In such situations, command centres must be able to rely on a fully operational communication ... Keywords: backup networks, emergency communications, resilience

S. Alves; B. Koldehofe; H. Miranda; F. Taiani

2009-06-01T23:59:59.000Z

363

Location privacy and resilience in wireless sensor networks querying  

Science Conference Proceedings (OSTI)

Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms-those would just protect the message content. However, communication patterns ... Keywords: Location privacy, Probabilistic algorithm, Resiliency, Security, Wireless sensor networks

Roberto Di Pietro; Alexandre Viejo

2011-03-01T23:59:59.000Z

364

Assessing Power Substation Network Security and Survivability: A Work in Progress Report1  

E-Print Network (OSTI)

& Privacy, pages 44­51, Nov./Dec. 2008. [4] G. Devarajan. Unraveling SCADA protocols: Using Sulley fuzzer

Krings, Axel W.

365

DAVIC - Distributed Energy Automation via Implicit Communication  

NLE Websites -- All DOE Office Websites (Extended Search)

DAVIC - Distributed Energy Automation via Implicit Communication DAVIC - Distributed Energy Automation via Implicit Communication Speaker(s): Peter Palensky Date: January 22, 2008 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Peng Xu The electricity grid is seen as a wide-area distributed process, determined by its sub-processes - in our case the loads and distributed generation. Network-based coordination needs to be done very carefully and properly timed to avoid instabilities. Luckily, every point of the grid has the same grid frequency and the same time. Integrating these two trivial things (implicit communication) into one consistent communication model might complement a low-quality (explicit) best-effort communication channel (e.g. Internet, GPRS) for real time applications. A simulation shall clarify how

366

Information Technology & Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Communications Information Technology & Communications Express Licensing 3-dimensional imaging at nanometer resolutions Call for Commercialization andor CRADA Partners PathScan...

367

PROTOCOLS FOR SECURE COMMUNICATION AND TRAITOR TRACING IN ADVANCED METERING INFRASTRUCTURE.  

E-Print Network (OSTI)

??Electrical smart grid is rapidly growing worldwide. Advances in smart metering infrastructure have led to the creation of networks for bidirectional communication between neighborhood electric… (more)

Miadzvezhanka, Siarhei

2011-01-01T23:59:59.000Z

368

Map: medial axis based geometric routing in sensor networks  

Science Conference Proceedings (OSTI)

One of the challenging tasks in the deployment of dense wireless networks (like sensor networks) is in devising a routing scheme for node to node communication. Important consideration includes scalability, routing complexity, quality of communication ... Keywords: medial axis, routing, sensor networks, system design

Jehoshua Bruck; Jie Gao; Anxiao Jiang

2007-12-01T23:59:59.000Z

369

Dynamic frequency allocation in fractional frequency reused OFDMA networks  

Science Conference Proceedings (OSTI)

This paper proposes a dynamic fractional frequency reused cell architecture that simplifies the problem of subcarrier allocation with frequency reuse in multicell OFDMA networks. The architecture divides the cell surface into two overlapping geographical ... Keywords: 3G, cellular networks, cross-layer adaptation, data networks, mobile communication systems, opportunistic scheduling, wireless communication

Syed Hussain Ali; Victor C. M. Leung

2009-08-01T23:59:59.000Z

370

Secure Personal Networks for IMT-Advanced Connectivity  

Science Conference Proceedings (OSTI)

The challenge to deliver the next generation of ubiquitous and converged network and service infrastructures for communication, computing and media, has forced research into innovative new directions. New infrastructures must overcome the scalability, ... Keywords: Cognitive radio, Connectivity, Cooperation of heterogeneous networks, IMT-Advanced, Personal networks, Ubiquitous communications

Albena Mihovska; Ramjee Prasad

2008-06-01T23:59:59.000Z

371

A compressive sensing-based reconstruction approach to network traffic  

Science Conference Proceedings (OSTI)

Traffic matrix in a network describes the end-to-end network traffic which embodies the network-level status of communication networks from origin to destination nodes. It is an important input parameter of network traffic engineering and is very crucial ...

Laisen Nie, Dingde Jiang, Zhengzheng Xu

2013-07-01T23:59:59.000Z

372

Communication protocols, queuing and scheduling delay analysis in CANDU SCWR hydrogen co-generation model.  

E-Print Network (OSTI)

??Industrial dynamical, Networked Control Systems (NCSs) are controlled over a communication network. We study a continuous-time CANada Deuterium Uranium-Super Critical Water Reactor (CANDU-SCWR) hydrogen plant… (more)

Ahmed, Fayyaz

2011-01-01T23:59:59.000Z

373

Securing Cell Relay Networks  

Science Conference Proceedings (OSTI)

A cellular relay or cell relay (CR) is a device used to relay  information from one point in a network to another through a wireless medium using spectrum from the cellular band. One common use of CRs in the United States is to provide wireless devices with access to higher bandwidth or broadband access points. Examples include advanced metering infrastructure (AMI) mesh networks that use meter-based transmitters and receivers to provide communications between meters and from ...

2013-12-20T23:59:59.000Z

374

A framework for Unified Communication and Collaboration strategy for telcos  

E-Print Network (OSTI)

Unified Communication and Collaboration (UCC) is a product offer that is the result of fixed and mobile networks convergence and the possibility of development of applications which are interoperable. Currently there are ...

Wahid, Bilal

2008-01-01T23:59:59.000Z

375

Cheiro : creating expressive textual communication and anthropomorphic typography  

E-Print Network (OSTI)

Despite rapid technological advancement and improvement in network bandwidth, people still like to use text for remote communication. Simplicity, directness and anonymity make textual chat the most popular method of ...

Lam, Francis, S.M. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

376

Continuous-Time Distributed Observers with Discrete Communication  

E-Print Network (OSTI)

computation. Distributed estimation problems arise, for instance, in sensor networks, electric power grids data, and rely upon distributed mechanisms to merge local computations, such as intermediate dataContinuous-Time Distributed Observers with Discrete Communication Florian D¨orfler, Fabio

Bullo, Francesco

377

The Economics of Communications/Networking  

E-Print Network (OSTI)

"PRIVACY" COLD "COLD FUSION" MXWEBDV "WEB SITE DEVELOPMENT" or "WEB DEVELOPMENT" FIREWAL "FIREWALL" NETWRK

Gruner, Daniel S.

378

Communicating oscillatory networks: Frequency Domain Analysis  

E-Print Network (OSTI)

-deterministic models and used the presented techni- que of frequency domain analysis to investigate the differ- ences. The quasi-deterministic models are constructed from exactly the same reaction scheme and kinetic para- meters, however the kinetic functions... significant role in our findings. Note in particular from Additional file 1 Table S4 that the two species that directly perturb the cell cycle (namely p53a and NF-#1;Bn) have low stochasticity, so any noise inherent in their respective net- works does...

Ihekwaba, Adaoha E C; Sedwards, Sean

2011-12-22T23:59:59.000Z

379

Exploring Collective Dynamics in Communication Networks  

Science Conference Proceedings (OSTI)

... Figure 2 provides a schematic diagram of the node ... Using the 2-D grid, we can determine the ... size, and congestion, we plot several power spectra in ...

2012-04-17T23:59:59.000Z

380

Report: EM Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

COMMUNICATIONS COMMUNICATIONS September 25, 2008 Submitted by the EMAB Communications Subcommittee Background: In response to the Environmental Management Advisory Board's (EMAB) expressed concern that a communications function was not part of the Office of Environmental Management's (EM) 2006 proposed reorganization, the Assistant Secretary requested that the Board make a recommendation as to whether EM should create a communications position with direct report to his office. In support of this request, EMAB established a subcommittee to review how communications within the Department and with stakeholders were being handled in EM, and report back to the full Board on its findings. The Communications Subcommittee's original report included five recommendations and

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture  

DOE Patents (OSTI)

Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

2011-02-01T23:59:59.000Z

382

Packet-Switched Optical Networks  

Science Conference Proceedings (OSTI)

In this article, we present a platform design for packet-switched OTDM networks operating at ultrafast bit-rates for modern multiprocessor interconnects. The design is implemented in a prototype 8-node transparent shuffle network. The flow control in ... Keywords: Communication system interfaces, signalling, synchronization, clock and data recovery, PLLs

Ben Y. Yu; Paul Toliver; Robert J. Runser; Kung-Li Deng; Deyu Zhou; Ivan Glesk; Paul R. Prucnal

1998-01-01T23:59:59.000Z

383

Communication and Computation in Distributed CSP Algorithms  

E-Print Network (OSTI)

Communication and Computation in Distributed CSP Algorithms C`esar Fern`andez1 , Ram´on B´ejar1 in the context of networked distributed systems. In order to study the performance of Distributed CSP (DisCSP consider two complete DisCSP algorithms: asynchronous backtracking (ABT) and asynchronous weak commitment

Krishnamachari, Bhaskar

384

Tightly Coupled Accelerators Architecture for Minimizing Communication Latency among Accelerators  

Science Conference Proceedings (OSTI)

In recent years, heterogeneous clusters using accelerators have been widely used in high performance computing systems. In such clusters, inter-node communication among accelerators requires several memory copies via CPU memory, and the communication ... Keywords: GPGPU, Accelerator Computing, Interconnection Network, PCI Express, Remote DMA, CUDA, GPU Direct

Toshihiro Hanawa, Yuetsu Kodama, Taisuke Boku, Mitsuhisa Sato

2013-05-01T23:59:59.000Z

385

Interacting with audio streams for entertainment and communication  

Science Conference Proceedings (OSTI)

We present a new model of interactive audio for entertainment and communication. A new device called the DJammer and its associated technologies are described. The DJammer introduces the idea of provisioning mobile users to interact cooperatively with ... Keywords: connectivity, context awareness, digital content, distributed multimedia communication, distributed systems, mobility, network aggregation, peer-to-peer, rich media

Mat C. Hans; Mark T. Smith

2003-11-01T23:59:59.000Z

386

Activity detection for information access to oral communication  

Science Conference Proceedings (OSTI)

Oral communication is ubiquitous and carries important information yet it is also time consuming to document. Given the development of storage media and networks one could just record and store a conversation for documentation. The question is, however, ... Keywords: activity, dialogue processing, information access, oral communication, speech

Klaus Ries; Alex Waibel

2001-03-01T23:59:59.000Z

387

Survey A survey of routing protocols for smart grid communications  

Science Conference Proceedings (OSTI)

With the recent initiatives to upgrade the existing power grid to the Smart Grid (SG), there has been a significant interest in the design and development of an efficient communications infrastructure for connecting different components of the SG. In ... Keywords: HANs, NANs, Routing, Smart grid, Smart grid communications network, WANs

Nico Saputro; Kemal Akkaya; Suleyman Uludag

2012-07-01T23:59:59.000Z

388

Smart grid communications architecture: a survey and challenges  

Science Conference Proceedings (OSTI)

With an increasing interest from both the academic and industrial communities, this article systematically investigates developments in communication technology for the smart grid. Smart grid can be defined as an electric system that uses information, ... Keywords: cognitive communications, demand response, heterogeneous wireless networks, smart grid

Zoran Bojkovic; Bojan Bakmaz

2012-04-01T23:59:59.000Z

389

Graph anomalies in cyber communications  

Science Conference Proceedings (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

390

Consumer Device Communications Stability Assessment: Communications Reliability Evaluation for End Devices  

Science Conference Proceedings (OSTI)

This project examined issues related to establishing and maintaining reliable long-term communication with end-use devices for load management purposes. The impetus for this project was a broad set of challenges encountered by utilities conducting pilots and projects based on potential new communication technologies and architectures. The challenges were not limited to a specific protocol or media but appeared in a variety of scenarios, particularly those involving home area networks or LANs that ...

2013-12-19T23:59:59.000Z

391

The Maximum Flow Network Interdiction Problem: Valid Inequalities ...  

E-Print Network (OSTI)

applications in identifying critical infrastructure in supply (e.g., food, energy, medicine), domestic service (e.g., police, fire, EMS) and communication networks [6].

392

SURVIVABLE GREEN OPTICAL BACKBONE NETWORKS WITHSHARED BACKUP PROTECTION.  

E-Print Network (OSTI)

?? With the rapidly growing power consumption in Information and Communication Technology (ICT), energy-efficient solutions in telecom networks have become increasingly important. As a part… (more)

Sadat Jalalinia, Shabnam

2012-01-01T23:59:59.000Z

393

Building and measuring a high performance network architecture  

E-Print Network (OSTI)

Tim Toole, Deputy Chair, Sandia National Laboratories EliNetwork Security Chair, Sandia National Laboratories JonQwest Communications, Sandia National Laboratory (DOE),

2001-01-01T23:59:59.000Z

394

Power-Rate-Distortion Analysis Of Wireless Visual Sensor Network.  

E-Print Network (OSTI)

??The emergence of low-cost and mature technologies in wireless communication, visual sensor devices, and digtial signal processing, facilitates the potential of wirelss sensor networks (WSN).… (more)

Shaw, William

2008-01-01T23:59:59.000Z

395

Eventdriven, Rolebased Mobility in Disaster Recovery Networks  

E-Print Network (OSTI)

-1-59593-737-7/07/0009 ...$5.00. disaster response scenarios, understanding communication patterns in such networks is criticalEvent­driven, Role­based Mobility in Disaster Recovery Networks Samuel C. Nelson, Albert F. Harris important tools in understanding the com- plex characteristics of disaster recovery networks is simula- tion

Kravets, Robin

396

LUSTER: wireless sensor network for environmental research  

Science Conference Proceedings (OSTI)

Environmental wireless sensor network (EWSN) systems are deployed in potentially harsh and remote environments where inevitable node and communication failures must be tolerated. LUSTER---Light Under Shrub Thicket for Environmental Research---is a system ... Keywords: LiteTDMA, architecture, environmental science, implementation, mote, network protocol, storage, validation, wireless sensor network

L. Selavo; A. Wood; Q. Cao; T. Sookoor; H. Liu; A. Srinivasan; Y. Wu; W. Kang; J. Stankovic; D. Young; J. Porter

2007-11-01T23:59:59.000Z

397

Design and experimental evaluation of a vehicular network based on NEMO and MANET  

Science Conference Proceedings (OSTI)

Mobile Ad hoc Network (MANET) routing protocols and Network Mobility (NEMO) Basic Support are considered key technologies for vehicular networks. MANEMO, that is, the combination of MANET (for infrastructureless communications) and NEMO (for infrastructure-based ...

Manabu Tsukada; José Santa; Olivier Mehani; Yacine Khaled; Thierry Ernst

2010-03-01T23:59:59.000Z

398

ORISE: Public Health Communication  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication Communication Public Health Communication The Oak Ridge Institute for Science and Education (ORISE) assists government agencies and organizations in addressing public health challenges by developing evidence-based communication programs and social marketing initiatives that resonate with target populations. Because approximately half of American adults do not understand basic health information, ORISE develops the types of messages that will attract attention and motivate people to address their personal and family health. ORISE also develops and executes evidence-based and culturally-competent public health communication programs that help change behaviors and result in healthier lifestyles. Communication Planning and Products Public health organizations are faced with increasing demands for

399

Media & Communications Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Media & Communications Office Media & Communications Office Newsroom Photos Image Library Historic Images Photo Permissions Videos Fact Sheets Lab History News Categories Contacts Media & Communications Office news Part of the Community, Education, Government & Public Affairs Directorate, the Media & Communications Office provides information about Brookhaven National Laboratory to internal and external audiences through numerous communications vehicles. Our staff promotes Brookhaven's international reputation as a center for scientific excellence and innovation. We also publicize information about Laboratory events, policies and procedures. News Releases Media and Communications prepares all of the news releases on the Laboratory's science discoveries, announcements, events, and awards.

400

Future Communications Needs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Future Communications Needs Future Communications Needs Chart of Oncor Electric Delivery's Future Communications Needs Future Communications Needs More Documents & Publications...

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

On the role of feedback in network coding  

E-Print Network (OSTI)

Network coding has emerged as a new approach to operating communication networks, with a promise of improved efficiency in the form of higher throughput, especially in lossy conditions. In order to realize this promise in ...

Sundararajan, Jay Kumar, 1982-

2009-01-01T23:59:59.000Z

402

Service and Network Management Interworking in Future Wireless Systems  

Science Conference Proceedings (OSTI)

The need for seamless communications in future wireless networks imposes the development of distributed management systems, in which we can distinguish between different business entities, the Service and Network Providers. Such a highly dynamic environment ...

V. Tountopoulos; Vera Stavroulaki; Panagiotis Demestichas; Nikolas Mitrou; Michael E. Theologou

2002-05-01T23:59:59.000Z

403

Event-triggered distributed algorithms for network optimization  

Science Conference Proceedings (OSTI)

Many existing distributed algorithms for network optimization problems often rely on the fact that, if the communications between subsystems are frequent enough, then the state of the network will converge to its optimum asymptotically. This ...

Pu Wan / Michael D. Lemmon

2010-01-01T23:59:59.000Z

404

Broadcasting and transmission coordination for ad hoc and sensor networks  

Science Conference Proceedings (OSTI)

This thesis studies the performance benefit of coordination in wireless sensor networks (WSNs) and ad hoc networks (AHNs). WSNs are often comprised of a large number of inexpensive nodes with short battery life and limited communication and processing ...

Ananth V. Kini / Steven P. Weber

2008-01-01T23:59:59.000Z

405

Handoff In Mobile ATM Networks: A Framework for Performance Optimization  

Science Conference Proceedings (OSTI)

Current handoff rerouting techniques in Mobile ATM networks fail to optimize some or all of the following parameters: handoff latency, route length, computational complexity, communication disruption period, network buffer requirements,a nd bandwidth ...

Sirisha R. Medidi; Forouzan Golshani

2002-06-01T23:59:59.000Z

406

Energy scalability of on-chip interconnection networks  

E-Print Network (OSTI)

On-chip interconnection networks (OCN) such as point-to-point networks and buses form the communication backbone in multiprocessor systems-on-a-chip, multicore processors, and tiled processors. OCNs consume significant ...

Konstantakopoulos, Theodoros K., 1977-

2007-01-01T23:59:59.000Z

407

Energy-efficient connected-coverage in wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper addresses the target coverage problem inWireless Sensor Networks (WSNs). Communication and sensing consume energy, therefore, efficient power management can extend network lifetime. In this paper, we consider a large number of sensors ...

Ionut Cardei; Mihaela Cardei

2008-05-01T23:59:59.000Z

408

Modular Anomaly Detection for Smartphone Ad hoc Communication  

E-Print Network (OSTI)

a mobile ad hoc network (MANET). While intrusion detection in MANETs is typically evaluated with network. The study shows the feasibility of the statistics-based anomaly detection regime, having low CPU usage, among others, has been focused on studies of energy and bandwidth constrained communication using

409

Development of the communication/information infrastructure at the academic institution  

Science Conference Proceedings (OSTI)

The quality and functionality of the communication/information infrastructure is essential for the development of the academic institution. The status of the academic institution and its relationship with other subjects such as government institutions ... Keywords: Academic institution, Academic networking, Communication/information infrastructure, Wireless local area network

Dinko Begusic; Nikola Rozic; Hrvoje Dujmic

2003-03-01T23:59:59.000Z

410

Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities  

E-Print Network (OSTI)

Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.

Fan, Zhong; Gormus, Sedat; Efthymiou, Costas; Kalogridis, Georgios; Sooriyabandara, Mahesh; Zhu, Ziming; Lambotharan, Sangarapillai; Chin, Woon Hau

2011-01-01T23:59:59.000Z

411

Atmospheric Laser Communication  

Science Conference Proceedings (OSTI)

Atmospheric laser communication, often referred to as free-space optics (FSO) or free-space laser (FSL) communication, is similar to fiber optic cable in terms of carrier wavelength and bandwidth capability, but data are transmitted directly ...

Kenneth W. Fischer*Michael R. Witiw; Jeffrey A. Baars+; T. R. Oke

2004-05-01T23:59:59.000Z

412

Building a wireless network infrastructure under budget constraints  

Science Conference Proceedings (OSTI)

This paper examines wireless networking and provides a case study of a wireless network infrastructure's development at an urban university of 11,000 students. The University of Houston Downtown (UHD) incorporated wireless technology to help ... Keywords: budget constraints, case study, curricula-related products, e-learning, higher education, m-learning, mobile communications, mobile learning, mobile technology, urban university, wireless communications, wireless network infrastructure, wireless networks

Richard A. McMahon; Peter D. DeVries; P. Pete Chong

2005-12-01T23:59:59.000Z

413

Public Safety Communication Systems  

Science Conference Proceedings (OSTI)

... integrate legacy communication and information systems and ... will support system analysis and troubleshooting ... create a global market for equipment ...

2012-12-13T23:59:59.000Z

414

Powerline Communications Assessment  

Science Conference Proceedings (OSTI)

This report provides background on the technology and development of power line communications for utility automation and customer communications. The report presents technical information on power line technology development that can be used in utility decision making with respect to research, development, standards, and use of power lines as communications media for advanced applications.

2009-12-23T23:59:59.000Z

415

Scientometrics and Communication Theory: Towards Theoretically Informed Indicators  

E-Print Network (OSTI)

A theory of citations should not consider cited and/or citing agents as its sole subject of study. One is able to study also the dynamics in the networks of communications. While communicating agents (e.g., authors, laboratories, journals) can be made comparable in terms of their publication and citation counts, one would expect the communication networks not to be homogeneous. The latent structures of the network indicate different codifications that span a space of possible 'translations'. The various subdynamics can be hypothesized from an evolutionary perspective. Using the network of aggregated journal-journal citations in Science & Technology Studies as an empirical case, the operation of such subdynamics can be demonstrated. Policy implications and the consequences for a theory-driven type of scientometrics will be elaborated.

Leydesdorff, Loet

2010-01-01T23:59:59.000Z

416

Proposal of CSP based Network Design and Construction  

E-Print Network (OSTI)

Proposal of CSP based Network Design and Construction Session:Network and Protocol Short PaperWire network. The design was based on a formal method using CSP ( Communicating Sequential Processes]. In this paper we discuss the reason why we use CSP as a formal design method for the router-network system

Fukunaga, Chikara

417

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks  

Science Conference Proceedings (OSTI)

Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores ... Keywords: Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks

Eugene Y. Vasserman; Nicholas Hopper

2013-02-01T23:59:59.000Z

418

A middleware-based approach for heterogeneous wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSN) are networked embedded systems that use small size devices with some processing and short-range radio communication capabilities for monitoring and controlling systems and environments. However, languages and IDE (Integrated ... Keywords: heterogeneous networks, middleware, wireless sensor networks

F. Graziosi; L. Pomante; D. Pacifico

2008-07-01T23:59:59.000Z

419

Overlapping communities in dynamic networks: their detection and mobile applications  

Science Conference Proceedings (OSTI)

Many practical problems on Mobile networking, such as routing strategies in MANETs, sensor reprogramming in WSNs and worm containment in online social networks (OSNs) share an ubiquitous, yet interesting feature in their organizations: community structure. ... Keywords: communication network, community detection, forwarding routing strategies, mobile network, worm containment

Nam P. Nguyen; Thang N. Dinh; Sindhura Tokala; My T. Thai

2011-09-01T23:59:59.000Z

420

Mitigating multi-path fading in a mobile mesh network  

Science Conference Proceedings (OSTI)

By using robots as routers, a team of networked robots can provide a communication substrate to establish a wireless mesh network. The mobile mesh network can autonomously optimize its configuration, increasing performance. One of the main sources of ... Keywords: Complex environments, Distributed optimization, Experimental and prototype results, Mobile and wireless ad-hoc networks, Multi-path fading

Marcos A. M. Vieira, Matthew E. Taylor, Prateek Tandon, Manish Jain, Ramesh Govindan, Gaurav S. Sukhatme, Milind Tambe

2013-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Agent-based social networking for mobile user  

Science Conference Proceedings (OSTI)

Nowadays, social network services play an important role in users' everyday lives. This is especially emphasised in lives of users that belong to Generation Y. Young people often communicate and share various personal information with their family, ... Keywords: MAS, agent-based systems, agents, m-users, mobile networks, mobile users, multi-agent systems, social networking, social networks, software agents

Rebeka Belavic; Marko Basuga; Vedran Podobnik; Ana Petric; Ignac Lovrek

2010-11-01T23:59:59.000Z

422

Communication: the neglected technical skill?  

Science Conference Proceedings (OSTI)

In this paper we discuss the importance of communication in software development. Communication has long been recognized as an important element of a successful software project. The quality of communication within the development team and between the ... Keywords: CMM, communication

Tracy Hall; David Wilson; Austen Rainer; Dorota Jagielska

2007-04-01T23:59:59.000Z

423

How Evolving Network Access and Network Management Technologies are Redefining the Competitive Wireless Markets  

Science Conference Proceedings (OSTI)

This paper examines some of the key problems users encounter when accessing current generation wireless networks. Using a case study of a hypothetical user, the authors explore the emerging services and the new broadband wireless network technologies ... Keywords: Autonomic Communications, Broadband Wireless Access Technologies, Cognitive Wireless Networks, Short and Long-Term Service Contracts, Two-Sided Markets, User-Centric Services

Fernando Beltrán; Jairo A. Gutiérrez; José Luis Melús

2011-07-01T23:59:59.000Z

424

An Integrated Modeling Framework for Exploring Network Reconfiguration of Distributed Controlled Homogenous Power Inverter Network using Composite Lyapunov Function Based Reachability Bound  

Science Conference Proceedings (OSTI)

We describe an integrated modeling framework for an interactive power network (IPN) consisting of a power network (PN) and a wireless communication network (WCN). The PN is modeled using a set of piecewise linear (PWL) equations. The WCN is modeled using ... Keywords: Lyapunov stability, Markov-chain model, communication network, distributed control systems, electric power network, joint optimization, linear matrix inequality, optimization, piecewise linear systems, reaching conditions, stability, switching power converters, wireless

Sudip K. Mazumder; Muhammad Tahir; Kaustuva Acharya

2010-02-01T23:59:59.000Z

425

On Building Inexpensive Network Capabilities  

Science Conference Proceedings (OSTI)

There are many deployed approaches for blocking unwanted traffic, either once it reaches the recipient's network, or closer to its point of origin. One of these schemes is based on the notion of traffic carrying capabilities that grant access to a network and/or end host. However, leveraging capabilities results in added complexity and additional steps in the communication process: Before communication starts a remote host must be vetted and given a capability to use in the subsequent communication. In this paper, we propose a lightweight mechanism that turns the answers provided by DNS name resolution---which Internet communication broadly depends on anyway---into capabilities. While not achieving an ideal capability system, we show the mechanism can be built from commodity technology and is therefore a pragmatic way to gain some of the key benefits of capabilities without requiring new infrastructure.

Shue, Craig A [ORNL; Kalafut, Prof. Andrew [Grand Valley State University (GVSU), Michigan; Allman, Mark [International Computer Science Institute (ICSI); Taylor, Curtis R [ORNL

2011-01-01T23:59:59.000Z

426

CS 535- Wireless Network Security  

E-Print Network (OSTI)

This is a 3-credit course that focuses on security and privacy issues in wireless networks and systems. Generally the security of MAC and especially upper layers are considered in this class. This course is not intended to cover cryptography in detail, but an overview of cryptography will be given at the beginning of the course so that the students who do not know cryptography would have sufficient information to understand the rest of the course. Although the catalogue information for this course (see below) several sub areas of wireless network security, in this course we will focus on ad hoc and sensor network security. Catalogue Data: This course covers security and privacy issues in wireless networks and systems, such as cellular networks, wireless LANs, wireless PANs, mobile ad hoc networks, vehicular networks, satellite networks, wireless mesh networks, sensor networks and RFID systems. Security problems of MAC and especially upper layers will be emphasized. Attacks and proposed solutions at several layers, authentication, key distribution and key management, secure routing, selfish and malicious behaviors, and secure group communication are analyzed for applicable wireless network types. A short overview of cryptography and wireless networking principles will be given at the beginning of the course. Prerequisite: Formally there is no prerequisite for this course, but students are expected to come with undergrad level computer networks background. Moreover, computer-programming expertise is necessary. Instructor: Schedule:

Albert Levi

2008-01-01T23:59:59.000Z

427

Advanced mobile networking, sensing, and controls.  

SciTech Connect

This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

2005-03-01T23:59:59.000Z

428

Definition: Two-Way Communications (High Bandwidth) | Open Energy  

Open Energy Info (EERE)

Two-Way Communications (High Bandwidth) Two-Way Communications (High Bandwidth) Jump to: navigation, search Dictionary.png Two-Way Communications (High Bandwidth) A two-way communications infrastructure that can network one or more parts of the smart grid via secure, high speed, high bandwidth connections. This infrastructure system serves as the backbone of the customer systems, AMI, distribution, and transmission smart grid systems.[1] View on Wikipedia Wikipedia Definition A smart meter is usually an electrical meter that records consumption of electric energy in intervals of an hour or less and communicates that information at least daily back to the utility for monitoring and billing purposes. Smart meters enable two-way communication between the meter and the central system. Unlike home energy monitors,

429

System architecture directions for networked sensors  

Science Conference Proceedings (OSTI)

Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the physical world and spread throughout our environment like smart dust. The ...

Jason Hill; Robert Szewczyk; Alec Woo; Seth Hollar; David Culler; Kristofer Pister

2000-12-01T23:59:59.000Z

430

Designing manycore processor networks using silicon photonics  

E-Print Network (OSTI)

We present a vertical integration approach for designing silicon photonic networks for communication in manycore systems. Using a top-down approach we project the photonic device requirements for a 64-tile system designed ...

Stojanovic, Vladimir Marko

431

Maximizing degrees of freedom in wireless networks  

E-Print Network (OSTI)

We consider communication from a single source to a single destination in a wireless network with fading. Both source and destination have multiple antennas. The information reaches the destination through a sequence of ...

Borade, Shashibhushan Prataprao, 1981-

2004-01-01T23:59:59.000Z

432

Krill: An exploration in underwater sensor networks  

E-Print Network (OSTI)

While sensor networks have now become very popular on land, the underwater environment still poses some difficult problems. Communication is one of the difficult challenges under water. There are two options:

I Vasilescu; K Kotay; D Rus; L Overs; P Sikka; M Dunbabin; P Chen; P Corke

2005-01-01T23:59:59.000Z

433

Electronic shepherd - a low-cost, low-bandwidth, wireless network system  

Science Conference Proceedings (OSTI)

This paper reports a new novel low-cost, wireless communication network system, called the "Electronic Shepherd" (ES). The system is innovative in the way that it supports flock behavior, meaning that a flock leader monitors the state of the other elements ... Keywords: GPRS, GPS, animal tracking, cost-effective communication, low-power equipment, rural computing, short-range communication, wireless network

Bjørn Thorstensen; Tore Syversen; Trond-Are Bjørnvold; Tron Walseth

2004-06-01T23:59:59.000Z

434

Security in Wireless Data Networks: A Survey Paper  

E-Print Network (OSTI)

Security in Wireless Data Networks: A Survey Paper Abdel-Karim R. Al Tamimi abdelkarim.tamimi@gmail.com Abstract Both security and wireless communication will remain an interesting subject for years to come jeopardizing the communicated content. This paper illustrates the key concepts of security, wireless networks

Jain, Raj

435

Computer Networking Group | Stanford Synchrotron Radiation Lightsource  

NLE Websites -- All DOE Office Websites (Extended Search)

Networking Group Networking Group Do you need help? For assistance please submit a CNG Help Request ticket. CNG Logo Chris Ramirez SSRL Computer and Networking Group Manager (650) 926-2901 | email Jerry Camuso SSRL Computer and Networking (650) 926-2994 | email Networking Support The Networking group provides connectivity and communications services for SSRL. The services provided by the Networking Support Group include: Local Area Network support for cable and wireless connectivity. Installation and maintenance of network printers and queues. Telephony installations and support. Printing Support The Networking group provides printer maintenance and support for SSRL Beamline Printers and plotters. The following models are supported: HP - Designjet large format plotters HP - Color and B/W Laserjet, Inkjet, Deskjet, Officejet

436

FUTURE POWER GRID INITIATIVE Next Generation Network  

E-Print Network (OSTI)

designed by PNNL and currently being deployed in the AEP gridSMART Demonstration Project, and » developed that will position PNNL as the leader in modeling and planning power grid data communication networks. External users scenarios and testing of communication requirements with smart grid investments. November 2012 PNNL-SA-90012

437

Local, sustainable, small-scale cellular networks  

Science Conference Proceedings (OSTI)

Over five billion people are active cellular subscribers, spending over a trillion dollars a year on communications. Despite this, hundreds of millions of people are still not connected. Implicit in these networks is a top-down design, with large nation-scale ... Keywords: information and communications technology for development, legal factors

Kurtis Heimerl, Shaddi Hasan, Kashif Ali, Eric Brewer, Tapan Parikh

2013-12-01T23:59:59.000Z

438

Fusion Communication Summit cover  

NLE Websites -- All DOE Office Websites (Extended Search)

COMMUNICATIONS SUMMIT for U.S. Magnetic Fusion September 12-13, 2012 Princeton University - Frist Campus Center Princeton, New Jersey, USA Mission Statement Announcements...

439

Report: EM Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM Communications EM Communications August 24, 2006 Submitted by: The EMAB Communications Team Background: At the March 2006 Environmental Management Advisory Board (EMAB) meeting, the Assistant Secretary for Environmental Management (EM) and his staff unveiled the proposed organization for EM. The purpose of the reorganization is to structure the workforce across the EM complex in a way that could ensure maximum and sustained focus on EM's mission -"to complete the cleanup of the contaminated nuclear weapons manufacturing and testing sites across the United States". After the presentation, EMAB members noted that a separate communications function was not included in the proposed organization, which EM staff acknowledged was a possible, unmet need.

440

Communications Scorecard for EPA's  

NLE Websites -- All DOE Office Websites (Extended Search)

and final weigh-ins. Competitors can get points by communicating the importance of saving energy to their stakeholders, whether they're employees, tenants, students,...

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Business Data Communications  

Science Conference Proceedings (OSTI)

From the Book:PREFACE: Preface Background Four trends have made a solid understanding of the fundamentals of data communications essential to business and information management students: The ...

William Stallings

1990-11-01T23:59:59.000Z

442

Multimodal analysis of body sensor network data streams for real-time healthcare  

Science Conference Proceedings (OSTI)

Fundamental advances in low power circuits, wireless communication, physiological sensor design, and multimedia stream processing, have led to the deployment of body sensor networks for the real-time monitoring of individual health in diverse settings. ... Keywords: body sensor networks, multi-modal analysis, sensor networks, systems and communications

Manoj K. Garg; Duk-Jin Kim; Deepak S. Turaga; Balakrishnan Prabhakaran

2010-03-01T23:59:59.000Z

443

Applications of WiMAX-based wireless mesh network in monitoring wind farms  

Science Conference Proceedings (OSTI)

This paper has studied the feasibility of applying World Interoperability for Microwave Access (WiMAX) based Wireless Mesh Networks (WMNs) in monitoring wind farms. WMNs provide a dynamic topology which meets the requirements of communications ... Keywords: WMNs, WiMAX, World Interoperability for Microwave Access, communications, renewable energy, simulation, wind energy, wind farm monitoring, wind farms, wind power, wireless mesh networks, wireless networks

Gang Zheng; Hongbing Xu; Xinheng Wang; Jianxiao Zou

2010-09-01T23:59:59.000Z

444

An efficient reliable broadcasting protocol for wireless mobile ad hoc networks  

Science Conference Proceedings (OSTI)

The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). ... Keywords: Broadcast storm, Mobile ad hoc network (MANET), Mobile computing, Reliable broadcast, Wireless communication

Chih-Shun Hsu; Yu-Chee Tseng; Jang-Ping Sheu

2007-04-01T23:59:59.000Z

445

Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks  

Science Conference Proceedings (OSTI)

A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They ... Keywords: cc2420 security, group key distribution, sensor network security

Morten Tranberg Hansen

2009-03-01T23:59:59.000Z

446

Processus communicants Communication synchrone CSP/CCS/-calcul  

E-Print Network (OSTI)

Processus communicants Communication synchrone CSP/CCS/-calcul Rendez-vous étendu Ada Huitième partie Processus communicants CSP/Ada Systèmes concurrents 2 / 44 #12;Processus communicants Communication synchrone CSP/CCS/-calcul Rendez-vous étendu Ada Principes Synchronisation Désignation

Grigoras, .Romulus

447

Experimenting with Infrastructures Bjorn Stahl Luong Le Thanh Raphael Caire Rune Gustavsson  

E-Print Network (OSTI)

for the sup- port of a very wide range of industrial SCADA protocols. The communication between the supervisor

Paris-Sud XI, Université de

448

2012 SG Peer Review - Recovery Act: Enhanced Demand and Distribution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* Communications infrastructure * SCADA To advance the deployment of the smart grid through: * Demonstration of effective technology * Advancement of cyber security *...

449

An energy efficient clustering protocol for routing in Wireless Sensor Network  

Science Conference Proceedings (OSTI)

In Wireless Sensor Network (WSN), the power supply is generally a non-renewable battery, consequently, energy effectiveness is a crucial factor. To maximise the battery life and therefore the duration of network service, a robust wireless ... Keywords: WSNs, battery life, dynamic clustering, energy efficiency, energy efficient clustering, network lifetime, simulation, wireless communications, wireless networks, wireless sensor networks

Ouadoudi Zytoune; Mohamed El Aroussi; Driss Aboutajdine

2011-12-01T23:59:59.000Z

450

Bounding errors introduced by clustering of customers in closed product-form queuing networks  

Science Conference Proceedings (OSTI)

Product-form queuing network models have been widely used to model systems with shared resources such as computer systems (both centralized and distributed), communication networks, and flexible manufacturing systems. Closed multichain product-form networks ... Keywords: balance equation, closed network, clustering, error bound, product-form, quasi-reversibility, queuing network

William C. Cheng; Richard R. Muntz

1996-07-01T23:59:59.000Z

451

A unified architectural model for on-demand user-centric communications  

E-Print Network (OSTI)

The rapid growth of networking technologies has drastically changed the way we communicate and enabled a wide range of communication applications. However, these applications have been conceived, designed, and developed separately with little or no connection to each other, resulting in a fragmented and incompatible set of technologies and products. Building new communication applications requires a lengthy and costly development cycle, which severely limits the pace of innovation. Current applications are also typically incapable of responding to changes in user communication needs as well as changing network infrastructure and device technology. In this article, we address these issues and present the Unified Communication Model (UCM), a new and user-centric approach for conceiving, generating, and delivering communication applications on-demand. We also introduce a prototype design and implementation of UCM and discuss future research directions toward realizing next generation communication applications. 1.

Yi Deng; S. Masoud Sadjadi; Peter Clarke; Chi Zhang; Vagelis Hristidis; Raju Rangaswami; Nagarajan Prabakar

2005-01-01T23:59:59.000Z

452

Mobile communications in China  

Science Conference Proceedings (OSTI)

China now has the world's largest mobile communications market. In the past several years, a series of major reforms have been carried out in China's telecom industry, aiming at separating administrative and enterprise functions, breaking monopoly ... Keywords: 3G mobile services, China, TD-SCDMA, WTO, World Trade Organization, mobile communications

Ying Dong; Mingshu Li

2004-12-01T23:59:59.000Z

453

The influence of organizational hierarchy and departmental structure on communication : the case of Kaplan and Norton's Balanced scorecard in a matrix organization  

E-Print Network (OSTI)

A large business requires efficient and effective internal communication among employees to achieve its goals. Dodds, Watts, and Sable (DWS) introduced a communication network model assessing information flow within a ...

Kopp, James Clayton

2010-01-01T23:59:59.000Z

454

Satellite-Based Quantum Communications  

SciTech Connect

Single-photon quantum communications (QC) offers the attractive feature of 'future proof', forward security rooted in the laws of quantum physics. Ground based quantum key distribution (QKD) experiments in optical fiber have attained transmission ranges in excess of 200km, but for larger distances we proposed a methodology for satellite-based QC. Over the past decade we have devised solutions to the technical challenges to satellite-to-ground QC, and we now have a clear concept for how space-based QC could be performed and potentially utilized within a trusted QKD network architecture. Functioning as a trusted QKD node, a QC satellite ('QC-sat') could deliver secret keys to the key stores of ground-based trusted QKD network nodes, to each of which multiple users are connected by optical fiber or free-space QC. A QC-sat could thereby extend quantum-secured connectivity to geographically disjoint domains, separated by continental or inter-continental distances. In this paper we describe our system concept that makes QC feasible with low-earth orbit (LEO) QC-sats (200-km-2,000-km altitude orbits), and the results of link modeling of expected performance. Using the architecture that we have developed, LEO satellite-to-ground QKD will be feasible with secret bit yields of several hundred 256-bit AES keys per contact. With multiple ground sites separated by {approx} 100km, mitigation of cloudiness over any single ground site would be possible, potentially allowing multiple contact opportunities each day. The essential next step is an experimental QC-sat. A number of LEO-platforms would be suitable, ranging from a dedicated, three-axis stabilized small satellite, to a secondary experiment on an imaging satellite. to the ISS. With one or more QC-sats, low-latency quantum-secured communications could then be provided to ground-based users on a global scale. Air-to-ground QC would also be possible.

Hughes, Richard J [Los Alamos National Laboratory; Nordholt, Jane E [Los Alamos National Laboratory; Mc Cabe, Kevin P [Los Alamos National Laboratory; Newell, Raymond T [Los Alamos National Laboratory; Pterson, Charles G [Los Alamos National Laboratory

2010-09-20T23:59:59.000Z

455

RPM §9.02. Operational Procedures for Computing and Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 Operational Procedures for Computing and Communications Revised 09/08 Communications and Networking Systems Communications and Networking Management ICS Voice Telephone System ICS Data-Switching System LBLnet ICS-Dedicated Wiring and Optical-Fiber Systems Public Address System Public Address System Announcements Radio Communications Systems Radio Paging Systems Radio Emissions Standards and Spectrum Management Card Access, Security, Alarms, and Surveillance Systems Video, Fiber-Optic, and Other Signal Systems Video Teleconferencing Remote Access Services Electronic Access Background Fundamental Principles and Characteristics Kinds of Access Forms of Electronic Publishing Use of Information Systems and Services Background Definitions Scope Fundamental Principles General Page and File Policy

456

Formalizing and Analyzing the Train-to-Wayside Network System for CBTC  

Science Conference Proceedings (OSTI)

In the development of communication based train control (CBTC) system, while communicating with the control center, the train must be assigned accurately to the wayside network. In order to verify the rigor of this process, the specification is analyzed ...

Guo Xie; Xinhong Hei; Hiroshi Mochizuki; Sei Takahashi; Hideo Nakamura

2012-11-01T23:59:59.000Z

457

Research Challenges and Applications for Underwater Sensor Networking  

E-Print Network (OSTI)

This paper explores applications and challenges for underwater sensor networks. We highlight potential applications to off-shore oilfields for seismic monitoring, equipment monitoring, and underwater robotics. We identify research directions in shortrange acoustic communications, MAC, time synchronization, and localization protocols for high-latency acoustic networks, longduration network sleeping, and application-level data scheduling. We describe our preliminary design on short-range acoustic communication hardware, and summarize results of high-latency time synchronization.

John Heidemann; Wei Ye; Jack Wills; Affan Syed; Yuan Li

2006-01-01T23:59:59.000Z

458

Topology management in ad hoc networks  

Science Conference Proceedings (OSTI)

The efficiency of a communication network depends not only on its control protocols, but also on its topology. We propose a distributed topology management algorithm that constructs and maintains a backbone topology based on a minimal dominating set ... Keywords: ad hoc networks, connected dominating set, minimum dominating set

Lichun Bao; J. J. Garcia-Luna-Aceves

2003-06-01T23:59:59.000Z

459

Parallel data transfer network controlled by a dynamically reconfigurable serial network  

DOE Patents (OSTI)

This patent is a real time high density data communication system designed to operate efficiently in a dynamically configurable, multiprocessor parallel processing environment. In this design a serial communication network is utilized to disseminate commands from a master processor to the slave processors, to control transmission of high density data, to effect communication protocol, and to monitor the status of each slave processor. A parallel channel communication network is utilized in conjunction with two triple port memories at each processor node in the system to efficiently transmit high density data for sustained or burst intervals without having to interleave communication control messages. Each processor node includes a transputer, a digital signal processor, a parallel transfer controller. A very low software overhead time for starting and ending the transfer of data is incurred using this design in contrast with a scalable coherent interface system in which 25% of transmission time is devoted to the communication protocol.

Crosetto, D.B.

1992-01-01T23:59:59.000Z

460

Ex parte Communication | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Communication Ex parte Communication Ex parte communication on AHAM's development of an ice maker energy test procedure Ex parte Communication More Documents & Publications...

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

462

Self-* in Multimedia Communication Overlays  

Science Conference Proceedings (OSTI)

Multimedia Communication Systems (MCSs) usually deploy complex data distribution overlays, making the efficient interchange of multimedia content possible. The time constraints imposed by interactive communications further complicate the management of ... Keywords: Autonomic computing, Multimedia Communication Systems, Overlays, Self-*, Taxonomy

Pelayo NuñO; Juan C. Granda; Francisco J. SuáRez; Daniel F. GarcíA

2013-04-01T23:59:59.000Z

463

Noncollective communicator creation in MPI  

Science Conference Proceedings (OSTI)

MPI communicators abstract communication operations across application modules, facilitating seamless composition of different libraries. In addition, communicators provide the ability to form groups of processes and establish multiple levels of parallelism. ...

James Dinan; Sriram Krishnamoorthy; Pavan Balaji; Jeff R. Hammond; Manojkumar Krishnan; Vinod Tipparaju; Abhinav Vishnu

2011-09-01T23:59:59.000Z

464

Re: Implementing the National Broadband Plan by Studying the Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Studying the Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy Re: Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy Alcatel-Lucent ("ALU") appreciates the opportunity to contribute to the Department of Energy's ("Department") Request for Information ("RFI")1 to better understand the communications requirements of utilities, including the requirements of Smart Grid Technology. ALU sees smart grid as one of several solutions offered by the technological advances and widespread deployment of broadband networks. While in its comments ALU addresses the narrow issues raised specifically in the Department's RFI, these comments also convey broader policy

465

Roadmap for Testing and Validation of Electric Vehicle Communication Standards  

SciTech Connect

Vehicle to grid communication standards are critical to the charge management and interoperability among plug-in electric vehicles (PEVs), charging stations and utility providers. The Society of Automobile Engineers (SAE), International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and the ZigBee Alliance are developing requirements for communication messages and protocols. While interoperability standards development has been in progress for more than two years, no definitive guidelines are available for the automobile manufacturers, charging station manufacturers or utility backhaul network systems. At present, there is a wide range of proprietary communication options developed and supported in the industry. Recent work by the Electric Power Research Institute (EPRI), in collaboration with SAE and automobile manufacturers, has identified performance requirements and developed a test plan based on possible communication pathways using power line communication (PLC). Though the communication pathways and power line communication technology options are identified, much work needs to be done in developing application software and testing of communication modules before these can be deployed in production vehicles. This paper presents a roadmap and results from testing power line communication modules developed to meet the requirements of SAE J2847/1 standard.

Pratt, Richard M.; Tuffner, Francis K.; Gowri, Krishnan

2012-07-12T23:59:59.000Z

466

CAT Communicator | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Division XSD Groups Industry Argonne Home Advanced Photon Source News Archives CAT Communicator CAT Communicator was a newsletter intended to provide APS information to...

467

ORISE: Crisis and Risk Communication  

NLE Websites -- All DOE Office Websites (Extended Search)

and Risk Communication Because a natural disaster, act of terrorism or other public emergency can happen without notice, having a planned, coordinated communication effort is...

468

Organizations and Networks | Open Energy Information  

Open Energy Info (EERE)

Organizations and Networks Organizations and Networks (Redirected from Gateway:International/Networks) Jump to: navigation, search Registered Technical and Research Organizations Networks Climate Eval "The website promotes active debate on areas relevant to evaluation of climate change and development evaluation by bringing relevant topics to a peer to peer discussion forum." Coordinated Low Emissions Assistance Network (CLEAN) CLEAN aims to improve communication and coordination by bringing together national and international organizations that are assisting developing countries with preparation and implementation of low greenhouse gas emission plans and strategies. This includes support for technology needs assessments, for low carbon and clean energy development plans, and

469

200 ORGANIZATIONAL CULTURE AND NETWORK EMBEDDEDNESS  

E-Print Network (OSTI)

A question that has been neglected in network research is where differences in network embeddedness come from. The network literature reveals that there are three key characteristics of embedded relationships: trust, open communication, and joint problem solving. On the basis of the sparse empirical studies of factors leading to network embeddedness, we identify organizational culture as a potentially important organizational-level factor. Building on empirical organizational culture studies we select ten dimensions of organizational culture that for theoretical and/or empirical reasons can be linked to network embeddedness, and formulate propositions concerning their effects.

G. Noorderhaven; Carla I. Koen; Sjoerd Beugelsdijk; Niels G. Noorderhaven; Carla I. Koen; Sjoerd Beugelsdijk

2002-01-01T23:59:59.000Z

470

An Intelligent Network Selection Strategy Based on MADM Methods in Heterogeneous Networks  

E-Print Network (OSTI)

Providing service continuity to the end users with best quality is a very important issue in the next generation wireless communications. With the evolution of the mobile devices towards a multimode architecture and the coexistence of multitude of radio access technologies (RAT's), the users are able to benefit simultaneously from these RAT's. However, the major issue in heterogeneous wireless communications is how to choose the most suitable access network for mobile's user which can be used as long as possible for communication. To achieve this issue, this paper proposes an intelligent network selection strategy which combines two multi attribute decision making (MADM) methods such as analytic network process (ANP) and the technique for order preference by similarity to an ideal solution (TOPSIS) method. The ANP method is used to find the differentiate weights of available networks by considering each criterion and the TOPSIS method is applied to rank the alternatives. Our new strategy for network selection...

Lahby, Mohamed; Adib, Abdellah; 10.5121/ijwmn.2012.4106

2012-01-01T23:59:59.000Z

471

Radio frequency fingerprinting commercial communication devices to enhance electronic security  

Science Conference Proceedings (OSTI)

There is a current shift toward protecting against unauthorised network access at the open systems interconnection physical layer by exploiting radio frequency characteristics that are difficult to mimic. This work addresses the use of RF 'fingerprints' ... Keywords: Fisher linear discriminant, OSI, PHY layer authentication, RF fingerprinting, RF forensics, SEI, access authorisation, anti-spoofing, burst detection, commercial communication devices, electronic security, feature generation, multiple discriminant analysis, network access, physical layer authentication, radio frequency fingerprinting, signal features, specific emitter identification, transient detection

William C. Suski II; Michael A. Temple; Michael J. Mendenhall; Robert F. Mills

2008-10-01T23:59:59.000Z

472

The Use of Demand-wise Shared Protection in Creating Topology Optimized High Availability Networks.  

E-Print Network (OSTI)

??In order to meet the availability requirements of modern communication networks, a number of survivability techniques were developed that adapt the demand-wise shared protection design… (more)

Todd, Brody

2009-01-01T23:59:59.000Z

473

Technology Challenges in the Development of Wireless Personal Area Networks  

Science Conference Proceedings (OSTI)

Wireless personal area networks (WPANs) will be major components of the heterogeneous communication environment of the future. The devices in a WPAN must be low cost and operate for a long time from a battery. As a consequence, they pose demanding ... Keywords: 4G networks, packaging technology, processing technology, wireless personal area networks

Marc Engels

2002-08-01T23:59:59.000Z

474

Data sampling control, compression and query in sensor networks  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks have very limited storage capacity, computing ability and battery power. Node failure and communication link disconnection occur frequently, which means weak services of the network layer. Sensed data is inaccurate which ... Keywords: data accuracy, data compression, data sampling, energy efficiency, power limitation, query, sampling frequency control, sensor networks

Jinbao Li; Jianzhong Li

2007-04-01T23:59:59.000Z

475

Hybrid trust and reputation management for sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sensor networks need to be lightweight in terms of computational and communication ... Keywords: Reputation management, Sensor networks, Trust establishment

Efthimia Aivaloglou; Stefanos Gritzalis

2010-07-01T23:59:59.000Z

476

Cluster based dynamic routing on powerline carrier network  

Science Conference Proceedings (OSTI)

Topology of power line carrier network (PLCN) is complex, fast changeable and its channel is time-variant. To enhance the availability and effectiveness of network communication, a cluster based dynamic routing algorithm (CBDR) is proposed in the paper. ... Keywords: cluster algorithm, dynamic route, powerline carrier network, tree-topology

Hong Li; Wang Kensheng; Li Shurong; Zou Weixia; Zhou Zheng

2009-09-01T23:59:59.000Z

477

Minimum cost multiple multicast network coding with quantized rates  

Science Conference Proceedings (OSTI)

In this paper, we consider multiple multicast sessions with intra-session network coding where rates over all links are integer multiples of a basic rate. Although having quantized rates over communication links is quite common, conventional minimum ... Keywords: Decomposition algorithm, Multicast networks, Network coding

M. A. Raayatpanah; H. Salehi Fathabadi; B. H. Khalaj; S. Khodayifar

2013-04-01T23:59:59.000Z

478

Clustering social networks using interaction semantics and sentics  

Science Conference Proceedings (OSTI)

The passage from a static read-only Web to a dynamic read-write Web gave birth to a huge amount of online social networks with the ultimate goal of making communication easier between people with common interests. Unlike real world social networks, however, ... Keywords: NLP, sentic computing, social network analysis

Praphul Chandra; Erik Cambria; Amir Hussain

2012-07-01T23:59:59.000Z

479

Forward correction and fountain codes in delay-tolerant networks  

Science Conference Proceedings (OSTI)

Delay-tolerant ad hoc networks leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are out of range of each other. To decrease delivery delay, the information to be delivered ... Keywords: delay-tolerant networks (DTNs), forward correction, fountain codes, mobile ad hoc networks

Eitan Altman; Francesco De Pellegrini

2011-02-01T23:59:59.000Z

480

Adaptive design optimization of wireless sensor networks using genetic algorithms  

Science Conference Proceedings (OSTI)

We present a multi-objective optimization methodology for self-organizing, adaptive wireless sensor network design and energy management, taking into consideration application-specific requirements, communication constraints and energy-conservation characteristics. ... Keywords: Adaptive network design, Energy conservation, Genetic algorithms, Optimal design, Wireless sensor networks

Konstantinos P. Ferentinos; Theodore A. Tsiligiridis

2007-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "network scada communications" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Underwater sensor networking: Research challenges and potential applications  

E-Print Network (OSTI)

This report summarizes our research directions in underwater sensor networks. We highlight potential applications to off-shore oilfields for seismic monitoring, equipment monitoring, and underwater robotics. We identify research directions in short-range acoustic communications, MAC, time synchronization, and localization protocols for highlatency acoustic networks, long-duration network sleeping, and application-level data scheduling. 1

John Heidemann; Yuan Li; Affan Syed; Jack Wills; Wei Ye

2006-01-01T23:59:59.000Z

482

Towards a routing framework in ad hoc space networks  

Science Conference Proceedings (OSTI)

A routing framework called Space Gateway Routing (SGR) is proposed for routing through Autonomous Regions (ARs) in ad hoc space networks. SGR has two integral parts: External SGR (ESGR) and Interior SGR (ISGR). ESGR ... Keywords: ad hoc networks, autonomous regions, contact allocation, data delivery, inter-region message scheduling, remote control messages, space communications, space gateway routing, space missions, space networks

Chao Chen; Zesheng Chen

2010-12-01T23:59:59.000Z

483

Distributed scheduling schemes for wireless mesh networks: A survey  

Science Conference Proceedings (OSTI)

An efficient scheduling scheme is a crucial part of Wireless Mesh Networks (WMNs)—an emerging communication infrastructure solution for autonomy, scalability, higher throughput, lower delay metrics, energy efficiency, and other service-level guarantees. ... Keywords: Wireless mesh networks, ad hoc networks, cyclic access, distributed scheduling schemes, pseudo-random access, random access

Kanthaiah Sivapragasam Vijayalayan, Aaron Harwood, Shanika Karunasekera

2013-10-01T23:59:59.000Z

484

On Communication and Computation  

Science Conference Proceedings (OSTI)

Comparing technical notions of communication and computation leads to a surprising result, these notions are often not conceptually distinguishable. This paper will show how the two notions may fail to be clearly distinguished from each other. The most ...

Paul Bohan Broderick

2004-02-01T23:59:59.000Z

485

Communicating with dolphins  

NLE Websites -- All DOE Office Websites (Extended Search)

they are, we can't as yet understand their language any better than we do the bark of a dog. For a little more information on how we communicate with both dolphins and dogs,...

486

Programmable synchronous communications module  

SciTech Connect

The functional characteristics of a programmable, synchronous serial communications CAMAC module with buffering in block format are described. Both bit and byte oriented protocols can be handled in full duplex depending on the program implemented. The main elements of the module are a Signetics 2652 Multi-Protocol Communications Controller, a Zilog Z-808 8 bit microprocessor with PROM and RAM, and FIFOs for buffering. (FS)

Horelick, D.

1979-10-01T23:59:59.000Z

487

LANL application communication patterns  

SciTech Connect

This brief presentation describes the communication patterns used by a set of unclassified applications developed at Los Alamos National Laboratory: XNobel/XRAGE/RAGE/SAGE, Krak, Sweep3D, and Partisn. It mentions which processes communicate with which other processes, whether the application is typically run in a strong-scaling mode or a weak-scaling mode, what message sizes are commonly used, and how the application's performance changes at scale.

Pakiin, Scott [Los Alamos National Laboratory

2011-01-10T23:59:59.000Z

488

Network Upgrade for the SLC: PEP II Network  

SciTech Connect

The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status information is included.

Crane, M.; Call, M.; Clark, S.; Coffman, F.; Himel, T.; Lahey, T.; Miller, E.; Sass, R.; /SLAC

2011-09-09T23:59:59.000Z

489

IBM Global Services A Strategic Approach to Protecting  

E-Print Network (OSTI)

operating systems and network infrastructure upon which they rely, and to SCADA protocol-specific weaknesses any network closures in the event of a hardware failure · It's equipped with full SCADA protocol

490

Performance of variable bit rate wireless communication systems over Nakagami fading channels  

Science Conference Proceedings (OSTI)

Currently, several wireless standards, both for voice and data communications as well as wireless local area networks, achieve a variable bit rate by different combinations of either binary or non-binary modulation and convolutional codes having different ...

Patrick Count; Clark Robertson

2003-10-01T23:59:59.000Z

491

Energy-optimized image communication on resource-constrained sensor platforms  

Science Conference Proceedings (OSTI)

Energy-efficient image communication is one of the most important goals for a large class of current and future sensor network applications. This paper presents a quantitative comparison between the energy costs associated with 1) direct transmission ...

Dong-U Lee; Hyungjin Kim; Steven Tu; Mohammad Rahimi; Deborah Estrin; John D. Villasenor

2007-04-01T23:59:59.000Z

492

A survey of UNI signaling systems and protocols for ATM networks  

Science Conference Proceedings (OSTI)

The main aspect covered by signaling systems and protocols for ATM networks concerns the possibility to manage, maintain, and control a user-driven communication between arbitrary ATM end-systems connected to an ATM network. The tasks and procedures ...

Burkhard Stiller

1995-04-01T23:59:59.000Z

493

Apples-to-apples: a framework analysis for energy-efficiency in networks  

Science Conference Proceedings (OSTI)

Research on energy-efficiency of communication networks has already gained the attention of a broad research community. Specifically, we consider efforts towards improving environmental sustainability by making networks energyaware. An important step ...

Aruna Prem Bianzino; Anand Kishore Raju; Dario Rossi

2011-01-01T23:59:59.000Z

494

Energy Scalability of On-Chip Interconnection Networks in Multicore Architectures  

E-Print Network (OSTI)

On-chip interconnection networks (OCNs) such as point-to-point networks and buses form the communication backbone in systems-on-a-chip, multicore processors, and tiled processors. OCNs can consume significant portions of ...

Agarwal, Anant

2008-11-11T23:59:59.000Z

495

Relativistic Quantum Communication  

E-Print Network (OSTI)

In this Ph.D. thesis, I investigate the communication abilities of non-inertial observers and the precision to which they can measure parametrized states. I introduce relativistic quantum field theory with field quantisation, and the definition and transformations of mode functions in Minkowski, Schwarzschild and Rindler spaces. I introduce information theory by discussing the nature of information, defining the entropic information measures, and highlighting the differences between classical and quantum information. I review the field of relativistic quantum information. We investigate the communication abilities of an inertial observer to a relativistic observer hovering above a Schwarzschild black hole, using the Rindler approximation. We compare both classical communication and quantum entanglement generation of the state merging protocol, for both the single and dual rail encodings. We find that while classical communication remains finite right up to the horizon, the quantum entanglement generation tends to zero. We investigate the observers' abilities to precisely measure the parameter of a state that is communicated between Alice and Rob. This parameter was encoded to either the amplitudes of a single excitation state or the phase of a NOON state. With NOON states the dual rail encoding provided greater precision, which is different to the results for the other situations. The precision was maximum for a particular number of excitations in the NOON state. We calculated the bipartite communication for Alice-Rob and Alice-AntiRob beyond the single mode approximation. Rob and AntiRob are causally disconnected counter-accelerating observers. We found that Alice must choose in advance with whom, Rob or AntiRob she wants to create entanglement using a particular setup. She could communicate classically to both.

Dominic Hosler

2013-06-20T23:59:59.000Z

496

Cognitive Aeronautical Communication System  

Science Conference Proceedings (OSTI)

The paper explores the system and architecture requirements for cognitive driven reconfigurable hardware for an aeronautical platform, such as commercial aircraft or high altitude platforms. With advances in components and processing hardware, mobile ... Keywords: Aeronautical Data Networks, Aeronautical Systems, Cognitive Data Networks, OFDM, Software Defined Radio

M. Erturk; Huseyin Arslan; Jamal Haque; Wilfrido Moreno

2011-01-01T23:59:59.000Z

497

SocialMapExplorer: visualizing social networks of massively multiplayer online games in temporal-geographic space  

Science Conference Proceedings (OSTI)

Massively Multiplayer Online Games (MMOGs) provide unique opportunities to investigate large social networks, such as player (working-group), trading, and communication (chat) networks. This paper presents a visualization tool -- SocialMapExplorer ... Keywords: MMOGs, network dynamics, social networks, temporal-geographic space, virtual networks, visualization

Y. Dora Cai; Channing Brown; Iftekhar Ahmed; Yannick Atouba; Andrew Pilny; Marshall Scott Poole

2013-07-01T23:59:59.000Z

498

Maximizing network lifetime based on transmission range adjustment in wireless sensor networks  

Science Conference Proceedings (OSTI)

In a wireless sensor network (WSN), the unbalanced distribution of communication loads often causes the problem of energy hole, which means the energy of the nodes in the hole region will be exhausted sooner than the nodes in other regions. This is a ... Keywords: Energy hole problem, Multi-objective optimization problem, NP hard, Wireless sensor networks

Chao Song; Ming Liu; Jiannong Cao; Yuan Zheng; Haigang Gong; Guihai Chen

2009-07-01T23:59:59.000Z

499

Magneto-inductive networked rescue system (MINERS): taking sensor networks underground  

Science Conference Proceedings (OSTI)

Wireless underground networks are an emerging technology which have application in a number of scenarios. For example, in a mining disaster, flooding or a collapse can isolate portions of underground tunnels, severing wired communication links and preventing ... Keywords: magnetic, magneto-inductive, mining, network, search and rescue, triaxial, underground

Andrew Markham; Niki Trigoni

2012-04-01T23:59:59.000Z

500

Extending ACNET communication types to include multicast semantics  

SciTech Connect

In Fermilab's accelerator control system, multicast communication wasn't properly incorporated into ACNET's transport layer, nor in its programming API. We present some recent work that makes multicasts naturally fit in the ACNET network environment. We also show how these additions provide high-availability for ACNET services.

Neswold, R.; King, C.; /Fermilab

2009-10-01T23:59:59.000Z