National Library of Energy BETA

Sample records for network scada communications

  1. Secure SCADA Communication ProtocolPerformance Test Results ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked...

  2. sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu Dept. of SIS control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed. This paper presents a suite of security protocols optimized for SCADA/DCS systems which include: point

  3. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  4. Hallmark Project Commercialization of the Secure SCADA Communications...

    Broader source: Energy.gov (indexed) [DOE]

    system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that...

  5. Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks

    E-Print Network [OSTI]

    Tronci, Enrico

    Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks A and Data Acquisition (SCADA) systems has led to an improvement of Power Grid operations and functionalities power grid services are increasingly depending upon the adequate functionality of SCADA system which

  6. Accurate Modeling of the Siemens S7 SCADA ... JDFSL V9N2 ACCURATE MODELING OF THE SIEMENS S7

    E-Print Network [OSTI]

    Wool, Avishai

    Accurate Modeling of the Siemens S7 SCADA ... JDFSL V9N2 ACCURATE MODELING OF THE SIEMENS S7 SCADA is commonly used in SCADA systems for communications between a Human Machine Interface (HMI.82% of the traffic was identified as normal. Keywords: network, intrusion-detection, SCADA, S7 1. INTRODUCTION

  7. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  8. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of a novel flow-based intrusion detection system. Based on the assumption that SCADA net- works are well facilities such as water distribution infrastructures, electricity generation plants and oil refineries need proposal to address the problem of intru- sion detection in SCADA networks. Based on the assumption

  9. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump

  10. Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network, Telco network and Power grid act as a whole heterogeneous network. While SCADA system and Telco network can be well represented by means of discrete event simulators. To represent a Power grid a continuous

  11. Intermediate SCADA Security Training Course Slides (September...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Documents & Publications Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Mitigations for...

  12. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    ). Keyword: SCADA, PLC, SCADA security, SCADA networks, PLC security, Trusted computing, TCM, TPM, Embedded). Nyckelord:SCADA, PLC, SCADA säkerhet, SCADA-nätverk, PLC säkerhet, pålitlig datoranvändning, TCM, TPM

  13. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  14. Introduction SCADA Security for Managers and Operators | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Intermediate SCADA Security Training Course Slides (September 2006) Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Recommended...

  15. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Attacks Against Water SCADA Systems . . . . . . . . . .2 d (bottom) [simulated results]. . Gignac SCADA supervisoryGignac canal network and SCADA system . . . . . . . . .

  16. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA FAQs SCADA FAQsTara Camacho-Lopez2015-06-22T22:14:43+00:...

  17. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  18. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems

  19. Int. J. Communication Networks and Distributed Systems, Vol. 6, No. 1, 2011 59 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Wang, Yongge

    Inderscience Enterprises Ltd. sSCADA: securing SCADA infrastructure communications Yongge Wang Department@uncc.edu Abstract: Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems the control systems. American Gas Association (AGA), IEC TC57 WG15, IEEE, NIST and National SCADA Test Bed

  20. Networked Loads in the Distribution Grid

    E-Print Network [OSTI]

    Wang, Zhifang; Li, Xiao; Muthukumar, Vishak; Scaglione, Anna; Peisert, Sean; McParland, Chuck

    2012-01-01

    is structured according to the SCADA model. Although thea prototypical instance of SCADA network in the distributionservers that are part of a SCADA system, which has grown in

  1. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed - Enhancing control systems security in the energy sector...

  2. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-11-04T14:51:33+00:00 SCADA History The use of Supervisory Control and Data Acquisition (SCADA) systems and process control systems became popular in the 1960s as a need arose to...

  3. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5-05-11T18:41:13+00:00 SCADA Security A Brief History The use of Supervisory Control and Data Acquisition (SCADA) systems and process control systems became popular in the 1960s as...

  4. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Testbeds Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  5. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA Program OverviewTara Camacho-Lopez2015-05-11T18:41:05+00...

  6. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  7. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  8. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  9. A Cyber Security Study of a SCADA Energy Management System: Stealthy

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State of state estimators in supervisory control and data acquisition (SCADA) systems for energy management on a state-of-the-art SCADA EMS software for a power network example with 14 substations, 27 buses, and 40

  10. Covert Communication Networks 

    E-Print Network [OSTI]

    Nix, Timothy Glen

    2013-08-02

    using shared keys assigned by the blender when a new jondo joins the crowd. Tor is the most popular anonymous communications system in use and is known as the second-generation onion router due to the fact that it is based on, and makes several modi... cations to the original onion routing design in terms of security, e - ciency, and deployability [17]. Tor uses a small set of trusted directory servers in order to distribute information about known onion routers in the network. In order to create a...

  11. Topics in network communications

    E-Print Network [OSTI]

    Cannons, Jillian Leigh

    2008-01-01

    in Electrical Engineering (Communication Theory and Systems)in Electrical Engineering (Communication Theory and Systems)Ph.D. in Electrical Engineering (Communication Theory and

  12. HYBRID MODELING OF COMMUNICATION NETWORKS USING MODELICA

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    HYBRID MODELING OF COMMUNICATION NETWORKS USING MODELICA Daniel F¨arnqvist Katrin Strandemar and simulation of communication networks using the modeling language Modelica are discussed. Congestion control model, that Modelica provides an efficient platform for the analysis of communication networks

  13. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National SCADA Testbed Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  14. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  15. Toward Survivable SCADA Jonathan Kirsch

    E-Print Network [OSTI]

    Feder, Jeffrey

    Toward Survivable SCADA Jonathan Kirsch Siemens Technology to Business Center 1995 University the first survivable SCADA system ­ one capable of providing correct behavior with minimal performance degra faced while at- tempting to integrate modern intrusion-tolerant protocols with the SCADA architecture

  16. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  17. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    acquisition (SCADA) systems. Several cyber attacks on SCADA systems operating power networks have been reported [3], and major blackouts are due to the misuse of the SCADA systems [4]. Power networks, being

  18. National SCADA Test Bed | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Energy Delivery Systems Cybersecurity National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind...

  19. Communication in automation, including networking and wireless

    E-Print Network [OSTI]

    Antsaklis, Panos

    Communication in automation, including networking and wireless Nicholas Kottenstette and Panos J and networking in automation is given. Digital communication fundamentals are reviewed and networked control are presented. 1 Introduction 1.1 Why communication is necessary in automated systems Automated systems use

  20. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W. (Idaho Falls, ID)

    2011-12-20

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The processing circuitry is configured to execute computer programming code. Storage media is coupled to the processing circuitry and includes computer programming code configured to cause the processing circuitry to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  1. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  2. Networked UAV Command, Control and Communication

    E-Print Network [OSTI]

    Frew, Eric W.

    Networked UAV Command, Control and Communication Jack Elston , Eric Frew , Brian Argrow University of Colorado, Boulder, CO, 80309, USA The networked UAV command, control, and communication project for UAVs. The system utilizes an existing ad-hoc network to demonstrate the ability of UAVs to make mission

  3. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  4. PIPELINES AS COMMUNICATION NETWORK LINKS

    SciTech Connect (OSTI)

    Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

    2005-03-14

    This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

  5. Microsoft Word - Johnston.IOS.Network Communication as a Service...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system communication be based on a service-oriented capability. Keywords. Energy Sciences Network (ESnet), networks for large-scale science, network planning, networks...

  6. Hybrid Modeling of Communication Networks Using Modelica

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Hybrid Modeling of Communication Networks Using Modelica Daniel F¨arnqvist, Katrin Strandemar, Karl is to describe initial work on modeling packet-switched communication network us- ing Modelica [1], [8], which that the hybrid model is suitable for Modelica. More- over, we show that the model can then be efficiently simu

  7. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  8. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  9. On attractant scheduling in networks based on bacterial communication

    E-Print Network [OSTI]

    Sivakumar, Raghupathy

    On attractant scheduling in networks based on bacterial communication Yunlong Gao Shanghai Jiaotong on bacterial communication. Bacterial communication is a communication paradigm between biological cells which using chemical attractants. Although bacterial communication occurs in nature, engineering

  10. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    Wave Protocol Overview”, 2007 [24] General Electric Company, “Energy Efficiency Comparisons of Wireless Communication Technology

  11. Communication Reliability in Network on Chip Designs 

    E-Print Network [OSTI]

    Kumar, Reeshav

    2012-10-19

    The performance of low latency Network on Chip (NoC) architectures, which incorporate fast bypass paths to reduce communication latency, is limited by crosstalk induced skewing of signal transitions on link wires. As a ...

  12. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  13. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, D.B.

    1994-07-19

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

  14. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, Dario B. (DeSoto, TX)

    1994-01-01

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

  15. NBP RFI: Communications Requirements- Honeywell Responses To...

    Broader source: Energy.gov (indexed) [DOE]

    (e.g., we do not consider communications necessary for phasor measurements, substation SCADA, protective relaying, etc.) NBP RFI: Communications Requirements- Honeywell Responses...

  16. WIRELESS SENSOR NETWORK BASED CONTROL SYSTEM CONCIDERING COMMUNICATION COST

    E-Print Network [OSTI]

    WIRELESS SENSOR NETWORK BASED CONTROL SYSTEM CONCIDERING COMMUNICATION COST Yutaka Iino* Takeshi for wireless sensor network based control system, minimizing communication energy consumption. Some control, wireless sensor network technology has been developed rapidly, and various applications to control system

  17. Provisioning high-availability datacenter networks for full bandwidth communication

    E-Print Network [OSTI]

    Huang, Changcheng

    Provisioning high-availability datacenter networks for full bandwidth communication Wenda Ni a 4 December 2013 Available online 12 March 2014 Keywords: Datacenter networks Valiant load balancing critical challenge in datacenter network design is full bandwidth communication. Recent advances have

  18. The Wireless Networking and Communications Group

    E-Print Network [OSTI]

    Heath Jr., - Robert W.

    The Wireless Networking and Communications Group Impact of Spatial Correlation and Distributed Antennas for Massive MIMO Systems Kien T.Truong* and Robert W. Heath Jr. Wireless Networking://www.profheath.org ! * MIMO Wireless Inc. This work was supported by Huawei Technologies #12;2 What is Massive MIMO? A very

  19. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  20. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  1. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  2. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Environmental Management (EM)

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  3. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Office of Environmental Management (EM)

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

  4. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  5. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  6. Networking and Security Research Center

    E-Print Network [OSTI]

    Smith, Adam D.

    ]. The increased network connectivity and standardization of Super- visory Control and Data Acquisition (SCADA and SCADA devices can be found through the Shodan search engine [1, 14]. An adversary with PLC access can

  7. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    and implementation of smart home energy management systemsStandard Technologies for Smart Home Area Networks EnablingInteroperability framework for smart home systems”, Consumer

  8. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    of smart home energy management systems based on zigbee”,Networks Enabling Energy Management Systems ”, Universities'Profile HV Home Energy Management System High Voltage SNR

  9. Communication via entangled coherent quantum network

    E-Print Network [OSTI]

    A. El Allati; Y. Hassouni; N. Metwally

    2010-11-17

    A quantum network is constructed via maximum entangled coherent states. The possibility of using this network to achieve communication between multi-participants is investigated. We showed that the probability of teleported unknown state successfully, depends on the size the used network. As the numbers of participants increases, the successful probability does not depend on the intensity of the field. The problem of implementing quantum teleportation protocol via a noise quantum network is discussed. We show one can send information perfectly with small values of the field intensity and larger values of the noise strength. The successful probability of this suggested protocol increases abruptly for larger values of the noise strength and gradually for small values. We show that for small size of the used quantum network, the fidelity of the teleported state decreases smoothly, while it decreases abruptly for larger size of network.

  10. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    21] ZigBee Alliance. "ZigBee Smart Energy V2.0”, 2011 [22]Secure remote access to Smart Energy Home area Networks”,Density HEMS SEP Smart Energy Profile HV Home Energy

  11. The VIKING Project: An Initiative on Resilient Control of Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    . INTRODUCTION AND MOTIVATION Supervisory control and data acquisition (SCADA) net- works contain computers on SCADA networks for power systems. SCADA systems are continuously becoming more advanced and com- plex complexity of the systems is not the most challenging trend today. Instead, it is the fact that SCADA systems

  12. Social Network and Communications Institutional Change Principle

    Broader source: Energy.gov [DOE]

    Federal agencies can use social networks and communications to spark and reinforce behavior change for meeting sustainability goals. This principle is based on research findings showing that people and institutions often are strongly influenced by the behaviors and expectations of others.

  13. Graphene-enabled Wireless Communication Networks

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    Graphene-enabled Wireless Communication Networks at the Nanoscale 1 Ignacio Llatser Nanonetworking;Graphene Honeycomb lattice of carbon atoms 2-dimensional material Discovered by A. K. Geim and K. S. Novoselov 9 Graphene G. Liu, W. Stillman, S. Rumyantsev, Q. Shao, M. Shur, A. A. Balandin, "Low

  14. The Wireless Networking and Communications Group

    E-Print Network [OSTI]

    Heath Jr., - Robert W.

    The Wireless Networking and Communications Group New Frontiers in Feedback for Interference://www.profheath.org November 2011 Also associated with Kuma Signals LLC and MIMO Wireless Inc. Performed by ONR grant N major best paper awards in last four years WNCG Impacts Industry Four definitive textbooks on wireless

  15. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    Cost-Efficient Residential Energy Management in the Smart Grid”,smart grid applications such as PEV and DR in a public parking lot at a low cost.cost of setting up a network; consumers are reluctant to pay a lot up front in order to adopt smart grid

  16. Multimedia Communications over IP Networks 4 -6 September 2000

    E-Print Network [OSTI]

    Abu-Rgheff, Mosa Ali

    Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution of the Internet David@plymouth.ac.uk School of Computing #12;Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution' applying at each level: #12;Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution

  17. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy &Water Power&GridMonitoringNational SCADA

  18. Physics-Inspired Methods for Networking and Communications

    E-Print Network [OSTI]

    of communication networks. Statistical mechanics methods can be used to decompose global system behavior concepts in networks, a systematic statistical mechanics-inspired networking theory is still missing1 Physics-Inspired Methods for Networking and Communications David Saad1 , Chi Ho Yeung1 , Georgios

  19. ForestFirewalls: Getting Firewall Configuration Right in Critical Networks

    E-Print Network [OSTI]

    Roughan, Matthew

    in Supervisory Control and Data Ac- quisition (SCADA) networks. These networks control the distributed assets-level ap- proach to configuring SCADA firewalls. Our goals are three- fold. We aim to: first, decouple network to demonstrate its effectiveness in simplifying and automating the configuration of SCADA

  20. Position estimation of transceivers in communication networks

    DOE Patents [OSTI]

    Kent, Claudia A. (Pleasanton, CA); Dowla, Farid (Castro Valley, CA)

    2008-06-03

    This invention provides a system and method using wireless communication interfaces coupled with statistical processing of time-of-flight data to locate by position estimation unknown wireless receivers. Such an invention can be applied in sensor network applications, such as environmental monitoring of water in the soil or chemicals in the air where the position of the network nodes is deemed critical. Moreover, the present invention can be arranged to operate in areas where a Global Positioning System (GPS) is not available, such as inside buildings, caves, and tunnels.

  1. Networked Loads in the Distribution Grid Zhifang Wang, Xiao Li, Vishak Muthukumar, Anna Scaglione, Sean Peisert, Chuck McParland

    E-Print Network [OSTI]

    Peisert, Sean

    that they can be accessed remotely, and the network in these plants is structured according to the SCADA model examine a prototypical instance of SCADA network in the distribution network that handles central cooling (PLCs), electrical meters, and networks that deliver data to and from servers that are part of a SCADA

  2. On cost-effective communication network designing

    E-Print Network [OSTI]

    Guoqiang Zhang

    2010-04-14

    How to efficiently design a communication network is a paramount task for network designing and engineering. It is, however, not a single objective optimization process as perceived by most previous researches, i.e., to maximize its transmission capacity, but a multi-objective optimization process, with lowering its cost to be another important objective. These two objectives are often contradictive in that optimizing one objective may deteriorate the other. After a deep investigation of the impact that network topology, node capability scheme and routing algorithm as well as their interplays have on the two objectives, this letter presents a systematic approach to achieve a cost-effective design by carefully choosing the three designing aspects. Only when routing algorithm and node capability scheme are elegantly chosen can BA-like scale-free networks have the potential of achieving good tradeoff between the two objectives. Random networks, on the other hand, have the built-in character for a cost-effective design, especially when other aspects cannot be determined beforehand.

  3. Mitigating cascading failures in interdependent power grids and communication networks

    E-Print Network [OSTI]

    Parandehgheibi, Marzieh

    We study the interdependency between the power grid and the communication network used to control the grid. A communication node depends on the power grid in order to receive power for operation, and a power node depends ...

  4. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  5. Flatness-based control of an irrigation canal using SCADA

    E-Print Network [OSTI]

    Flatness-based control of an irrigation canal using SCADA Tarek Rabbani, Simon Munier, David-time irrigation operations using a supervision, control, and data acquisition (SCADA) system with automatic

  6. Cooperative UAV-Based Communications Backbone for Sensor Networks

    SciTech Connect (OSTI)

    Roberts, R S

    2001-10-07

    The objective of this project is to investigate the use of unmanned air vehicles (UAVs) as mobile, adaptive communications backbones for ground-based sensor networks. In this type of network, the UAVs provide communication connectivity to sensors that cannot communicate with each other because of terrain, distance, or other geographical constraints. In these situations, UAVs provide a vertical communication path for the sensors, thereby mitigating geographic obstacles often imposed on networks. With the proper use of UAVs, connectivity to a widely disbursed sensor network in rugged terrain is readily achieved. Our investigation has focused on networks where multiple cooperating UAVs are used to form a network backbone. The advantage of using multiple UAVs to form the network backbone is parallelization of sensor connectivity. Many widely spaced or isolated sensors can be connected to the network at once using this approach. In these networks, the UAVs logically partition the sensor network into sub-networks (subnets), with one UAV assigned per subnet. Partitioning the network into subnets allows the UAVs to service sensors in parallel thereby decreasing the sensor-to-network connectivity. A UAV services sensors in its subnet by flying a route (path) through the subnet, uplinking data collected by the sensors, and forwarding the data to a ground station. An additional advantage of using multiple UAVs in the network is that they provide redundancy in the communications backbone, so that the failure of a single UAV does not necessarily imply the loss of the network.

  7. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  8. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2 supervisory control and data acquisition (SCADA) system for civil infrastructure systems. To evaluate pipelines. The objectives of this article are to improve upon the existing SCADA by integrating the remote

  9. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  10. Manuscript title -SCADA systems: Challenges for forensic investigators Irfan Ahmed

    E-Print Network [OSTI]

    Richard III, Golden G.

    1 Manuscript title - SCADA systems: Challenges for forensic investigators Irfan Ahmed, LA 70148, United States golden@cs.uno.edu #12; 2 SCADA systems: Challenges for forensic investigators Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III Abstract SCADA systems run

  11. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01

    and NLOS UV Communication System Model . . . . . . 3.2.15.3 UV Communication Link and TransceiverUV NLOS communication system model in coplanar

  12. Gas Main Sensor and Communications Network System

    SciTech Connect (OSTI)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  13. The Geospatial Characteristics of a Social Movement Communication Network

    E-Print Network [OSTI]

    Conover, Michael D; Ferrara, Emilio; McKelvey, Karissa; Menczer, Filippo; Flammini, Alessandro

    2013-01-01

    Social movements rely in large measure on networked communication technologies to organize and disseminate information relating to the movements' objectives. In this work we seek to understand how the goals and needs of a protest movement are reflected in the geographic patterns of its communication network, and how these patterns differ from those of stable political communication. To this end, we examine an online communication network reconstructed from over 600,000 tweets from a thirty-six week period covering the birth and maturation of the American anticapitalist movement, Occupy Wall Street. We find that, compared to a network of stable domestic political communication, the Occupy Wall Street network exhibits higher levels of locality and a hub and spoke structure, in which the majority of non-local attention is allocated to high-profile locations such as New York, California, and Washington D.C. Moreover, we observe that information flows across state boundaries are more likely to contain framing lang...

  14. Joint Optimization of Wireless Communication and Networked Control Systems

    E-Print Network [OSTI]

    Joint Optimization of Wireless Communication and Networked Control Systems Lin Xiao1 , Mikael. With the coding and medium access schemes of the communication system fixed, the achievable bit rates and address the problem of allocating communication re- sources to optimize system performance. We observe

  15. Robust and Cost-Effective Architecture Design for Smart Grid Communications: A Multi-stage

    E-Print Network [OSTI]

    Zhang, Junshan

    , for protection against possible contingencies, by using the Supervisory Control and Data Acquisition (SCADA and protection from possible contingencies. Traditionally, the Supervisory Control and Data Acquisition (SCADA) system has been used to monitor and control the power grid. The SCADA system is a star network, where

  16. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01

    Adaptive equalization system for visible light wireless communication utilizing multiple white led lighting

  17. Social Network and Communications Institutional Change Principle...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Internal communications included emails, electronic newsletters, webinars, training modules, briefings, and mechanisms for sending and receiving...

  18. Predictive Compensation for Communication Outages in Networked Control Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Predictive Compensation for Communication Outages in Networked Control Systems Erik Henriksson Henrik Sandberg Karl Henrik Johansson Abstract-- A predictive outage compensator co time instance, the predictive outage compensator suggests a replacement command based on the history

  19. Analysis of informal communication networks - a case study

    E-Print Network [OSTI]

    Schoder, Detlef

    The structure and dynamics of informal communication networks are of central importance for the functionality of enterprise workflows and for performance and innovation of knowledge-centric organizations. While most ...

  20. Centre for Defence Communications and Information Networking

    E-Print Network [OSTI]

    Balasuriya, Sanjeeva

    as OUR SUCCESS STORIES · Analysing measurements of operational networks, identifying operational savings DEFENCE NETWORK CAPABILITY ROBUSTNESS | RELIABILITY | EFFICIENCY | SECURITY The Centre for Defence based concentration of defence network analysis capability. CDCIN focusses on the modelling, measurement

  1. Urban Wireless Community Networks: Challenges and Solutions for Smart City Communications

    E-Print Network [OSTI]

    Lo Cigno, Renato Antonio

    Urban Wireless Community Networks: Challenges and Solutions for Smart City Communications Renato Lo science that can guide the design of the future communication space for smart cities and beyond; Wireless communication Keywords Wireless Community Networks; Smart Urban Environments; Crowd Design

  2. ENERGY-EFFICIENT COOPERATIVE COMMUNICATION IN CLUSTERED WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    Cui, Jun-Hong

    ENERGY-EFFICIENT COOPERATIVE COMMUNICATION IN CLUSTERED WIRELESS SENSOR NETWORKS Zhong Zhou1, cooperative transmission can dramatically reduce the total energy consumption even when all the collaboration forward the message to an- other cluster via cooperative communication techniques. Only those sensors

  3. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  4. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  5. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Broader source: Energy.gov (indexed) [DOE]

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information...

  6. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research and Development of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for...

  7. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Broader source: Energy.gov (indexed) [DOE]

    Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both critical...

  8. ESC: Energy Synchronized Communication in Sustainable Sensor Networks

    E-Print Network [OSTI]

    He, Tian

    ESC: Energy Synchronized Communication in Sustainable Sensor Networks Yu Gu, Ting Zhu and Tian He Abstract--With advances in energy harvesting techniques, it is now feasible to build sustainable sensor of sustainable sensor networks is to effectively utilize a continuous stream of ambient energy. Instead

  9. Statistical Modeling of Asynchronous Impulsive Noise in Powerline Communication Networks

    E-Print Network [OSTI]

    Evans, Brian L.

    Statistical Modeling of Asynchronous Impulsive Noise in Powerline Communication Networks Marcel statistics of asynchronous noise. In this paper, we (i) derive a canonical statistical-physical model readers interested in channel modeling to [1], [2], [3], [4], [5]. The non-Gaussian noise in PLC networks

  10. Personal Mobility in the ICEBERG Integrated Communication Network

    E-Print Network [OSTI]

    Raman, Bhaskaran

    Personal Mobility in the ICEBERG Integrated Communication Network Bhaskaran Raman bhaskar networks, two­way pagers, integrated cell­phone PDAs, instant messaging systems, personal information­Phone Cell­Phone Anonymous callers Important Figure 1: A scenario showing personalized, integration

  11. Personal Mobility in the ICEBERG Integrated Communication Network

    E-Print Network [OSTI]

    Raman, Bhaskaran

    Personal Mobility in the ICEBERG Integrated Communication Network Bhaskaran Raman Randy H. Katz networks, two­way pagers, integrated cell­phone PDAs, instant messaging systems, personal information­Phone Cell­Phone Anonymous callers Important Figure 1: A scenario showing personalized, integration

  12. Economical Quantum Secure Direct Communication Network with Single Photons

    E-Print Network [OSTI]

    Fu-Guo Deng; Xi-Han Li; Chun-Yan Li; Ping Zhou; Hong-Yu Zhou

    2007-12-13

    A scheme for quantum secure direct communication (QSDC) network is proposed with a sequence of polarized single photons. The single photons are prepared originally in the same state |0> by the servers on the network, which will reduce the difficulty for the legitimate users to check eavesdropping largely. The users code the information on the single photons with two unitary operations which do not change their measuring bases. Some decoy photons, which are produced by operating the sample photons with a Hadamard, are used for preventing a potentially dishonest server from eavesdropping the quantum lines freely. This scheme is an economical one as it is the easiest way for QSDC network communication securely.

  13. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01

    In a wireless sensor network (WSN), connectivity is criticaldeployment of an inexpensive UV WSN so far. If I neglect MUI

  14. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Chou, Pai H.

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2, and to validate its effectiveness with long-term field deployment results. Keywords: structural health monitoring, SCADA system, remote monitoring system 1. INTRODUCTION Structural health monitoring (SHM) is the use

  15. On Security Indices for State Estimators in Power Networks Henrik Sandberg, Andre Teixeira, and Karl H. Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition of such large-scale systems, SCADA (Supervisory Control and Data Acquisition) systems are used to transmit mea at all times. The technology and the use of the SCADA systems have evolved quite a lot since the 1970s

  16. Design and Analysis of Communication Protocols for Quantum Repeater Networks

    E-Print Network [OSTI]

    Cody Jones; Danny Kim; Matthew T. Rakher; Paul G. Kwiat; Thaddeus D. Ladd

    2015-05-06

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

  17. EE 122: Introduction To Communication Networks

    E-Print Network [OSTI]

    California at Irvine, University of

    ) Internet Hourglass 6 Structure of the Course (2nd Half) How to get the traffic from here Academic policies What makes networking challenging The fundamental issues we must grapple with to build Instructor Ion Stoica (istoica@cs.berkeley.edu) Research focus Network architectures Tracing & debugging

  18. Signaling communication events in a computer network

    DOE Patents [OSTI]

    Bender, Carl A. (Highland, NY); DiNicola, Paul D. (Hurley, NY); Gildea, Kevin J. (Bloomington, NY); Govindaraju, Rama K. (Poughkeepsie, NY); Kim, Chulho (Poughkeepsie, NY); Mirza, Jamshed H. (Woodstock, NY); Shah, Gautam H. (Wappingers Falls, NY); Nieplocha, Jaroslaw (Richland, WA)

    2000-01-01

    A method, apparatus and program product for detecting a communication event in a distributed parallel data processing system in which a message is sent from an origin to a target. A low-level application programming interface (LAPI) is provided which has an operation for associating a counter with a communication event to be detected. The LAPI increments the counter upon the occurrence of the communication event. The number in the counter is monitored, and when the number increases, the event is detected. A completion counter in the origin is associated with the completion of a message being sent from the origin to the target. When the message is completed, LAPI increments the completion counter such that monitoring the completion counter detects the completion of the message. The completion counter may be used to insure that a first message has been sent from the origin to the target and completed before a second message is sent.

  19. DESIGNING COMMUNICATION NETWORKS VIA HILBERT MODULAR FORMS

    E-Print Network [OSTI]

    Network Theory, the arithmetic examples are partic- ularly interesting: all Ramanujan graphs are super-expanders; but in addition the examples have many other useful properties, for example very good expansion constants

  20. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  1. Energy Harvesting Communication Networks: Optimization and Demonstration

    E-Print Network [OSTI]

    Uysal-Biyikoglu, Elif

    of information and communication technologies (ICT) within the global carbon footprint, energy efficiency research problem [1]­[3]. Generally ICT is predicted to increase its energy consumption by 4% per year till common [6], and cause even Fig. 1. The energy harvesting system structure. further energy consumption

  2. Throughput Maximization in Wireless Powered Communication Networks with Energy Saving

    E-Print Network [OSTI]

    Brown III, Donald R.

    Throughput Maximization in Wireless Powered Communication Networks with Energy Saving Rui Wang, D and energy allocation to maximize the sum throughput for the case when the nodes can save energy for later with energy saving provides improved sum throughput increasing with the number of transmission blocks. Index

  3. Generating UAV Communication Networks for Monitoring and Surveillance

    E-Print Network [OSTI]

    Doherty, Patrick

    Generating UAV Communication Networks for Monitoring and Surveillance Per-Magnus Olsson, Jonas, especially when smaller UAVs are used. Both problems can be solved to creating relay chains for surveillance different trade-offs between the number of UAVs in the chain and the chain's cost. We also show new results

  4. Optimizing Communication Energy Consumption in Perpetual Wireless Nanosensor Networks

    E-Print Network [OSTI]

    Weigle, Michele

    Optimizing Communication Energy Consumption in Perpetual Wireless Nanosensor Networks Shahram}@cs.odu.edu Abstract--This paper investigates the effect of various param- eters of energy consumption. Finding the optimum combination of parameters to minimize energy consumption while satisfying the Qo

  5. Cooperative Congestion Control in Power Grid Communication Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    for the delivery of Phasor Measurement Unit(PMU) [1] sensor data with real time guarantees to the control centers for timely decisions. Present day network systems are unable to ensure real-time needs of the PMU data as they are not designed to support PMU devices. Hence, the need arises for new communication and control protocols

  6. Chemistry-inspired Programmable Hardware in Communication and Networking Systems

    E-Print Network [OSTI]

    Vetter, Thomas

    Chemistry-inspired Programmable Hardware in Communication and Networking Systems Massimo Monti April, 2014 Abstract Chemistry-inspired algorithms represent a novel approach to control dynamics of using Chemistry-inspired algorithms range from the design (i.e., enabling runtime programmability

  7. Network Cooperation for Energy Saving in Green Radio Communications

    E-Print Network [OSTI]

    Zhuang, Weihua

    is for energy costs [1]. Each base station (BS), in cellular networks, roughly consumes upto 2.7 KWH in the following. RENEWABLE ENERGY SOURCES From an environmental perspective, the objective of green radio communications is to reduce the CO2 emissions [6]. This can be achieved by using renewable energy sources

  8. Reliability and Throughput in Future Automotive Communication Networks

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    Reliability and Throughput in Future Automotive Communication Networks John Liu, Timothy TaltyStar. This action created a new industry called automotive telematics, helping to save lives and providing, the automotive telematics industry has experienced a healthy growth in North America. During the current economic

  9. Complex Dynamics of Autonomous Communication Networks and the Intelligent Communication Paradigm

    E-Print Network [OSTI]

    Andrei P. Kirilyuk

    2006-03-16

    Dynamics of arbitrary communication system is analysed as unreduced interaction process. The applied generalised, universally nonperturbative method of effective potential reveals the phenomenon of dynamic multivaluedness of competing system configurations forced to permanently replace each other in a causally random order, which leads to universally defined dynamical chaos, complexity, fractality, self-organisation, and adaptability (physics/9806002, physics/0211071, physics/0405063). We demonstrate the origin of huge, exponentially high efficiency of the unreduced, complex network dynamics and specify the universal symmetry of complexity (physics/0404006) as the fundamental guiding principle for creation and control of such qualitatively new kind of networks and devices. The emerging intelligent communication paradigm and its practical realisation in the form of knowledge-based networks involve the features of true, unreduced intelligence and consciousness (physics/0409140) appearing in complex (multivalued) network dynamics and results.

  10. SCADA computer sytem controls major Saudi Aramco crude oil pipeline

    SciTech Connect (OSTI)

    Dempsey, J.; Al-Habib, R. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-12-31

    A replacement Supervisory Control and Data Acquisition (SCADA) computer system which monitors and controls two 1,100 kilometer pipelines and eleven associated pump stations is described. The SCADA system was designed to meet two objectives: (1) decentralize the overall control system and provide a distributed control system capable of regulatory control at each pump and pressure reducing station, and (2) provide system wide monitoring and supervisory control function during normal operations at the crude oil terminal. The SCADA computer system hardware (host computers and consoles), software modules, and applications are overviewed. A data flow diagram and a hardware configuration diagram are provided. 3 figs.

  11. EE 122: Introduction To Communication Networks

    E-Print Network [OSTI]

    California at Irvine, University of

    technologies (Ethernet, bridges, switches) Internet Hourglass 6 Structure of the Course (2nd Half) How to get Academic policies What makes networking challenging The fundamental issues we must grapple with to build Peer-to-peer & overlays #12;2 7 Instructor Ion Stoica (istoica@cs.berkeley.edu) Research focus

  12. Communicating oscillatory networks: Frequency Domain Analysis

    E-Print Network [OSTI]

    Ihekwaba, Adaoha E C; Sedwards, Sean

    2011-12-22

    -based systematic analysis technique that attempts to address the challenge of network assembly by defining a rigorous means to quantify the behaviour of stochastic systems. As our focus we construct a novel coupled oscillatory model of p53, NF-kB and the mammalian...

  13. Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications

    E-Print Network [OSTI]

    semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications

  14. Multiply-agile encryption in high speed communication networks

    SciTech Connect (OSTI)

    Pierson, L.G. [Sandia National Labs., Albuquerque, NM (United States); Witzke, E.L. [RE/SPEC Inc., Albuquerque, NM (United States)

    1997-05-01

    Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networks, can satisfy a wide variety of security requirements if that hardware is key-agile, robustness-agile and algorithm-agile. Hence, multiply-agile encryption provides enhanced solutions to the secrecy, interoperability and quality of service issues in high-speed networks. This paper defines these three types of agile encryption. Next, implementation issues are discussed. While single-algorithm, key-agile encryptors exist, robustness-agile and algorithm-agile encryptors are still research topics.

  15. Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges

    E-Print Network [OSTI]

    Fang, Xi; Xue, Guoliang

    2011-01-01

    Smart grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this work we present our vision on smart grid from the perspective of wireless communications and networking technologies. We present wireless communication and networking paradigms for four typical scenarios in the future smart grid and also point out the research challenges of the wireless communication and networking technologies used in smart grid

  16. Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March 2003 Mobility Patterns in Microcellular Wireless Networks

    E-Print Network [OSTI]

    Peha, Jon M.

    Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March 2003 Mobility Patterns in Microcellular Wireless Networks Suttipong Thajchayapong and Jon M. Peha Department of Electrical and Computer Engineering Carnegie Mellon University 5000 Forbes Ave, Pittsburgh, PA 15213 Emails

  17. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOE...

  18. Testing dimension and non-classicality in communication networks

    E-Print Network [OSTI]

    Joseph Bowles; Nicolas Brunner; Marcin Paw?owski

    2015-09-14

    We consider networks featuring preparation, transformation, and measurement devices, in which devices exchange communication via mediating physical systems. We investigate the problem of testing the dimension of the mediating systems in the device-independent scenario, that is, based on observable data alone. A general framework for tackling this problem is presented, considering both classical and quantum systems. These methods can then also be used to certify the non-classicality of the mediating systems, given an upper bound on their dimension. Several case studies are reported, which illustrate the relevance of the framework. These examples also show that, for fixed dimension, quantum systems largely outperform classical ones. Moreover, the use of a transformation device considerably improves noise tolerance when compared to simple prepare-and-measure networks. These results suggest that the classical simulation of quantum systems becomes costly in terms of dimension, even for simple networks.

  19. 1. Introduction Wireless networked systems arise in various communication contexts, and are becoming

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1. Introduction Wireless networked systems arise in various communication contexts drawbacks. A fundamental problem that NC needs to face over lossy (e.g., wireless) networks is the so in Wireless Communications (2011) pp. 120-142" #12;networks as the blueprint. Furthermore, in contrast

  20. Communicating in a Socially-Aware Network: Impact of Relationship Types

    E-Print Network [OSTI]

    Yener, Aylin

    Communicating in a Socially-Aware Network: Impact of Relationship Types Basak Guler Burak Varan@cse.psu.edu Abstract--Communication networks are linked to and influenced by human interactions. Socially-aware systems the impact of friendship and antagonistic relationships between individuals on optimal network propagation

  1. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  2. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide@cs.dartmouth.edu #12;Contents 1 Introduction 3 1.1 SCADA Systems

  3. An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions

    E-Print Network [OSTI]

    Liu, Weiru

    An Architecture of a Multi-Agent System for SCADA - dealing with uncertainty, plans and actions.loughlin@ecit.qub.ac.uk Keywords: Autonomous Agents, Multi-agent Systems, Sensors, SCADA, Uncertainty, Plans, Actions, Fusion in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission

  4. 60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via

    E-Print Network [OSTI]

    Amir, Yair

    60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via Intrusion availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system--one that is able to ensure cor- rect behavior with minimal

  5. Apparatus and method for data communication in an energy distribution network

    DOE Patents [OSTI]

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  6. SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Estimators in SCADA systems is scrutinized. Index Terms--Cyber-Security, SCADA Systems, AGC, State Estimators in our society [1]. Large power systems are nowadays very complex and tightly coupled with the SCADA

  7. Multi-photon quantum communication in quantum networks

    E-Print Network [OSTI]

    Wei Qin; Chuan Wang; Ye Cao; Gui Lu Long

    2015-03-17

    We propose and analyze a multiphoton-state coherent transport protocol in a coupled-resonator quantum network. A multiphoton swap gate between two antipodes can be achieved with neither external modulation nor coupling strength engineering. Moreover, we extend this result to a coupled-resonator chain of arbitrary length with different coupling strengths. Effects of decoherence via quantum nondemolition interaction are studied with sources including vacuum quantum fluctuation and bath thermal excitations when the bath is in the thermal equilibrium state. These observations are helpful to understand the decoherence effects on quantum communication in quantum coupled-resonator systems.

  8. Power and spectrum efficient communications in wireless ad hoc networks

    E-Print Network [OSTI]

    Qu, Qi

    2008-01-01

    in Electrical and Computer Engineering (Communication Theoryin Electrical Engineering (Communication Theory and Systems)in Electrical Engineering (Communication Theory and Systems)

  9. Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March 2003 Mobility Patterns in Microcellular Wireless Networks

    E-Print Network [OSTI]

    Peha, Jon M.

    Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March 2003 Mobility Patterns in Microcellular Wireless Networks Suttipong Thajchayapong and Jon M. Peha Department- cellular wireless networks, based on measurements from the 802.11-based system that blankets the Carnegie

  10. Energy-efficient wireless communication net-work design is an important and challenging

    E-Print Network [OSTI]

    ABSTRACT Energy-efficient wireless communication net- work design is an important and challenging and perfor- mance. INTRODUCTION Energy-efficient wireless communication net- work design is an important, and optimization of wireless communication networks that achieves maximum performance under an energy constraint

  11. Communication-Aware Surveillance in Mobile Sensor Networks Alireza Ghaffarkhah and Yasamin Mostofi

    E-Print Network [OSTI]

    Mostofi, Yasamin

    Communication-Aware Surveillance in Mobile Sensor Networks Alireza Ghaffarkhah and Yasamin Mostofi to a fixed base station, in the pres- ence of realistic fading communication channels. We develop a mathematical framework for robust communication-aware surveillance, in order to survey the environment

  12. Hawaii International Conference on Systems Sciences, January 2002, Hawaii. IEEE Growth and Propagation of Disturbances in a Communication Network Model

    E-Print Network [OSTI]

    Newman, David

    . Therefore, network vulnerability is a major hazard. Analysis of communications system traffic suggests and to characteristics of real Internet data. 1. Introduction Complex systems such as, communication networksHawaii International Conference on Systems Sciences, January 2002, Hawaii. © IEEE Growth

  13. Increasing capacity of baseband digital data communication networks

    DOE Patents [OSTI]

    Frankel, Robert S. (Centereach, NY); Herman, Alexander (Hertzelia, IL)

    1985-01-01

    This invention provides broadband network capabilities for baseband digital collision detection transceiver equipment for communication between a plurality of data stations by affording simultaneous transmission of multiple channels over a broadband pass transmission link such as a coaxial cable. Thus, a fundamental carrier wave is transmitted on said link, received at local data stations and used to detect signals on different baseband channels for reception. For transmission the carrier wave typically is used for segregating a plurality of at least two transmission channels into typically single sideband upper and lower pass bands of baseband bandwidth capability adequately separated with guard bands to permit simple separation for receiving by means of pass band filters, etc.

  14. Hallmark Project Commercialization of the Secure SCADA Communications

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11, SolarMatFermiGuido

  15. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clause entitled,Energy

  16. LETTER Communicated by Daniel Amit Effects of Fast Presynaptic Noise in Attractor Neural Networks

    E-Print Network [OSTI]

    Garrido, Pedro L.

    LETTER Communicated by Daniel Amit Effects of Fast Presynaptic Noise in Attractor Neural Networks J neural networks. The noise occurs on a very short timescale compared to that for the neuron dynamics. We thus describe a mechanism by which fast presynaptic noise enhances the neural network sensitivity

  17. Determining a bisection bandwidth for a multi-node data communications network

    DOE Patents [OSTI]

    Faraj, Ahmad A. (Rochester, MN)

    2010-01-26

    Methods, systems, and products are disclosed for determining a bisection bandwidth for a multi-node data communications network that include: partitioning nodes in the network into a first sub-network and a second sub-network in dependence upon a topology of the network; sending, by each node in the first sub-network to a destination node in the second sub-network, a first message having a predetermined message size; receiving, by each node in the first sub-network from a source node in the second sub-network, a second message; measuring, by each node in the first sub-network, the elapsed communications time between the sending of the first message and the receiving of the second message; selecting the longest elapsed communications time; and calculating the bisection bandwidth for the network in dependence upon the number of the nodes in the first sub-network, the predetermined message size of the first test message, and the longest elapsed communications time.

  18. Communicated by Rodney Brooks A Distributed Neural Network Architecture for Hexapod

    E-Print Network [OSTI]

    Beer, Randall D.

    Communicated by Rodney Brooks A Distributed Neural Network Architecture for Hexapod Robot present a fully distributed neural network architecture for control- ling the locomotion of a hexapod of Technology #12;Neural Network Architecturefor Hexapod Robot Locomotion 357 Figure 1: A comparison

  19. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Office of Environmental Management (EM)

    Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security...

  20. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund...

  1. IEEE Wireless Communications February 2014 331536-1284/14/$25.00 2014 IEEE MOBILE SOCIAL NETWORKS

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    - sive and omnipotent communication platform, mobile social networking (MSN), helping us stay connected, localized, and up-to-date. Autonomous mobile applications can also be applied to facilitate car pool [3

  2. Distributed connection management for real-time communication over wormhole-routed networks 

    E-Print Network [OSTI]

    Sundaresan, Sharad

    1997-01-01

    Wormhole networks provide a very high-speed communication medium that is well suited for a large number of bandwidth demanding applications. Unfortunately, the lack of buffering in the switches causes blocked packets to transiently monopolize...

  3. EEGbased communication via dynamic neural network models William D. Penny and Stephen J. Roberts

    E-Print Network [OSTI]

    Roberts, Stephen

    EEG­based communication via dynamic neural network models William D. Penny and Stephen J. Roberts fw.penny, s.j.robertsg@ic.ac.uk Department of Electrical and Electronic Engineering, Imperial College

  4. EEGbased communication via dynamic neural network models William D. Penny and Stephen J. Roberts

    E-Print Network [OSTI]

    Penny, Will

    EEG­based communication via dynamic neural network models William D. Penny and Stephen J. Roberts fw.penny, s.j.robertsg@ic.ac.uk Department of Electrical and Electronic Engineering, Imperial College

  5. Efficient Sensor Node Authentication via 3GPP Mobile Communication Networks

    E-Print Network [OSTI]

    Kim, Kwangjo

    , 3G-WSN 1. INTRODUCTION As a de facto standard for the wireless sensor networks (WSNs), Zigbee [3 smartphone as a mobile device (MD) has GAA module and Zigbee module. The network consists of mobile network

  6. When Bacteria Talk: Time Elapse Communication for Super-Slow Networks

    E-Print Network [OSTI]

    Sivakumar, Raghupathy

    When Bacteria Talk: Time Elapse Communication for Super-Slow Networks Bhuvana Krishnaswamy a Escherichia coli bacteria serving as the communication receiver that a simple modulation like on-off keying- ically bio-inspired) for use in biological applications [3]­[5]. In recent years, bacteria have emerged

  7. Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency

    E-Print Network [OSTI]

    Chen, Songqing

    low and high channel rate stations. I. INTRODUCTION Mobile devices are usually driven by battery power, which we call the idle communication power of a station. In addition to battery power, mobile devicesExploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency

  8. Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency

    E-Print Network [OSTI]

    Wang, Haining

    rate stations. I. INTRODUCTION Mobile devices are usually driven by battery power. Due to limited communication power of a station. In addition to battery power, mobile devices are very sus- ceptibleExploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency

  9. 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET

  10. Communications and Networking for Smart Grid: Technology and Practice , HossamS. Hassanein2

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    communications protocols, and provide secure and reliable communications for the smart grid. Many open issues sensor networks. "Cyber Security for Smart Grid, Cryptography, and Privacy," by Swapna Iyer, reviews different types of attacks to smart grid. The specific focus is on cyber security, as the smart grid uses

  11. Java Objects Communication on a High Performance Network Luc Courtrai, Yves Maheo, Frederic Raimbault

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Objects Communication on a High Performance Network Luc Courtrai, Yves Mah´eo, Fr. Recent works show the interest in Java for cluster programming. One of the main issues is to handle an alternative to the standard serialization process through the proposal of a Java object communication library

  12. JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA (Research Fellows

    E-Print Network [OSTI]

    Liu, Weiru

    JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA, the research topics include: (i) developing multi-agent system architecture for supporting SCADA systems-agent environments and integrating planning knowledge; (iii) investigating security vulnerabilities in MAS for SCADA

  13. Environmental-friendly underwater acoustic communications and networks

    E-Print Network [OSTI]

    Jesus, Sérgio M.

    and networks #12;The technological challenge "pre-sal" technological challenge (Petrobras, Brazil) reservoir

  14. Enabling Interoperability and Extensibility of Future SCADA Systems Wei Ye and John Heidemann

    E-Print Network [OSTI]

    Heidemann, John

    the sen- sor coverage. For example, in a SCADA system devel- oped for oil and gas fields, the RTUs- rent RTUs makes it hard to extend the SCADA from one application to another. This position paper argues is based on the application of oil and gas field monitoring, a collabo- rative effort between USC

  15. Nanophotonic Optical Interconnection Network Architecture for On-Chip and Off-Chip Communications

    E-Print Network [OSTI]

    Bergman, Keren

    for an integrated low-power, high-bandwidth optical interconnection network based on microring resonator technology for the next generation of high-performance architectures. The need for an interconnect solution providing lowNanophotonic Optical Interconnection Network Architecture for On-Chip and Off-Chip Communications

  16. IEEE Wireless Communications June 2007 251536-1284/07/$20.00 2007 IEEE Cellular network

    E-Print Network [OSTI]

    Jiang, Hai

    technology in an all-IP (Internet Protocol) network architecture, wireless communication systems offer mobile with high-intensity traf- fic. The major advantages of the WLAN are the high data rate and low deployment, and so on. As a special kind of ad hoc network, UWB WPAN can support very high-speed wireless multimedia

  17. Simulation-based optimization of communication protocols for large-scale wireless sensor networks1

    E-Print Network [OSTI]

    Maróti, Miklós

    everyday life more comfortable, e.g. Intelligent Spaces [3]. These sensor networks often use distributed of the wireless sensors may vary greatly, but invariably each of the intelligent sensors is a compact device1 Simulation-based optimization of communication protocols for large-scale wireless sensor networks

  18. Power Reduction of CMP Communication Networks via RF-Interconnects M-C. Frank Chang

    E-Print Network [OSTI]

    Cong, Jason "Jingsheng"

    Power Reduction of CMP Communication Networks via RF-Interconnects M-C. Frank Chang , Jason Cong multiprocessors scale to a greater number of processing cores, on-chip interconnection networks will ex- perience dramatic increases in both bandwidth demand and power dissipation. Fortunately, promising gains can be re

  19. Energy-Efficient Modulation Design for Reliable Communication in Wireless Networks

    E-Print Network [OSTI]

    Gursoy, Mustafa Cenk

    Energy-Efficient Modulation Design for Reliable Communication in Wireless Networks Qing Chen transmit power scenarios. We have noted that variable power schemes can attain higher energy-efficiencies. The analysis of energy-efficient modulation design is also conducted in multi- hop linear networks

  20. Personal Environment Service based on the Integration of Mobile Communications and Wireless Personal Area Networks

    E-Print Network [OSTI]

    Haas, Zygmunt J.

    1 Personal Environment Service based on the Integration of Mobile Communications and Wireless Personal Area Networks Jongtaek Oh and Hansung University Seoul South Korea Zygmunt J. Haas Wireless Networks Lab (WNL) Cornell University Ithaca, NY 14853, U.S.A ABSTRACT The vision behind the Personalized

  1. A SIP-based OSGi Device Communication Service for Mobile Personal Area Networks

    E-Print Network [OSTI]

    Kolberg, Mario

    A SIP-based OSGi Device Communication Service for Mobile Personal Area Networks Alan Brown, Mario With widespread acceptance of mobile technology and the plethora of networked devices entering the market, users are offered a variety of applications for their devices. Such devices include mobile phones, personal digital

  2. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 1, MARCH 2013 133 Reliable Wireless Communication Networks for

    E-Print Network [OSTI]

    Cai, Lin

    Networks for Demand Response Control Lei Zheng, Student Member, IEEE, Ning Lu, Senior Member, IEEE, and Lin performance of wireless communication networks to sup- port demand response (DR) control. First, the impact requirements of DR programs. Index Terms--Communications reliability, demand response, network topology, outage

  4. Unreduced Dynamic Complexity: Towards the Unified Science of Intelligent Communication Networks and Software

    E-Print Network [OSTI]

    Andrei P. Kirilyuk

    2006-03-16

    Operation of autonomic communication networks with complicated user-oriented functions should be described as unreduced many-body interaction process. The latter gives rise to complex-dynamic behaviour including fractally structured hierarchy of chaotically changing realisations. We recall the main results of the universal science of complexity (physics/9806002) based on the unreduced interaction problem solution and its application to various real systems, from nanobiosystems (physics/0412097, physics/0502133) and quantum devices (physics/0211071) to intelligent networks (physics/0412058) and emerging consciousness (physics/0409140). We concentrate then on applications to autonomic communication leading to fundamentally substantiated, exact science of intelligent communication and software. It aims at unification of the whole diversity of complex information system behaviour, similar to the conventional, "Newtonian" science order for sequential, regular models of system dynamics. Basic principles and first applications of the unified science of complex-dynamic communication networks and software are outlined to demonstrate its advantages and emerging practical perspectives.

  5. Network and Index Coding with Application to Robust and Secure Communications 

    E-Print Network [OSTI]

    El Rouayheb, Salim Y.

    2011-02-22

    . Security is achieved against a wiretapper that can access one edge by using a coset code of parity check matrix H = [1 1] on top of the network. : : : : : : : : : : : : : : : : : : : : : : 16 8 (a) The M-Network [4] with four packets x1; x2; x3; x4.... Maurice Rojas Head of Department, Costas N. Georghiades December 2009 Major Subject: Electrical Engineering iii ABSTRACT Network and Index Coding with Applications to Robust and Secure Communications. (December 2009) Salim Yaacoub El Rouayheb, B...

  6. Power and spectrum efficient communications in wireless ad hoc networks

    E-Print Network [OSTI]

    Qu, Qi

    2008-01-01

    A. Bahai, “Energy-efficiency of MIMO and cooperative MIMOMIMO-based cooperative communication for energy-constrainedcooperation, cooperative MIMO can achieve better energy and

  7. Real-Time Communication and Coordination in Embedded Sensor Networks

    E-Print Network [OSTI]

    Lu, Chenyang

    sensors and actuators. Because of this interaction, we find that sensor networks are very data-centric. These networks are very data-centric, with data queries being issued from base stations and time-dependent sensor

  8. Efficient Radio Communication for Energy Constrained Sensor Networks

    E-Print Network [OSTI]

    Liu, Tao

    2013-01-01

    Petri M¨ah¨onen. “Designing a reliable and stable link quality metric for wireless sensor networks. ”

  9. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  10. 21 Steps to Improve Cyber Security of SCADA Networks | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are...

  11. Efficient Radio Communication for Energy Constrained Sensor Networks

    E-Print Network [OSTI]

    Liu, Tao

    2013-01-01

    193 Energy Usage Analysis and ImplementationDetails . . . . . . . . 197 Energy UsageCycled Networks . 177 Energy Usage in Duty-Cycled Sensor

  12. Efficient Radio Communication for Energy Constrained Sensor Networks

    E-Print Network [OSTI]

    Liu, Tao

    2013-01-01

    metrics in energy constrained wireless sensor networks. ” InRouting in Energy-Constrained Wireless Sensor Net- works. ”adaptive energy-efficient MAC protocol for wireless sensor

  13. Real-time communication in FDDI-based networks 

    E-Print Network [OSTI]

    Kumar, Amit Virendra

    1995-01-01

    The Fiber Distributed Data Interface (FDDI) is recommended as a candidate for many hard real-time local-area communication systems. The Timed-Token Medium Access Control (MAC) Protocol of FDDI is capable of guaranteeing ...

  14. Robust minimum energy wireless routing for underwater acoustic communication networks

    E-Print Network [OSTI]

    Stojanovic, Milica

    Marine robots are an increasingly attractive means for observing and monitoring the ocean, but underwater acoustic communications remain a major challenge. The channel exhibits long delay spreads with frequency-dependent ...

  15. Communication delay in circuit-switched interconnection networks

    E-Print Network [OSTI]

    Min, G.; Ould-Khaoua, M.

    Min,G. Ould-Khaoua,M. Sarbazi-Azad,H. Proceedings 20th IEEE Int. Performance, Computing, and Communications Conference (IEEE-IPCCC 2001), Phoenix, Arizona, April 4-6, 2001. pp 51-56 IEEE Computer Society Press

  16. Radar network communication through sensing of frequency hopping

    DOE Patents [OSTI]

    Dowla, Farid; Nekoogar, Faranak

    2013-05-28

    In one embodiment, a radar communication system includes a plurality of radars having a communication range and being capable of operating at a sensing frequency and a reporting frequency, wherein the reporting frequency is different than the sensing frequency, each radar is adapted for operating at the sensing frequency until an event is detected, each radar in the plurality of radars has an identification/location frequency for reporting information different from the sensing frequency, a first radar of the radars which senses the event sends a reporting frequency corresponding to its identification/location frequency when the event is detected, and all other radars in the plurality of radars switch their reporting frequencies to match the reporting frequency of the first radar upon detecting the reporting frequency switch of a radar within the communication range. In another embodiment, a method is presented for communicating information in a radar system.

  17. Multi-resolution Data Communication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Barnaghi, Payam M.

    the creation of pervasive envi- ronments for a wide range of applications in different domains such as smart cities, and intelligent transportation. However, the deluge of data created and communicated and the low

  18. Robustness of interdependent networks: The case of communication networks and the power grid

    E-Print Network [OSTI]

    Parandehgheibi, Marzieh

    We study the robustness of interdependent networks, in which the state of one network depends on the state of the other network and vice versa. In particular, we focus on the interdependency between the power grid and ...

  19. Intrinsically secure communication in large-scale wireless networks

    E-Print Network [OSTI]

    Pinto, Pedro C. (Pedro Correia)

    2010-01-01

    The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security - widely accepted as the strictest notion of security - relies on channel coding ...

  20. Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran

    E-Print Network [OSTI]

    Lazos, Loukas

    Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran Abstract-- In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques

  1. Communication and Sensing Trade-Offs in Decentralized Mobile Sensor Networks: A Cross-Layer Design Approach

    E-Print Network [OSTI]

    Mostofi, Yasamin

    Communication and Sensing Trade-Offs in Decentralized Mobile Sensor Networks: A Cross-Layer Design the trade-offs between communication and sensing objectives, by determining the optimal sensor configurations when introducing imperfect communication. We further illustrate the performance degradation caused

  2. Evaluating Equipment Performance Using SCADA/PMS Data for Thermal Utility Plants - Case Studies 

    E-Print Network [OSTI]

    Deng, X.; Chen, Q.; Xu, C.

    2007-01-01

    Acquisition Plant Monitoring Systems (SCADA/PMS) or Energy Management and Control Systems (EMCS) to monitor sensors, display data, control equipment, activate alarms and log information. However, the utilization and interpretation of the logged data are often...

  3. LETTER Communicated by Nancy Kopell Fast Global Oscillations in Networks of Integrate-and-Fire

    E-Print Network [OSTI]

    Hakim, Vincent

    LETTER Communicated by Nancy Kopell Fast Global Oscillations in Networks of Integrate-and-Fire Neurons with Low Firing Rates Nicolas Brunel Vincent Hakim LPS, Ecole Normale Sup´erieure, 75231 Paris integrate-and-fire neurons in a regime where individual neu- rons emit spikes irregularly and at a low rate

  4. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  5. Energy Efficient Communication in Next Generation Rural-Area Wireless Networks

    E-Print Network [OSTI]

    Belding-Royer, Elizabeth M.

    of flexible wireless transmission over long- distance white space links. We theoretically and experimentally and develop Power- Rate, a protocol that dynamically adjusts transmission parameters according to channelEnergy Efficient Communication in Next Generation Rural-Area Wireless Networks Veljko Pejovic

  6. ECE 333: Introduction to Communication Networks Lecture 3: Physical Layer I

    E-Print Network [OSTI]

    Berry, Randall

    1 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 3: Physical Layer I Overview ­ the physical layer. Following the OSI architecture, we assume that the next layer above the physical layer is the Data Link Layer (DLL). The physical layer provides a "virtual bit pipe" service between two nodes

  7. Fault-tolerant Implementations of the Atomic-state Communication Model in Weaker Networks ?

    E-Print Network [OSTI]

    Johnen, Colette

    of increasing power, are called safe, regular, and atomic. Program design is easier assuming atomic registersFault-tolerant Implementations of the Atomic-state Communication Model in Weaker Networks ? Colette rather than weaker registers but the hardware implementation of an atomic register is costlier than

  8. Tsunamis May Telegraph Their Presence Underwater Communication Network May Sense Tsunamis

    E-Print Network [OSTI]

    Harinarayana, T.

    Tsunamis May Telegraph Their Presence Underwater Communication Network May Sense Tsunamis January 19, 2010 Tsunamis send electric signals through the ocean that appear to be sensed by the vast of an electric field created by the force of the 2004 Indian Ocean tsunami as it traveled over major submarine

  9. Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna

    E-Print Network [OSTI]

    New South Wales, University of

    -sized Unmanned Aerial Vehicles (UAVs) equipped with sensors and wireless radio, enables low cost high granularity- able mobile sensors to explore the aerial dimension, i.e., engineering Unmanned Aerial Vehicles (UAVsReliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna Kai Li Nadeem Ahmed

  10. Biomass Program Outreach and Communication The Bioenergy Feedstock Information Network (BFIN)

    E-Print Network [OSTI]

    + Biomass Program Outreach and Communication The Bioenergy Feedstock Information Network (BFIN) About ten years ago ORNL launched BFIN providing a gateway to a wealth of biomass feedstock information by ORNL. Regional partnership workshops The Regional Biomass Energy Feedstock Partnership is comprised

  11. Locating hardware faults in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Megerian, Mark G. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  12. Challenges for Efficient Communication in Underwater Acoustic Sensor Networks

    E-Print Network [OSTI]

    Pompili, Dario

    for oceano- graphic data collection, pollution monitoring, offshore explo- ration and tactical surveillance applications. Moreover, Un- manned or Autonomous Underwater Vehicles (UUVs, AUVs), equipped with sensors for these applications. Underwater Networks consist of a variable number of sensors and vehicles that are deployed

  13. In-vehicle communication networks -a historical perspective and review

    E-Print Network [OSTI]

    Navet, Nicolas

    as the emerging automotive networks is given. Next, the current eorts of the automotive industry on middleware . . . . . . . . . . . . 31 3.3 AUTOSAR - a standard for the automotive industry . . 32 3.3.1 The reference model on the proposals of the AUTOSAR consortium. Finally, we highlight future trends in the development of automotive

  14. Hindawi Publishing Corporation Journal of Computer Networks and Communications

    E-Print Network [OSTI]

    Zhu, Yifeng

    ID 870281, 20 pages doi:10.1155/2012/870281 Research Article Effective Stochastic Modeling of Energy and Y. Zhu. This is an open access article distributed under the Creative Commons Attribution License is properly cited. Energy consumption of energy-constrained nodes in wireless sensor networks (WSNs

  15. Abstract--In this paper two approaches for reducing communication traffic in a control network, namely, Model-

    E-Print Network [OSTI]

    Antsaklis, Panos

    considered in this paper. I. INTRODUCTION N Networked Control Systems (NCS) a digital communication network in control design in order to account for limited feedback information in the analysis and design of NCS, namely, Model- Based Networked Control Systems (MB-NCS) and event- triggered control, are unified under

  16. Hybrid Modeling of Communication Networks Using Modelica Daniel Farnqvist, Katrin Strandemar, Karl Henrik Johansson, and Jo~ao Pedro Hespanha

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Hybrid Modeling of Communication Networks Using Modelica Daniel F¨arnqvist, Katrin Strandemar networks using Modelica is discussed. Congestion control in packet-switched networks, such as the Internet, by develop- ing a model library based on a recent hybrid systems model, that Modelica provides an efficient

  17. On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lin, Yunyue; Wu, Qishi; Cai, Xiaoshan; Du, Xiaojiang; Kwon, Ki-Hyeon

    2010-01-01

    Data transmission from sensor nodes to a base station or a sink node often incurs significant energy consumption, which critically affects network lifetime. We generalize and solve the problem of deploying multiple base stations to maximize network lifetime in terms of two different metrics under one-hop and multihop communication models. In the one-hop communication model, the sensors far away from base stations always deplete their energy much faster than others. We propose an optimal solution and a heuristic approach based on the minimal enclosing circle algorithm to deploy a base station at the geometric center of each cluster. In themore »multihop communication model, both base station location and data routing mechanism need to be considered in maximizing network lifetime. We propose an iterative algorithm based on rigorous mathematical derivations and use linear programming to compute the optimal routing paths for data transmission. Simulation results show the distinguished performance of the proposed deployment algorithms in maximizing network lifetime.« less

  18. Communication: Separable potential energy surfaces from multiplicative artificial neural networks

    SciTech Connect (OSTI)

    Koch, Werner, E-mail: wkoch@thethirdrock.net; Zhang, Dong H. [State Key Laboratory of Molecular Reaction Dynamics and Center for Theoretical Computational Chemistry, Dalian Institute of Chemical Physics, Chinese Academy of Sciences, 457 Zhongshan Road, Dalian (China)

    2014-07-14

    We present a potential energy surface fitting scheme based on multiplicative artificial neural networks. It has the sum of products form required for efficient computation of the dynamics of multidimensional quantum systems with the multi configuration time dependent Hartree method. Moreover, it results in analytic potential energy matrix elements when combined with quantum dynamics methods using Gaussian basis functions, eliminating the need for a local harmonic approximation. Scaling behavior with respect to the complexity of the potential as well as the requested accuracy is discussed.

  19. FNCS: A Framework for Power System and Communication Networks Co-Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Fuller, Jason C.; Fisher, Andrew R.; Marinovici, Laurentiu D.; Agarwal, Khushbu

    2014-04-13

    This paper describes the Fenix framework that uses a federated approach for integrating power grid and communication network simulators. Compared existing approaches, Fenix al- lows co-simulation of both transmission and distribution level power grid simulators with the communication network sim- ulator. To reduce the performance overhead of time synchro- nization, Fenix utilizes optimistic synchronization strategies that make speculative decisions about when the simulators are going to exchange messages. GridLAB-D (a distribution simulator), PowerFlow (a transmission simulator), and ns-3 (a telecommunication simulator) are integrated with the frame- work and are used to illustrate the enhanced performance pro- vided by speculative multi-threading on a smart grid applica- tion. Our speculative multi-threading approach achieved on average 20% improvement over the existing synchronization methods

  20. Using Dimmable Lighting for Regulation Capacity and Non-Spinning Reserves in the Ancillary Services Market. A Feasibility Study.

    E-Print Network [OSTI]

    Rubinstein, Francis

    2011-01-01

    and data acquisition (SCADA) and wireless communicationInternet and utility SCADA systems, wireless communications

  1. USC/ISI Technical Report ISI-TR-625, October 2006 1 Enabling Interoperability and Extensibility of Future SCADA Systems

    E-Print Network [OSTI]

    Heidemann, John

    system devel- oped for oil and gas fields, the RTUs are usually places at production wells and injection the problem without waiting. The rigid design of cur- rent RTUs makes it hard to extend the SCADA from one and extensibility of future SCADA systems. Our work is based on the application of oil and gas field monitoring

  2. Synchronization Algorithms for Co-Simulation of Power Grid and Communication Networks

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Agarwal, Khushbu; Fuller, Jason C.; Marinovici, Laurentiu D.; Fisher, Andrew R.

    2014-09-11

    The ongoing modernization of power grids consists of integrating them with communication networks in order to achieve robust and resilient control of grid operations. To understand the operation of the new smart grid, one approach is to use simulation software. Unfortunately, current power grid simulators at best utilize inadequate approximations to simulate communication networks, if at all. Cooperative simulation of specialized power grid and communication network simulators promises to more accurately reproduce the interactions of real smart grid deployments. However, co-simulation is a challenging problem. A co-simulation must manage the exchange of informa- tion, including the synchronization of simulator clocks, between all simulators while maintaining adequate computational perfor- mance. This paper describes two new conservative algorithms for reducing the overhead of time synchronization, namely Active Set Conservative and Reactive Conservative. We provide a detailed analysis of their performance characteristics with respect to the current state of the art including both conservative and optimistic synchronization algorithms. In addition, we provide guidelines for selecting the appropriate synchronization algorithm based on the requirements of the co-simulation. The newly proposed algorithms are shown to achieve as much as 14% and 63% im- provement, respectively, over the existing conservative algorithm.

  3. MEGCOM: Min-Energy Group COMmunication in Multi-hop Wireless Networks

    E-Print Network [OSTI]

    Han, Kai; Luo, Jun; Liu, Yang; Huang, Liusheng

    2012-01-01

    Given the increasing demand from wireless applications, designing energy-efficient group communication protocols is of great importance to multi-hop wireless networks. A group communication session involves a set of member nodes, each of them needs to send a certain number of data packets to all other members. In this paper, we consider the problem of building a shared multicast tree spanning the member nodes such that the total energy consumption of a group communication session using the shared multicast tree is minimized. Since this problem was proven as NP-complete, we propose, under our Min-Energy Group COMmunication (MEGCOM) framework, three distributed approximation algorithms with provable approximation ratios. When the transmission power of each wireless node is fixed, our first two algorithms have the approximation ratios of O(ln(\\Delta+ 1)) and O(1), respectively, where \\Delta is the maximum node degree in the network. When the transmission power of each wireless node is adjustable, our third algor...

  4. Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy

    E-Print Network [OSTI]

    Roughan, Matthew

    and Data Acquisition (SCADA) networks that control power stations, water distribution, factory au- tomation best prac- tice specifications to real SCADA firewall configurations and evaluate their usefulness-Communication Networks]: General-- security and protection Keywords SCADA network security; Zone-Conduit model; firewall

  5. This is the author's version of a work that was submitted/accepted for pub-lication in the following source

    E-Print Network [OSTI]

    Boyd, Colin

    to supervisory control and data acquisition (SCADA) networks. It uses digital data communication to enhance and SCADA networks for a variety of technical and operational reasons (Lauf, Peters, & Robinson, 2010; Zhu on IDSs for SCADA networks, whereas this research focuses on IDSs for smart grid environments. This paper

  6. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  7. Topic 3: Smart Grid Communications A.H. MohsenianRad (U of T) 1Networking and Distributed Systems

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    Topic 3: Smart Grid Communications A.H. MohsenianRad (U of T) 1Networking and Distributed Systems Reference Model for Smart Grid Dr. Hamed Mohsenian-Rad Texas Tech UniversityCommunications and Control in Smart Grid 2 · Each domain involves its own actors and applications. · Interactions across 7 Smart Grid

  8. ENERGY EFFICIENCY OF MANY-TO-ONE COMMUNICATIONS IN WIRELESS NETWORKS Enrique J. Duarte-Melo and Mingyan Liu

    E-Print Network [OSTI]

    Liu, Mingyan

    ENERGY EFFICIENCY OF MANY-TO-ONE COMMUNICATIONS IN WIRELESS NETWORKS Enrique J. Duarte 48109-2122 ejd,mingyan¡ @eecs.umich.edu ABSTRACT This paper analyzes the energy consumption in a wireless net- work where communication occurs in a many-to-one fashion. The main motivation for this work

  9. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 00:111

    E-Print Network [OSTI]

    Leung, Victor C.M.

    @ece.ubc.ca Received . . . 1. INTRODUCTION Improvements in power generation, transmission, distribu- tion) management scheme aimed at securing the group communications, for instance, from the utility to appliances and consumption as well as service delivery, operation and market management of the grid are the main bene- fits

  10. TO APPEAR IN JOURNAL OF COMMUNICATIONS AND NETWORKS, 1999 1 An Unsupervised Hybrid Network for Blind

    E-Print Network [OSTI]

    Choi, Seungjin

    ) models arise frequently in digital communication systems, antenna array processing, and biomedical signal processing where multiple sensors are involved. In multiaccess com­ munications, the received signals at an m for Blind Separation of Independent Non­Gaussian Source Signals in Multipath Environment Seungjin CHOI

  11. TO APPEAR IN JOURNAL OF COMMUNICATIONS AND NETWORKS, 1999 1 An Unsupervised Hybrid Network for Blind

    E-Print Network [OSTI]

    Cichocki, Andrzej

    communication systems, antenna array processing, and biomedical signal processing where multiple sensors vector process with its component rep- resenting the mixture of n independent source signals. We assume for Blind Separation of Independent Non-Gaussian Source Signals in Multipath Environment Seungjin CHOI

  12. EURASIP Journal on Wireless Communications and Networking 2005:5, 118 c 2005 Mohammad Hossein Manshaei et al.

    E-Print Network [OSTI]

    Turletti, Thierry

    the original work is properly cited. network, which impacts routing. Therefore, power control is not confinedEURASIP Journal on Wireless Communications and Networking 2005:5, 1­18 c 2005 Mohammad Hossein Manshaei et al. An Evaluation of Media-Oriented Rate Selection Algorithm for Multimedia Transmission

  13. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 2, FEBRUARY 2014 1129 Optimizing Network Sustainability and Efficiency

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    , power allocation. I. INTRODUCTION THE rapid growth of Information and Communications Technology (ICT the operational cost in cellular networks. To provide sustainable and clean power, eco-friendly green energy, e, the network devices are generally powered by limited yet stable resources, e.g., coal, petroleum and natural

  14. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  15. Digital Wireless Communication

    E-Print Network [OSTI]

    Heath Jr., - Robert W.

    Digital Wireless Communication: Physical Layer Exploitation Wireless Networking and Communications 30, 12 #12;Wireless is Everywhere cellular networks local area networks personal area networks emerging applications Thursday, August 30, 12 #12;Where is Wireless Taught? 3 Undergraduate Graduate

  16. Hardware-and-software-based collective communication on the Quadrics network.

    SciTech Connect (OSTI)

    Petrini, F. (Fabrizio); Coll, S. (Salvador); Frachtemberg, E. (Eitan); Hoisie, A. (Adolfy)

    2001-01-01

    The efficient implementation of collective communication patterns in a parallel machine is a challenging design effort, that requires the solution of many problems. In this paper we present an in-depth description of how the Quadrics network supports both hardware- and software-based collectives. We describe the main features of the two building blocks of this network, a network interface that can perform zero-copy user-level communication and a wormhole switch. We also focus our attention on the routing and $ow control algorithms, deadlock avoidance and on how the processing nodes are integrated in a global, virtual shared memory. Experimental results conducted on 64-node AlphaServer cluster indicate that the time to complete the hardware-based barrier synchronization on the whole network is as low as 6 ps, with veiy good scalability. Good latency and scalability are also achieved with the software-based synchronization, which takes about 15 ps. With the broadcast, similar performance is achieved by the hardware- and software-based implementations, which can deliver messages of up to 256 b,ytes in 13 ps and can get a sustained bandwidth of 288 Mbyteshec on all the nodes, with wressages larger than 64KB. The hardware-based barrier is almost insensitive to the network congestion, with 93% of the synchronizations taking less than 20 ps. On the other hand, the software based implementation suflers from a signif cant performance degradation. In high load environments the hardware broadcast maintains a reasonably good performance, delivering messages up to 2KB in 200 ps, while the software broadcast suffers from slightly higher latencies inherited by the synchronization mechanism.

  17. On improving communication in emergency response at network and organizational levels

    E-Print Network [OSTI]

    Dilmaghani, Raheleh B.

    2010-01-01

    in Electrical Engineering (Communication Theory and Systems)in Electrical Engineering (Communication Theory and Systems)

  18. Trends in Energy Management Technology: BCS Integration Technologies - Open Communications Networking

    SciTech Connect (OSTI)

    Webster, Tom

    2002-09-18

    Our overall purpose in writing this series of articles is to provide Federal energy managers some basic informational tools to assist their decision making process relative to energy management systems design, specification, procurement, and energy savings potential. Since Federal buildings rely on energy management systems more than their commercial counterparts, it is important for energy practitioners to have a high level of knowledge and understanding of these complex systems. This is the second article in a series and will focus on building control system (BCS) networking fundamentals and an assessment of current approaches to open communications protocols. This is important because networking is a complex subject and the networks form the basic infrastructure for energy management functions and for integrating a wide variety of OEM equipment into a complete EMCIS. The first article [1] covered enabling technologies for emerging energy management systems. Future topics will concentrate on more practical aspects including applications software, product offerings, networking strategies, and case studies of actual installations. Please refer to the first article for a more complete overview of the purpose and background for this series.

  19. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  20. Deadlock-free class routes for collective communications embedded in a multi-dimensional torus network

    DOE Patents [OSTI]

    Chen, Dong; Eisley, Noel A.; Steinmacher-Burow, Burkhard; Heidelberger, Philip

    2013-01-29

    A computer implemented method and a system for routing data packets in a multi-dimensional computer network. The method comprises routing a data packet among nodes along one dimension towards a root node, each node having input and output communication links, said root node not having any outgoing uplinks, and determining at each node if the data packet has reached a predefined coordinate for the dimension or an edge of the subrectangle for the dimension, and if the data packet has reached the predefined coordinate for the dimension or the edge of the subrectangle for the dimension, determining if the data packet has reached the root node, and if the data packet has not reached the root node, routing the data packet among nodes along another dimension towards the root node.

  1. JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, DECEMBER 2007 1 Energy-Efficiency and Transmission Strategy Selection in

    E-Print Network [OSTI]

    Dai, Huaiyu

    , these coopera- tive transmission strategies may incur additional energy cost and system overhead. In this paper for optimal transmission strategy selection in system level and link level, aiming at minimum energyJOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, DECEMBER 2007 1 Energy

  2. The 2011 Military Communications Conference -Track 3 -Cyber Security and Network Operations From Security to Vulnerability: Data Authentication

    E-Print Network [OSTI]

    Wang, Wenye

    lines and transform ers [5], to perform critical functions of energy transmission and distributionThe 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations From Wang· Zhuo Lu* Jianfeng Mat "Department of Electrical and Computer Engineering, NC State University

  3. Distributed decision-making of networked multi-agent systems in complex environments

    E-Print Network [OSTI]

    Zhu, Minghui

    2011-01-01

    deception attacks on water SCADA systems. In Proceedings ofexamining the stability of a SCADA water management systemexamining the stability of a SCADA water management system

  4. The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07) IMPLEMENTING BACKSCATTER RADIO FOR WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    (PIMRC'07) IMPLEMENTING BACKSCATTER RADIO FOR WIRELESS SENSOR NETWORKS Giovanni Vannucci Mitsubishi Electric Research Laboratories, Cambridge USA Aggelos Bletsas RadioCommunications Lab (RCL) Aristotle University of Thessaloniki, Greece Darren Leigh Mitsubishi Electric Research Laboratories, Cambridge USA

  5. ENERGY-EFFICIENT COOPERATIVE COMMUNICATION BASED ON POWER CONTROL AND SELECTIVE RELAY IN WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    Cui, Jun-Hong

    ENERGY-EFFICIENT COOPERATIVE COMMUNICATION BASED ON POWER CONTROL AND SELECTIVE RELAY IN WIRELESS], the energy efficiency of cooperative communication based on a simple re- lay selection strategy Engineering, Texas A&M University, College Station, TX, 77843 ABSTRACT Cooperative communication with single

  6. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOE SafetyofDepartment. " 21 ran Wilson Blvd.OpinionSecure SCADA

  7. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  8. Erkal et al. EURASIP Journal on Wireless Communications and Networking 2013, 2013:197 http://jwcn.eurasipjournals.com/content/2013/1/197

    E-Print Network [OSTI]

    Uysal-Biyikoglu, Elif

    that relies on energy harvesting from the environment (e.g., through solar, thermal, vibra- tion sources such that the network has to sustain itself energy obtained from vibra- tions [8]), it will be reasonable to adaptErkal et al. EURASIP Journal on Wireless Communications and Networking 2013, 2013:197 http

  9. The scope of SaCoNet is to deal with the growing smart communications fields embedded in complex systems for a wide variety of applications in the future generation of network and cloud

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    emerging networks: sky of clouds, Internet of things, Smart Grids, Smart Cities, etc. The evolutionThe scope of SaCoNet is to deal with the growing smart communications fields embedded in complex technologies. SaCoNet focuses on how smart communications and ICT networks impact not only on network

  10. Communication protocols for underwater data collection using a robotic sensor network

    E-Print Network [OSTI]

    Singh, Hanumant

    2013-05-01

    We examine the problem of collecting data from an underwater sensor network using an autonomous underwater vehicle (AUV). The sensors in the network are equipped with acoustic modems that provide noisy, range-limited ...

  11. AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS

    E-Print Network [OSTI]

    (as opposed to network support) data transmissions. Next steps in this effort will focus on store to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures and protocols will enable more effective networked subsurface

  12. AHMED ABD EL AZIZ IBRAHIM ZEWAIL Research Assistant at the Wireless Communications and Networking (WCAN) Lab

    E-Print Network [OSTI]

    Yener, Aylin

    , Egypt E-mail: salatino@alumni.stanford.edu Prof. Hesham El-Gamal Professor at Electrical and ComputerD in Electrical Engineering (2013 ­ present) Penn State University, State College, PA Major: Wireless Communications M.Sc. in Communication and Information Technology (2011 ­ 2013) Nile University, Egypt Major

  13. Random intersection graphs and their applications in security, wireless communication, and social networks

    E-Print Network [OSTI]

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigning each node a set of items in some random manner and then putting an edge between any two nodes that share a certain number of items. Broadly speaking, our work is about analyzing random intersection graphs, and models generated by composing it with other random graph models including random geometric graphs and Erd\\H{o}s-R\\'enyi graphs. These compositional models are introduced to capture the characteristics of various complex natural or man-made networks more accurately than the existing models in the literature. For random intersection graphs and their compositions with other random graphs, we study properties su...

  14. A Communication Model of Broadcast in Wormhole-Routed Networks-on-Chip

    E-Print Network [OSTI]

    Moadeli, M.

    Moadeli,M. Vanderbauwhede,W. The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) pp 315-322

  15. IEEE Wireless Communications December 200462 1536-1284/04/$20.00 2004 IEEE A wireless network

    E-Print Network [OSTI]

    Guibas, Leonidas J.

    parts of the processor, sensors, and wireless communication circuits are shut down to preserve power-wide emergency: A large-scale hazardous chemical gas leak occurred ten minutes ago near the town of XYZ

  16. B-RPM: An Efficient One-to-Many Communication Framework for On-Chip Networks 

    E-Print Network [OSTI]

    Shaukat, Noman

    2012-10-19

    The prevalence of multicore architectures has accentuated the need for scalable on-chip communication media. Various parallel applications and programming paradigms use a mix of unicast (one-to-one) and multicast (one-to-many) ...

  17. Advances in integrating autonomy with acoustic communications for intelligent networks of marine robots

    E-Print Network [OSTI]

    Schneider, Toby Edwin

    2013-01-01

    Autonomous marine vehicles are increasingly used in clusters for an array of oceanographic tasks. The effectiveness of this collaboration is often limited by communications: throughput, latency, and ease of reconfiguration. ...

  18. Kukolev et al. EURASIP Journal on Wireless Communications and Networking (2015) 2015:57

    E-Print Network [OSTI]

    Zemen, Thomas

    2015-01-01

    communication in the vehicle cuts down the wiring har- ness, which will reduce the weight and cost of the car. It also eliminates the need of drilling to pass the cables, thereby improving robustness of the vehicle

  19. 1928 IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 10, OCTOBER 2013 A Small World Network Model for Energy Efficient Wireless Networks

    E-Print Network [OSTI]

    Elkashlan, Maged

    for Energy Efficient Wireless Networks Tiankui Zhang, Jinlong Cao, Yue Chen, Laurie Cuthbert, and Maged considers the battery energy of the wireless nodes, the multi-hop transmission distance and the geographical dis- tance between wireless nodes. In order to quantify the energy efficiency of the proposed model

  20. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  1. Stackelberg Game for Distributed Resource Allocation over Multiuser Cooperative Communication Networks

    E-Print Network [OSTI]

    Liu, K. J. Ray

    . The energy-efficient transmission was consid- ered for broadcast networks in [4]. [5] considered the design Networks Beibei Wang, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, MD 20742, USA Department of Electrical

  2. Good practice guide on firewall deployment for SCADA and process control networks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,Executive CompensationEnergyGet Current:5 Department of EnergyGood for

  3. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12 Beta-3 Racetracks25 AMO PeerServices6 DOE SSL R&D2016

  4. Providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.

    2012-10-23

    Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.

  5. IEEE COMMUNICATIONS LETTERS, ACCEPTED FOR PUBLICATION 1 Planning of Cellular Networks Enhanced by Energy Harvesting

    E-Print Network [OSTI]

    Langendoen, Koen

    significantly reducing capital and operational expenditure (CAPEX and OPEX, respectively). Therefore, in- spired that the proposed heuristic brings CAPEX and OPEX savings in comparison to traditional network deployment methods

  6. Creation and maintenance of a communication tree in wireless sensor networks 

    E-Print Network [OSTI]

    Jung, Eun Jae

    2009-05-15

    A local reconfiguration algorithm (INP) for reliable routing in wireless sensor networks that consist of many static (fixed) energy-constrained nodes is introduced in the dissertation. For routing around crash fault nodes, ...

  7. Energy efficiency heterogeneous wireless communication network with QoS support 

    E-Print Network [OSTI]

    Hou, Ying

    2013-07-01

    The overarching goal of this thesis is to investigate network architectures, and find the trade-off between low overall energy use and maintaining the level of quality of service (QoS), or even improve it. The ubiquitous ...

  8. LETTER Communicated by Bard Ermentrout Analysis of Oscillations in a Reciprocally Inhibitory Network

    E-Print Network [OSTI]

    Cottrell, Garrison W.

    Network with Synaptic Depression Adam L. Taylor ataylor@ucsd.edu Garrison W. Cottrell gary of Technology #12;562 Adam L. Taylor, Garrison W. Cottrell, and William B. Kristan, Jr. Figure 1: (A) Circuit

  9. A communication stack over PLC for multi physical layer IPv6 Networking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Inc. and CITI Insa-Lyon / INRIA, France Bernard Tourancheau: CITI Insa-Lyon / INRIA and LIP UMR 5668 interoperability features regarding others media with a robust and reliable communication stack for smart metering the main grid power supply. However, power consumption is still relevant to keep the global power overhead

  10. Storage Area Network Optimization A cooperation of Ancor Communications, Minneapolis, USA

    E-Print Network [OSTI]

    Felsner, Stefan

    technology allows concurrent communications among worksta- tions, mainframes, servers, data storage systems delivers a new level of reliability and throughput. Switches, hubs, storage systems, storage devices to one or more storage systems. QLogic o#11;ers a broad product line of SAN infrastructure (see[1]). One

  11. Toward resilient communities: A performance-based engineering framework for design and evaluation of the built environment

    E-Print Network [OSTI]

    Mieler, Michael

    2012-01-01

    control and data acquisition (SCADA) systems to control thea community. Note that SCADA stands for supervisory controlthan two infrastructures Sh SCADA, Communications Water for

  12. 4100 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 12, DECEMBER 2011 Cost-Delay Tradeoffs for Two-Way Relay Networks

    E-Print Network [OSTI]

    Yener, Aylin

    algorithms perform remarkably well. Index Terms--Cost sharing, delay, network coding, two-way relaying, queue4100 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 12, DECEMBER 2011 Cost relay use incurs some cost, which, for example, could be transmission energy. This cost is shared

  13. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2008 1 Redefinition of Max-Min Fairness in Multi-hop Wireless Networks

    E-Print Network [OSTI]

    Jiang, Hai

    . Zhuang is with the Centre for Wireless Com- munications, Department of Electrical and ComputerIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2008 1 Redefinition of Max-Min Fairness in Multi-hop Wireless Networks Ping Wang, Member, IEEE, Hai Jiang, Member, IEEE, Weihua Zhuang

  14. Wireless Communications Research Lab Communications Research at WVU

    E-Print Network [OSTI]

    Reynolds, Daryl

    Theory Statistics Empirical Communication Theory Modern Communicatio Lab (WCRL) · Classes related to communications research · The relationship between information theory, communication theory, and signal processing. · Point-point information theory · Flow networks and the max

  15. Communication Protocols and Applications for ZigBee-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Tseng, Yu-Chee

    ]. For interoperability among different systems, standards such as ZigBee [17] have been developed. In the ZigBee protocol interoperability issues from the physical layer to the application layer. ZigBee supports three kinds of networks power management. Therefore, the tree topology is preferred, especially when energy saving

  16. Cloud networking and communications Cloud computing is having an important impact on

    E-Print Network [OSTI]

    Boutaba, Raouf

    . The goal is to offer stronger interworking and interoperability between system and network elements attention has been devoted to system aspects of Cloud computing. More recently, however, the focus as a function of cost, customer demands, energy, dynamic scaling, Quality-of-Service (QoS) and Quality

  17. High-Speed Non-Directional Infrared Communication for Wireless Local-Area Networks

    E-Print Network [OSTI]

    Carruthers, Jeffrey

    terminals and a base station, allowing construction of in-building wireless local-area networks. We discuss.0 Introduction Non-directional infrared radiation [1-4] is an attrac- tive transmission medium for wireless characterized free-space infrared channels in a variety of indoor environments [6] using a swept

  18. QoS-driven adaptive resource allocation for mobile wireless communications and networks 

    E-Print Network [OSTI]

    Tang, Jia

    2009-05-15

    , and cooperative relay systems and networks, respectively. In addition, we also investigate the impact of imperfect channel-state information (CSI) on QoS pro-visioning. The resource allocation problems can be solved e±ciently by the convex optimization approach...

  19. Wireless Sensor Network to Satellite Master thesis in Information and Communication Technology

    E-Print Network [OSTI]

    Brest, Université de

    . Wireless Sensor Network (WSN) currently is a solution for many practical problems in emer- gency and environment controlling. Obviously, WSN is deployed in many regions and works effec- tively to monitor weather opportunities in cooperation between satellite and WSN to control remotely the distant WSN, i.e ocean, desert

  20. Structural bottlenecks for communication in networks Sameet Sreenivasan,1,2

    E-Print Network [OSTI]

    Stanley, H. Eugene

    Division, Los Alamos National Laboratory, MS B258, Los Alamos, New Mexico 87545, USA 3 Laboratory, 89.20.Hh, 89.75.Da The advent of the Internet has brought with it the possi- bility of exponentially that the degree distribution of the internet is a power law or "scale free" 2­5 . Moreover, the scale-free network

  1. Prediction-Based Recovery from Link Outages in On-Board Mobile Communication Networks

    E-Print Network [OSTI]

    Libman, Lavy

    , such as those pro- posed for (and employed in) public transport vehicles, users are connected to a local network transport routes, and their repetitive nature, allows a certain degree of prediction of impending link extension known as Freeze-TCP, we study how the performance of the protocol depends on the outage prediction

  2. The Virtual Pheromone Communication Primitive

    E-Print Network [OSTI]

    Szumel, Leo; Owens, John D

    2006-01-01

    challenges for energy-constrained ad hoc wireless networks.H. : Energy-ef?cient communication pro- tocols for wireless

  3. Networks, deregulation, and risk : the politics of critical infrastructure protection

    E-Print Network [OSTI]

    Ellis, Ryan Nelson

    2011-01-01

    A Brief History of SCADA/EMS. ?; Gordon Friedlander. ?2009. 67-69; OE. National SCADA Test Bed Program. 4; BriData Acquisition Systems (SCADA). Idaho National Engineering

  4. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Assessment Methods for SCADA Security Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks...

  5. Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Djouadi, Seddik M [ORNL; Charalambous, Prof. Charalambos [University of Cyprus

    2014-01-01

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented.

  6. Airborne wireless communication systems, airborne communication methods, and communication methods

    DOE Patents [OSTI]

    Deaton, Juan D. (Menan, ID); Schmitt, Michael J. (Idaho Falls, ID); Jones, Warren F. (Idaho Falls, ID)

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  7. ADVANCED BROADBAND COMMUNICATIONS CENTER (CCABA)

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    ) Advanced Broadband Communications Center (CCABA) Broadband Communications Systems Research Group (CBA) #12 Junyent Academic staff: ~ 25 Students: ~ 40 ·Trials ·Tests #12;About the CBA Group Optical Communications and Electronic Signature CBA research group #12;Topics Optical Networking ­ IP over ASON/GMPLS networks

  8. Modeling and evaluation of aerial layer communications system architectures

    E-Print Network [OSTI]

    Ajemian, Stephen P

    2014-01-01

    Airborne networks are being developed to provide communications services in order to augment space-based and terrestrial communications systems. These airborne networks must provide point to point wireless communications ...

  9. Transmission Power Allocation for Cooperative Relay-BasedNeighborhood Area Networks for Smart Grid

    E-Print Network [OSTI]

    Kai, Ma; Guoqiang, Hu; Spanos, Costas

    2013-01-01

    Architecture for the Smart Grid, IEEE Network, vol. 25, no.to-Machine Communications in Smart Grid. IEEE CommunicationCommunications Infrastructure for Smart Grid. IEEE Network,

  10. Energy-efficient wireless communication In this chapter we present an energy-efficient highly adaptive network

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    Energy-efficient wireless communication In this chapter we present an energy-efficient highly substantial research in the hardware aspects of mobile communications energy-efficiency, such as low-power electronics, power-down modes, and energy efficient modulation. However, due to fundamental physical

  11. Topics in network communications

    E-Print Network [OSTI]

    Cannons, Jillian Leigh

    2008-01-01

    Int. Workshop on Evaluation of Wireless Ad Hoc, Sensor andon Performance Evaluation of Wireless Ad Hoc, Sensor and

  12. Securing group communication in dynamic, disadvantaged networks : implementation of an elliptic-curve pairing-based cryptography library

    E-Print Network [OSTI]

    Figueiredo, Rob

    2006-01-01

    This thesis considers the problem of securing communication among dynamic groups of participants without relying on an online group keying service. As a solution, we offer the design and implementation of the Public Key ...

  13. Wireless Network Economics and Games

    E-Print Network [OSTI]

    Huang, Jianwei

    Wireless Network Economics and Games Jianwei Huang Network Communications & Economics Lab-play-games/id642100914! ! · J. Huang and L. Gao, "Wireless Network Pricing," Synthesis Lectures on Communication Networks://jianwei.ie.cuhk.edu.hk/publication/Book/ WirelessNetworkPricing.pdf! ! #12;Why Wireless Economics and Games? #12;Wireless Utopia · Wireless spectrum

  14. Information -Communication Communication des entreprises

    E-Print Network [OSTI]

    Sart, Remi

    Information - Communication 2 PARCOURS Communication des entreprises Communication et solidarité;2 Information - Communication UFR Langues Appliquées, Commerce et Communication PRÉSENTATION Objectifs La Licence Information et communication est destinée aux étudiants qui souhaitent suivre un parcours

  15. Static and dynamic virtual channel allocation for high performance, in-order communication in on-chip networks

    E-Print Network [OSTI]

    Shim, Keun Sup

    2010-01-01

    Most routers in on-chip interconnection networks (OCINs) have multiple virtual channels (VCs) to mitigate the effects of head-of-line blocking. Multiple VCs necessitate VC allocation schemes since packets or flows must ...

  16. On communication complexity and universal compression

    E-Print Network [OSTI]

    Dhulipala, Anand

    2007-01-01

    2 Communication Model . . . . . . . . . . . . . . . . .communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . .communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

  17. Optimization Online - Energy Savings in Wireless Mesh Networks in ...

    E-Print Network [OSTI]

    Jan 24, 2011 ... Abstract: Energy consumption of communication systems is ... Keywords: Energy savings, wireless Mesh Networks, Green networking.

  18. Operations Research and the Captivating Study of Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Paradox and Evolutionary Variational Inequalities · A New Network Performance/Efficiency Measure Networks Duke Energy Gas Pipeline Network Transportation, Communication, and Energy Networks #12;Components of Networks · The Transportation Network Equilibriumn Problem and Methodological Tools · The Braess Paradox

  19. Accepted for publication in Wireless Networks, Special Issue on Multiuser Detection in Wireless Communications Adaptive Power Control and MMSE Interference

    E-Print Network [OSTI]

    Yates, Roy

    with an acceptable quality of service while minimizing the total transmitter power. Multiuser detection on the other communication systems, iterative power control is used to provide each user with an acceptable level and interference. In [10], a framework was given for uplink power control for cellular radio systems. Variations

  20. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden A N A N D K A N N A N Performance evaluation of security mechanisms in Cloud Networks KTH Information and Communication Technology #12;Performance evaluation of security mechanisms in Cloud Networks Anand Kannan 30th July - 2012

  1. Loan Performance Data and Communication | Department of Energy

    Energy Savers [EERE]

    Loan Performance Data and Communication Loan Performance Data and Communication Better Buildings Residential Network Financing and Revenue Peer Exchange Call: Loan Performance Data...

  2. Network coding for robust wireless networks

    E-Print Network [OSTI]

    Kim, MinJi, Ph. D. Massachusetts Institute of Technology

    2012-01-01

    Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth ...

  3. Energy aware network coding in wireless networks

    E-Print Network [OSTI]

    Shi, Xiaomeng, Ph. D. Massachusetts Institute of Technology

    2012-01-01

    Energy is one of the most important considerations in designing reliable low-power wireless communication networks. We focus on the problem of energy aware network coding. In particular, we investigate practical energy ...

  4. System restoration of a transmission network

    SciTech Connect (OSTI)

    Ebert, A.; Eppel, M.; Genthe, S.; Schwarzjirg, H.; Stark, J.; Werner, W. [Bayernwerke AG, Karlsfeld (Germany); [Siemens AG, Wien (Austria)

    1995-12-31

    In a large SCADA/EMS-System an Expertsystem for Fault Diagnosis and for System Restoration is integrated. The System Restoration covered by the Expertsystem gives assistance to the operator in any kind of blackout by presenting restoration plans. In case any number of busbars is outaged the system automatically determines the affected network areas and thereby the magnitude of the whole blackout. The restoration of the network is done in phases depending on the kind of blackout and is based on a global utility-strategy-plan. Within this scheme the detailed restoration plan is determined dynamically based on the actual situation and some predefinitions such as load priorities and power plants to be reenergized with priority. The described system covers all cases of blackouts by evaluating a plan based on the individual case. The Expertsystem is a hybrid system using an optimal power flow, too, and is fully integrated in the SCADA/EMS system. The plans of each phase are presented via the common MMI to the operator and supervised due to execution. The system distinguishes between operator wanted deviations and unwanted deviations during execution. Thus the operator at any time can continue as he likes.

  5. WILEY WCMC SPECIAL ISSUE ON UNDERWATER SENSOR NETWORKS (INVITED) 1 Prospects and Problems of Wireless Communication for Underwater

    E-Print Network [OSTI]

    Cui, Jun-Hong

    ISSUE ON UNDERWATER SENSOR NETWORKS (INVITED) 2 Abstract This paper reviews the physical fundamentals) based on the fundamental first principles of physics and engineering practice. The discussions Engineering, University of Connecticut, Storrs, Connecticut 06269, (email: lanbo@engr.uconn.edu). S. Zhou

  6. IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 4, APRIL 2013 653 Detection for an AF Cooperative Diversity Network in the

    E-Print Network [OSTI]

    Kim, Il-Min

    -Kebrya is with the Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, M5S 3G4, Canada-and-forward (AF) cooper- ative diversity network consisting of one source, multiple relays, one destination (e- mail: aramezani@comm.utoronto.ca). I.-M. Kim is with the Department of Electrical and Computer

  7. COMMUNICATIONS ANNEX B -COMMUNICATIONS

    E-Print Network [OSTI]

    and interoperable communications systems are essential to obtain the most complete information during emergency System (NIMS). Communications Equipment · Telephones, cellular or landline, are the primary means of the Brazos Valley Wide Area Communications System (BVWACS), most departments on campus have access to a radio

  8. Reconfigureable network node

    DOE Patents [OSTI]

    Vanderveen, Keith B. (Tracy, CA); Talbot, Edward B. (Livermore, CA); Mayer, Laurence E. (Davis, CA)

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  9. Scalable Model Checking Beyond Safety - A Communication Fabric Perspective

    E-Print Network [OSTI]

    Ray, Sayak

    2013-01-01

    like Petri nets [Murata, 1989] and data-flow networks [Petri nets CHAPTER 3. FORMAL MODEL FOR COMMUNICATION FABRICS and data-flow networks.

  10. On delay-sensitive communication over wireless systems 

    E-Print Network [OSTI]

    Liu, Lingjia

    2009-05-15

    This dissertation addresses some of the most important issues in delay-sensitive communication over wireless systems and networks. Traditionally, the design of communication networks adopts a layered framework where each layer serves as a “black box...

  11. Communicating Logistics

    Office of Environmental Management (EM)

    Communicating Logistics * Delayed or nonexistent communication * Lack of consistency-follow protocols * No overarching coordination * DUF6 communication is poor * Lesson learned:...

  12. Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CSNationalNational UserNaval TheNetwork

  13. Active Sensing by Unmanned Aircraft Systems in Realistic Communication

    E-Print Network [OSTI]

    Frew, Eric W.

    Active Sensing by Unmanned Aircraft Systems in Realistic Communication Environments Eric W. Frew-theoretic framework for active sensing by unmanned aircraft systems in realistic communication environments of unmanned aircraft systems performing active sensing missions. Networked communication and information flow

  14. Master's Thesis A Secure and Energy Efficient Communication

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks and Technology 2011 #12;A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks #12;A Secure and Energy Efficient Communication Scheme for Wireless Sensor Networks Advisor : Professor Kwangjo

  15. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Williams, “Security issues in SCADA networks,” Computers andA Cyber Security Study of a SCADA Energy Management System,”and transmitted over a SCADA network to the system operator.

  16. Operations Research and the Captivating Study of Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Variational Inequalities · A New Network Performance/Efficiency Measure with Applications to Critical Networks Duke Energy Gas Pipeline Network Transportation, Communication, and Energy Networks #12;Components · The Transportation Network Equilibriumn Problem and Methodological Tools · The Braess Paradox · Some Interesting

  17. Grundlagenfcher und Vertiefungen fr den Kernbereich ,,Communications Engineering and Signal Processing"

    E-Print Network [OSTI]

    Kuehnlenz, Kolja

    2) Statistical Signal Processing 3) Informationstheoretische Sicherheit 4) Broadband Communication Networks 5) Information Theory 6) Optical Communication Systems 7) Circuit Theory and Communication 8 for Communications - Information Theory - Leitungsgebundene Übertragungstechnik - MIMO Systems - Multimedia

  18. Networks: Contribution to the Encyclopedia of Science, Technology, and Author: Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    Networks: Contribution to the Encyclopedia of Science, Technology, and Ethics Author: Anna Nagurney our business today. Communication networks enable the transmission of voice, data, information, and transportation and communication networks. Transportation networks provide us with the means of crossing physical

  19. INFORMATION ENGINEERING Principles, Technologies, Networks, and Applications

    E-Print Network [OSTI]

    Huang, Jianwei

    AccessApplications Smartgrids,GreenCommunications TelecommunicationSwitching Peer-to-PeerSystems OnlineSocialNetworks Internet

  20. On Cyber Security for Networked Control Systems Saurabh Amin

    E-Print Network [OSTI]

    random failures and secu- rity attacks. Cyber-security of Supervisory Control and Data Acquisition (SCADA, cyber-security assessment for SCADA systems is performed based on well-defined attacker and defender objectives. The mathematical model of SCADA systems considered in this work has two control levels

  1. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    project is to analyze and evaluate the level of performance, from the network point of view, that canDegree project in Communication Systems Communication Systems, 30.0 HEC Stockholm, Sweden I S A A C test this approach in a real environment, a prior providers' survey was utilized to evaluate

  2. stributed Computation ayth Communication De

    E-Print Network [OSTI]

    Robertazzi, Thomas G.

    there has been an increasing interest in distributed intelligent sensor networks [1- 121. This interest has. An intelligent sensor network is a collection of units with sensing, computational, and communication ability is to cooperatively monitor the environment and be able to ascertain its salient features. These intelligent sensors

  3. Delay-sensitive Communications Code-Rates, Strategies, and Distributed Control 

    E-Print Network [OSTI]

    Parag, Parimal

    2012-02-14

    benefits of setting up a network suitable for network coding in multicast. In particular, we quantify the gains of network coding over classic routing for service provisioned multicast communication over butterfly networks. In the wireless setting, we study...

  4. On optimizing wireless mesh networks : from theoretical capacity analysis to practical algorithm design

    E-Print Network [OSTI]

    Zhou, Ping

    2008-01-01

    and et al, "Low-energy wireless communication networkT.H. Meng, “Minimun energy mobile wireless networks,” IEEE46] Ephremides, "Energy concerns in wireless networks," IEEE

  5. Mobility in Wireless Sensor Networks

    E-Print Network [OSTI]

    Mehta, Ankur Mukesh

    2012-01-01

    4 Wireless Protocol Modifications 4.1contains a distributed wireless network with per- vasiveprocessing, control, and wireless communication on a board

  6. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    September 2007. B. T. Richardson, J. Michalski, Security Framework for Control System Data Classification and Protection, Tech. Rep. SAND2007-3888P, Sandia National...

  7. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesign ToolsDocuments

  8. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesignFAQs Home

  9. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesignFAQs

  10. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk

  11. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram Overview

  12. The Future of Network Neutrality

    E-Print Network [OSTI]

    Guttentag, Mikhail

    2009-01-01

    Internet, “the fastest growing communications network in history, [The Internet is the most open network in history. We have towell as its history seen through two major ideas of Internet

  13. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    building and public parking lot are studied. The differencesbuilding and public parking lot respectively. There arebuilding and public parking lot. Finally, conclusions are

  14. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    and commercial building automation. HomePlug’s protocols areof this HAN is building automation and energy management,industrial control, building and home automation. Fig. 4.7

  15. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    management systems based on zigbee”, Consumer Electronics,Shahid, A. , Khan, Z.A. , “Zigbee Based ReconfigurableA. , Chi Zhou, “Developing ZigBee Deployment Guideline Under

  16. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    in home automation and LonWorks is widely used in industrialto industrial control, building and home automation. Fig.

  17. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    on addressing security issues in smart grid, from wirelessLayer Security in Wireless Smart Grid", IEEE Communicationssecurity protection framework to support Smart Grid”, Power

  18. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    upgrade of our archaic power grid with a smart grid capableand development. A power grid consists of three basicchannel modeling [11][12], power grid topology as it relates

  19. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    based HAN with 1 router, 3 adapters and 1 wireless extensionrouter D-Link AV1 500 Mbps adapter Linksys AV1 200Mbps wireless

  20. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    used in area like smart buildings, street light controls andbuilding. This section focuses on HAN design to address two smart

  1. Ultra high-speed Mobile Information and CommunicationUMIC Prof. Fadhel M. Ghannouchi

    E-Print Network [OSTI]

    and smart-grid wireless communication networks. This talk will highlight the why it is important to reduce

  2. Network coding for distributed quantum computation over cluster and butterfly networks

    E-Print Network [OSTI]

    Seiseki Akibue; Mio Murao

    2015-03-26

    To apply network coding for quantum computation, we study the distributed implementation of unitary operations over all separated input and output nodes of quantum networks. We consider a setting of networks where quantum communication between nodes is restricted to sending just a qubit, but classical communication is unrestricted. We analyze which N-qubit unitary operations are implementable over cluster networks by investigating transformations of a given cluster network into quantum circuits. We show that any two-qubit unitary operation is implementable over the butterfly network and the grail network, which are fundamental primitive networks for classical network coding. We also analyze probabilistic implementations of unitary operations over cluster networks.

  3. MFC Communications Infrastructure Study

    SciTech Connect (OSTI)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  4. Systematic wireless network coding

    E-Print Network [OSTI]

    Shrader, Brooke E.

    We present a systematic network coding strategy for cooperative communication, in which some nodes may replicate-and-forward packets in addition to sending random linear combinations of the packets. We argue that if this ...

  5. 16.36 Communication Systems Engineering, Spring 2003

    E-Print Network [OSTI]

    Modiano, Eytan H.

    Introduces the fundamentals of digital communications and networking. Topics covered include elements of information theory, sampling and quantization, coding, modulation, signal detection and system performance in the ...

  6. Assessment of Interdependencies between Communication and Information Technology

    E-Print Network [OSTI]

    Assessment of Interdependencies between Communication and Information Technology Infrastructure, oil and gas networks, transportation, financial ser- vices, etc. Over the years, integration

  7. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    K U R I Y O a n d M O H A M M A D A B D U L L A Toward a Network Based 3D Printing Service KTH Information and Communication Technology #12;Toward a Network Based3D Printing Service Laurier Ndikuriyo realized and is left as future work. Keywords: 3D-printing, MakerBot Thing-o-Matic, Replicatorg, LAMP, Open

  8. Departmental Communications

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1978-09-26

    The order establishes standards on eliminating gender-specific terminology from all DOE communications. Canceled by DOE O 1321.139.

  9. Underwater Sensor Networks: Applications, Advances, and Challenges

    E-Print Network [OSTI]

    Heidemann, John

    communication, acoustic communication, underwater sensor networks, autonomous underwater vehicles, acoustic instrument monitoring, pollution control, climate recording, prediction of natural disturbances, search-alone applications and control of autonomous underwater vehicles (AUVs), and as an addition to ca- bled systems

  10. Design of a mobile coastal communications buoy

    E-Print Network [OSTI]

    Hendry-Brogan, Meghan

    2004-01-01

    In response to a growing interest in networked communications at sea as well as the needs of our vital commercial fishing industry, the Northeast Consortium funded a novel research initiative to establish wireless acoustic ...

  11. Energy and quality scalable wireless communication

    E-Print Network [OSTI]

    Min, Rex K. (Rex Kee), 1976-

    2003-01-01

    Nodes for emerging, high-density wireless networks will face the dual challenges of continuous, multi-year operation under diverse and challenging operating conditions. The wireless communication subsystem, a substantial ...

  12. Impedance matching techniques for ethernet communication systems 

    E-Print Network [OSTI]

    Kamprath, Richard Alan

    2007-09-17

    In modern local area networks, the communication signals sent from one computer to another across the lines of transmission are degraded because of reflection at the receiver. This reflection can be characterized through the impedances...

  13. Techniques for green radio cellular communications 

    E-Print Network [OSTI]

    Videv, Stefan

    2013-07-01

    This thesis proposes four novel techniques to solve the problem of growing energy consumption requirements in cellular communication networks. The first and second part of this work propose a novel energy efficient ...

  14. MMS: An Autonomic Network-Layer Foundation for Network Management

    E-Print Network [OSTI]

    Ng, T. S. Eugene

    secured, and/or suboptimal in performance. This paper presents the design and implementation of the Meta-Management1 MMS: An Autonomic Network-Layer Foundation for Network Management Hemant Gogineni, Albert Research §Rice University Abstract-- Networks cannot be managed without management plane communications

  15. Hierarchical Wireless Network Architecture for Distributed Applications Zeashan Hameed Khan

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Hierarchical Wireless Network Architecture for Distributed Applications Zeashan Hameed Khan Control-- This paper describes a hierarchical wireless network architecture for real time remote coordination, Distributed monitoring, QoS adaptation, Realtime coordination I. INTRODUCTION Wireless communication networks

  16. TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    of Nikola Tesla #12;January 17, 2005 UBC Ljiljana Trajkovic, Simon Fraser University 9 Wireless patentsTESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS Ljiljana Trajkovi Communication Networks;January 17, 2005 UBC Ljiljana Trajkovic, Simon Fraser University 2 Road map Tesla in 1890's First wireless

  17. TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    to align with the electric field. The Inventions, Researches and Writings of Nikola Tesla #12;March 12TESLA'S VISION OF THE WIRELESS GLOBAL COMMUNICATIONS Ljiljana Trajkovi Communication Networks;March 12, 2004 Kwantlen College Ljiljana Trajkovic, Simon Fraser University 2 Road map Tesla in 1890's

  18. In: Management Solutions for the New Communications World: NOMS 2002 Proceedings of the 2002 8th International IEEE/IFIP Network Operations and

    E-Print Network [OSTI]

    International IEEE/IFIP Network Operations and Management Symposium , Florence, Italy IEEE Publishing, April, a user-- and quality--oriented service management is desperately needed to fulfill the posed requirements model supports service planing, provisioning, operation as well as service management at the customer

  19. Sensor networks offer a powerful combination of distributed sensing, computing and com-munication. They lend themselves to countless applications and, at the same time, offer

    E-Print Network [OSTI]

    Haenggi, Martin

    environmental data (air temperature, light, wind, relative humidity and rainfall) are gathered by a network to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor net- works have a direct impact on the hardware design of the nodes at at least

  20. The Center for Satellite and Hybrid Communication Networks is a NASA Commercial Space Center and part of the Institute for Systems Research

    E-Print Network [OSTI]

    Wood, Lloyd

    -satellite constellation networks were, briefly, a vogueish research area, as the commercial satellite industry embraced a more realistic look at the current satellite industry and areas of interest including: · DVB: IP over of Maryland, College Park Refreshments Provided Faculty Host: Dr. M. Hadjitheodosiou #12;

  1. 14 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Data Attack Isolation in Power Networks Using

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    these systems the Supervisory Control And Data Acquisition (SCADA) systems are indispensable. Through remote terminal units (RTUs), SCADA systems measure data such as transmission line power flows, bus power blackout of 2003 [3]. The SCADA systems of today are interconnected to office LANs, and through the LANs

  2. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden L U C I A N O R U's Live Smooth Streaming, have recently become very popular. This master's thesis project developed and evaluated several media rate adaptation algorithms optimized for mobile networks with a client running

  3. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden B I N G H A N L I to the existing mobile networks. In the practical evaluation of the GTP-U tunnel protocol implementation conducted and described in the evaluation chapter. Cloud computing has become one of the hottest Internet

  4. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden A L E S S A N D R O M O N G E Design, implementation, analysis, and evaluation Synchronized MAC layer for ultra for ultra-wideband wireless sensor network Design, implementation, analysis, and evaluation Alessandro Monge

  5. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden PAV E L L E G O N. In this master's thesis IEEE 802.11n technology was evaluated to assess its suitability for backhaul from a small secure small cells into a mobile network was developed. The results obtained during the project

  6. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden N I YA Z A D I G O network resources. This master's thesis project proposes to multiplex RTP and data packets at the user and cost metrics are used to evaluate different potential demultiplexing points, and then the best possible

  7. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden F E R N A N D O VA seamless handover between Wi-Fi APs and between cellular/Wi-Fi networks. During this thesis project interworking. Finally, a custom-designed simulator has been used to evaluate the proposed solution. Keywords

  8. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    of the main achievements of this thesis project. Evaluation of the measurement results indicates that fiberDegree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden M O Z H G A N for small cell backhaul. This thesis project investigates if a small cell network's requirements can

  9. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden A H M E D K A M was to addresses the churn behavior issues and to suggest and evaluate potential solutions while ensuring a load dependent data consistent and cohesive across the network. Furthermore, an implementation and evaluation

  10. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Degree project in Communication Systems Second level, 30.0 HEC Stockholm, Sweden L U I S M A Q U E D A A R A Design, Implementation, analysis, and evaluation Neighbor Discovery Proxy-Gateway for 6Lo-Gateway for 6LoWPAN-based Wireless Sensor Networks Design, Implementation, analysis, and evaluation Luis Maqueda

  11. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    and Communication Technology #12;Energy-Efficient Vertical Handovers José María Rodríguez Castillo jmrc@kth.se 2 networks consist basically of LTE micro cells and Wi-Fi. Both the energy savings and the potential energy A R O D R Í G U E Z C A S T I L L O Energy-Efficient Vertical Handovers KTH Information

  12. Energy Control Centers 1.0 Introduction

    E-Print Network [OSTI]

    McCalley, James D.

    terminal unit SCADA Master Station Communicationlink Energy control center with EMS EMS alarm display EMS 1), the supervisory control and data acquisition (SCADA), and the communications interconnecting the EMS and the SCADA (which is often thought of as part of the SCADA itself). Figure 3a [1] provides a block diagram

  13. RESOURCE ALLOCATION AND CONTROL IN COMMUNICATION AND CYBERPHYSICAL

    E-Print Network [OSTI]

    Sinha, Prasun

    RESOURCE ALLOCATION AND CONTROL IN COMMUNICATION AND CYBERPHYSICAL NETWORKS WITH RENEWABLE ENERGY include both communication networks and the smart power grid. Since the renewable energy is usually highly utilization of them. In this thesis, we study the control and optimization strategies of renewable energy

  14. Final Project Report: DOE Award FG02?04ER25606 Overlay Transit Networking for Scalable, High Performance Data Communication across Heterogeneous Infrastructure

    SciTech Connect (OSTI)

    Micah Beck; Terry Moore

    2007-08-31

    As the flood of data associated with leading edge computational science continues to escalate, the challenge of supporting the distributed collaborations that are now characteristic of it becomes increasingly daunting. The chief obstacles to progress on this front lie less in the synchronous elements of collaboration, which have been reasonably well addressed by new global high performance networks, than in the asynchronous elements, where appropriate shared storage infrastructure seems to be lacking. The recent report from the Department of Energy on the emerging 'data management challenge' captures the multidimensional nature of this problem succinctly: Data inevitably needs to be buffered, for periods ranging from seconds to weeks, in order to be controlled as it moves through the distributed and collaborative research process. To meet the diverse and changing set of application needs that different research communities have, large amounts of non-archival storage are required for transitory buffering, and it needs to be widely dispersed, easily available, and configured to maximize flexibility of use. In today's grid fabric, however, massive storage is mostly concentrated in data centers, available only to those with user accounts and membership in the appropriate virtual organizations, allocated as if its usage were non-transitory, and encapsulated behind legacy interfaces that inhibit the flexibility of use and scheduling. This situation severely restricts the ability of application communities to access and schedule usable storage where and when they need to in order to make their workflow more productive. (p.69f) One possible strategy to deal with this problem lies in creating a storage infrastructure that can be universally shared because it provides only the most generic of asynchronous services. Different user communities then define higher level services as necessary to meet their needs. One model of such a service is a Storage Network, analogous to those used within computation centers, but designed to operate on a global scale. Building on a basic storage service that is as primitive as possible, such a Global Storage Network would define a framework within which higher level services can be created. If this framework enabled a variety of more specialized middleware and supported a wide array of applications, then interoperability and collaboration could occur based on that common framework. The research in Logistical Networking (LN) carried out under the DOE's SciDAC program tested the value of this approach within the context of several SciDAC application communities. Below we briefly describe the basic design of the LN storage network and some of the results that the Logistical Networking community has achieved.

  15. Class network routing

    DOE Patents [OSTI]

    Bhanot, Gyan (Princeton, NJ); Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  16. Quality of service analysis for audio over cellular voice networks and cellular wireless wide area networks

    E-Print Network [OSTI]

    Malik, Omair S. (Omair Safwan)

    2007-01-01

    Cellular Wireless Wide Area Networks (WWANs) are most prevalent and offer high-bandwidth data transfer. We believe WWANs can be availed for voice communications employing Voice Over IP technologies. Such a communication ...

  17. The Common Communication Interface (CCI)

    SciTech Connect (OSTI)

    Shipman, Galen M [ORNL; Atchley, Scott [ORNL; Dillow, David A [ORNL; Geoffray, Patrick [ORNL; Bosilca, George [University of Tennessee, Knoxville (UTK); Squyres, Jeffrey M [ORNL; Minnich, Ronald [Sandia National Laboratories (SNL)

    2011-01-01

    There are many APIs for connecting and exchanging data between network peers. Each interface varies wildly based on metrics including performance, portability, and complexity. Specifically, many interfaces make design or implementation choices emphasizing some of the more desirable metrics (e.g., performance) while sacrificing others (e.g., portability). As a direct result, software developers building large, network-based applications are forced to choose a specific network API based on a complex, multi-dimensional set of criteria. Such trade-offs inevitably result in an interface that fails to deliver some desirable features. In this paper, we introduce a novel interface that both supports many features that have become standard (or otherwise generally expected) in other communication interfaces, and strives to export a small, yet powerful, interface. This new interface draws upon years of experience from network-oriented software development best practices to systems-level implementations. The goal is to create a relatively simple, high-level communication interface with low barriers to adoption while still providing important features such as scalability, resiliency, and performance. The result is the Common Communications Interface (CCI): an intuitive API that is portable, efficient, scalable, and robust to meet the needs of network-intensive applications common in HPC and cloud computing.

  18. Energy Cooperation in Energy Harvesting Wireless Communications

    E-Print Network [OSTI]

    Ulukus, Sennur

    Energy Cooperation in Energy Harvesting Wireless Communications Berk Gurakan1 , Omur Ozel1 , Jing the broadcast nature of the wireless network. In this work, we anticipate an energy harvesting network where transfer a portion of its energy to the relay node as in Fig. 1 through a separate wireless energy transfer

  19. Wireless Relay Communications with Unmanned Aerial Vehicles

    E-Print Network [OSTI]

    Swindlehurst, A. Lee

    1 Wireless Relay Communications with Unmanned Aerial Vehicles: Performance and Optimization in which Unmanned Aerial Vehicles (UAVs) are used as relays between ground-based terminals and a network node and relay assignments as the topology of the network evolves. Index Terms: unmanned aerial

  20. Joint Optimization of Communication Rates and Linear Systems

    E-Print Network [OSTI]

    Joint Optimization of Communication Rates and Linear Systems L. Xiao M. Johansson H. Hindi S. Boyd system, such as a controller or estimator, in which several signals are transmitted over communication in the design of networked controllers and the associated communication systems, including bit rate limitations

  1. Towards Integrated PSEs for Wireless Communications: Experiences with the S

    E-Print Network [OSTI]

    Ramakrishnan, Naren

    ¥ Wireless Networking and Communications Group (WNCG) Department of Electrical and Computer EngineeringTowards Integrated PSEs for Wireless Communications: Experiences with the S W and SitePlanner R¦ , Jing Jiang¦ , and William H. Tranter¦ ¢ Wireless Valley Communications, Inc. Austin, TX 78758 £ Google

  2. International Conference on IEEESignal Processing and Communications R

    E-Print Network [OSTI]

    Sharma, Vinod

    Biomedical Signal Processing Spoken Language Processing Underwater Communications and Signal Processing Communication Adaptive and Array Signal Processing MIMO and Space-Time Signal Processing Compressive Sensing & Applications Cognitive Radio Signal Processing for Communications Network Coding Machine Learning/AI for Signal

  3. COMMUNICATION A comprehensive

    E-Print Network [OSTI]

    COMMUNICATION A comprehensive communication degree from the Elliott School of Communication relations, or applied communication. Our program is interdisciplinary in nature, reflecting the contemporary belief that all communication media are engaged in essentially the same functions--gathering information

  4. Phase patterns of coupled oscillators with application to wireless communication

    SciTech Connect (OSTI)

    Arenas, A.

    2008-01-02

    Here we study the plausibility of a phase oscillators dynamical model for TDMA in wireless communication networks. We show that emerging patterns of phase locking states between oscillators can eventually oscillate in a round-robin schedule, in a similar way to models of pulse coupled oscillators designed to this end. The results open the door for new communication protocols in a continuous interacting networks of wireless communication devices.

  5. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain Authentication in Mobile Communication Systems Chern-Tang Lin, Shiuh-Pyng Shieh Department of Computer Science systems have become a future trend in personal communications services (PCS) networks. To satisfy

  6. A Communication Virtual Machine Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang,

    E-Print Network [OSTI]

    Sadjadi, S. Masoud

    A Communication Virtual Machine Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang, Vagelis}@cs.fiu.edu Abstract The convergence of data, voice and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enriched the ways we communicate

  7. A Communication Virtual Machine Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang,

    E-Print Network [OSTI]

    Hristidis, Vagelis

    1 A Communication Virtual Machine Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang, Vagelis}@cs.fiu.edu Abstract The convergence of data, voice and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enriched the ways we communicate

  8. A Communication Virtual Machine Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang,

    E-Print Network [OSTI]

    Sadjadi, S. Masoud

    1 A Communication Virtual Machine Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang, Vagelis communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enriched the ways we communicate. However, the stovepipe approach used to develop today

  9. Optimal Power Flow: Closing the Loop over Corrupted Data

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    application are the Supervisory Control and Data Acquisition (SCADA) systems. In power networks, the SCADA System. Modern SCADA/EMS systems collect large amounts of measurement data and, using a State Estimator attack. We denote the data corruption by a. cyber attacks on SCADA/EMS systems operating power net- works

  10. Transmission Power Allocation for Cooperative Relay-BasedNeighborhood Area Networks for Smart Grid

    E-Print Network [OSTI]

    Spanos, Costas; Kai, Ma; Guo-Qiang, HU

    2013-01-01

    Architecture for the Smart Grid, IEEE Network, vol. 25, no.to-Machine Communications in Smart Grid. IEEE CommunicationInfrastructure for Smart Grid. IEEE Network, vol. 25, no.5,

  11. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Network management and QoS provisioning - 1Andrea of this license visit: http://creativecommons.org/licenses/by-nc- /3 0/ Network management and QoS provisioning ­ Chapter 9, Network Management, of the book Jim Kurose, Keith Ross, Computer Networking, A Top Down

  12. Ad-hoc wireless network coverage with networked robots that cannot localize

    E-Print Network [OSTI]

    Correll, Nikolaus

    We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...

  13. Flexible network wireless transceiver and flexible network telemetry transceiver

    DOE Patents [OSTI]

    Brown, Kenneth D. (Grain Valley, MO)

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  14. SCANDEX: Service Centric Networking for Challenged Decentralised Networks

    E-Print Network [OSTI]

    Sathiaseelan, Arjuna; Wang, Liang; Aucinas, Andrius; Tyson, Gareth; Crowcroft, Jon

    2015-05-18

    emerged, operating using ad hoc wireless links. The regional authorities have invested in a Unmanned Aerial Vehicle (UAV) that flies along predeter- mined paths over the disaster zone. When the UAV comes into wireless contact with a DIY network, it can... temporar- ily communicate. The UAV may, or may not, have back- haul Internet connectivity. The UAV and the DIY networks all operate SCNx. For simplicity, all nodes on an intrado- main level utilise the same communications technologies; we assume a...

  15. Resilience of Networks Formed of Interdependent Modular Networks

    E-Print Network [OSTI]

    Shekhtman, Louis; Havlin, Shlomo

    2015-01-01

    Many infrastructure networks have a modular structure and are also interdependent. While significant research has explored the resilience of interdependent networks, there has been no analysis of the effects of modularity. Here we develop a theoretical framework for attacks on interdependent modular networks and support our results by simulations. We focus on the case where each network has the same number of communities and the dependency links are restricted to be between pairs of communities of different networks. This is very realistic for infrastructure across cities. Each city has its own infrastructures and different infrastructures are dependent within the city. However, each infrastructure is connected within and between cities. For example, a power grid will connect many cities as will a communication network, yet a power station and communication tower that are interdependent will likely be in the same city. It has been shown that single networks are very susceptible to the failure of the interconn...

  16. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, D.B.

    1996-12-31

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor to a plurality of slave processors to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor`s status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer, a digital signal processor, a parallel transfer controller, and two three-port memory devices. A communication switch within each node connects it to a fast parallel hardware channel through which all high density data arrives or leaves the node. 6 figs.

  17. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, Dario B. (DeSoto, TX)

    1996-01-01

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  18. Communication and Structured Correlation

    E-Print Network [OSTI]

    Wagner, Elliott

    2009-01-01

    evolution of animal communication: Reliability and deceptiony ORIGINAL ARTICLE Communication and Structured CorrelationMy results show that communication with neighbors is more

  19. Lead, Communications Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will: Serve as Lead, Communications Specialist for the Communications Team. Assists the Communications Director in planning, coordinating and implementing...

  20. Social networks and research output

    E-Print Network [OSTI]

    Ductor, Lorenzo; Fafchamps, Marcel; Goyal, Sanjeev; van der Leij, Marco J.

    2013-11-12

    and Scheinkman (2002). In recent years, interest has shifted to the ways by which the architecture of social networks influences behavior and outcomes.2 Recent empirical papers on network effects include Bramoulle´, Djebbari and Fortin (2009), Calvo... the length of papers and the duration of the review process in economics, it is reasonable to suppose that collabora- tion entails communication over an extended period of time. These considerations – personal interaction and sustained communication – in turn...

  1. Magnetostatic communication

    DOE Patents [OSTI]

    Daily, William D. (Livermore, CA)

    2008-02-26

    A system for providing communication of information by modulating a magnetostatic field with a magnetostatic transmitter that modulates said magnetostatic field to contain the information and detecting the information in the modulated field at a distance with a magnetostatic detector that detects the modulated magnetic field containing the information.

  2. Quantum Communication

    E-Print Network [OSTI]

    Nicolas Gisin

    2015-07-18

    Quantum Communication is the art of transferring an unknown quantum state from one location, Alice, to a distant one, Bob. This is a non-trivial task because of the quantum no-cloning theorem which prevents one from merely using only classical means.

  3. Routing for Wireless Multi Hop Networks Unifying and Distinguishing Features

    E-Print Network [OSTI]

    Graham, Nick

    -to-end communication, wireless communication provides flexible deployment and use, cost reduction, mobility, network dynamic network conditions due to interference, loss of signal power with distance and freedom of mobilityRouting for Wireless Multi Hop Networks ­ Unifying and Distinguishing Features Technical Report

  4. A Network-based System Architecture for Remote Medical Applications

    E-Print Network [OSTI]

    Jantsch, Axel

    mobile technology [1] [2] [10]. 3G communication network provides a broadband, packet-based transmissionA Network-based System Architecture for Remote Medical Applications Huimin She1, 2 1 Dept-21-5135-5286 zhoud@fudan.edu.cn ABSTRACT Nowadays, the evolution of wireless communication and network technologies

  5. 21F.019 / 21F.021 Communicating Across Cultures, Spring 2003

    E-Print Network [OSTI]

    Widdig, Bernd

    In an increasingly interconnected world, communicating across cultures is a crucial skill in the international networks of business, science, and technology. Subject examines a range of communication styles and techniques ...

  6. Optical Network Testbeds Workshop

    SciTech Connect (OSTI)

    Joe Mambretti

    2007-06-01

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking technologies. Several years ago, when many of these optical networking research topics were first being investigated, they were the subject of controversial debate. The new techniques challenged many long-held concepts related to architecture and technology. However, today all major networking organizations are transitioning toward infrastructure that incorporates these new concepts. This progress has been assisted through the series of Optical Networking Testbed Workshops (ONT). The first (ONT1) outlined a general framework of key issues and topics and developed a series of recommendations (www.nren.nasa.gov/workshop7). The second (ONT2) developed a common vision of optical network technologies, services, infrastructure, and organizations (www.nren.nasa.gov/workshop8). Processes that allow for a common vision encourage widespread deployment of these types of resources among advanced networking communities. Also, such a shared vision enables key concepts and technologies to migrate from basic research testbeds to wider networking communities. The ONT-3 workshop built on these earlier activities by expanding discussion to include additional considerations of the international interoperability and of greater impact of optical networking technology on networking in general. In accordance with this recognition, the workshop confirmed that future-oriented research and development is indispensable to fundamentally change the current Internet architecture to create a global network incorporating completely new concepts. The workshop also recognized that the first priority to allow for this progress is basic research and development, including international collaborative activities, which are important for the global realization of interoperability of a new generation architecture.

  7. Risk communications & emergency planning

    SciTech Connect (OSTI)

    Baranski, S.C. [EQUINOX Environmental, Inc., Shushan, NY (United States)

    1995-12-31

    This talk outlines the interface between good risk communication and emergency planning. The major topics include the following: What is risk communication and how is it applied to emergency planning; crisis communication and the need to know and how to integrate crisis communication and risk communication; the face of the emergency: spokespersons, public information; The Media`s role in emergency Public information and risk communication; Developing the risk communication message; How to respond to continuing need for 24 hours communications; the EAS and Risk communication and Crisis communication; and finally where is risk communication heading and how it can help.

  8. Acoustic system for communication in pipelines

    DOE Patents [OSTI]

    Martin, II, Louis Peter (San Ramon, CA); Cooper, John F. (Oakland, CA)

    2008-09-09

    A system for communication in a pipe, or pipeline, or network of pipes containing a fluid. The system includes an encoding and transmitting sub-system connected to the pipe, or pipeline, or network of pipes that transmits a signal in the frequency range of 3-100 kHz into the pipe, or pipeline, or network of pipes containing a fluid, and a receiver and processor sub-system connected to the pipe, or pipeline, or network of pipes containing a fluid that receives said signal and uses said signal for a desired application.

  9. Controlling Across Complex Networks Emerging links between networks and control

    E-Print Network [OSTI]

    , and Electrical Engineering University of New Mexico, Albuquerque NM 87131. Sandia National Laboratories communication network infrastructure into our designs; for example, we now consider the impact of link capacity as biology, computer science, physics, and social science. In such a context, networks provide a principled

  10. Handheld portable real-time tracking and communications device

    DOE Patents [OSTI]

    Wiseman, James M. (Albuquerque, NM); Riblett, Jr., Loren E. (Edgewood, NM); Green, Karl L. (Albuquerque, NM); Hunter, John A. (Albuquerque, NM); Cook, III, Robert N. (Rio Rancho, NM); Stevens, James R. (Arlington, VA)

    2012-05-22

    Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

  11. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    . Maguire Jr. #12;i Abstract This thesis is the result of the bachelor's thesis project "Evaluating an IPv4Degree project in Communication Systems First level, 15.0 HEC Stockholm, Sweden G I L B E R T L I D H O L M a n d M A R C U S N E T T E R B E R G Evaluating an IPv4 and IPv6 Network KTH Information

  12. Efficient long distance quantum communication

    E-Print Network [OSTI]

    Sreraman Muralidharan; Linshu Li; Jungsang Kim; Norbert Lütkenhaus; Mikhail D. Lukin; Liang Jiang

    2015-09-28

    Despite the tremendous progress of quantum cryptography, efficient quantum communication over long distances (>1000km) remains an outstanding challenge due to fiber attenuation and operation errors accumulated over the entire communication distance. Quantum repeaters, as a promising approach, can overcome both photon loss and operation errors, and hence significantly speedup the communication rate. Depending on the methods used to correct loss and operation errors, all the proposed QR schemes can be classified into three categories (generations). Here we present the first systematic comparison of three generations of quantum repeaters by evaluating the cost of both temporal and physical resources, and identify the optimized quantum repeater architecture for a given set of experimental parameters. Our work provides a roadmap for the experimental realizations of highly efficient quantum networks over transcontinental distances.

  13. Buildings-to-Grid Technical Opportunities: From the Information and Communications Technology Perspective

    SciTech Connect (OSTI)

    Kuruganti, Teja; Brabmley, Michael

    2014-03-28

    Information and communications technology (ICT) has enabled the integration of computer and audio-visual networks, leading to unprecedented exchange of data between various users and entities.

  14. Title of dissertation: CODING AND SCHEDULING IN ENERGY HARVESTING COMMUNICATION SYSTEMS

    E-Print Network [OSTI]

    Ulukus, Sennur

    ABSTRACT Title of dissertation: CODING AND SCHEDULING IN ENERGY HARVESTING COMMUNICATION SYSTEMS of Electrical and Computer Engineering Wireless networks composed of energy harvesting devices will introduce sev- eral transformative changes in wireless networking: energy self-sufficient, energy self

  15. Wireless Network Security and Interworking MINHO SHIN, JUSTIN MA, ARUNESH MISHRA, AND WILLIAM A. ARBAUGH

    E-Print Network [OSTI]

    Wireless Network Security and Interworking MINHO SHIN, JUSTIN MA, ARUNESH MISHRA, AND WILLIAM A, in- terworking between heterogeneous wireless networks is extremely important for ubiquitous and high communication technologies cover a whole spec- trum from wireless personal area networks (WPANs

  16. Google matrix analysis of directed networks

    E-Print Network [OSTI]

    Leonardo Ermann; Klaus M. Frahm; Dima L. Shepelyansky

    2015-06-19

    In past ten years, modern societies developed enormous communication and social networks. Their classification and information retrieval processing become a formidable task for the society. Due to the rapid growth of World Wide Web, social and communication networks, new mathematical methods have been invented to characterize the properties of these networks on a more detailed and precise level. Various search engines are essentially using such methods. It is highly important to develop new tools to classify and rank enormous amount of network information in a way adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency on various examples including World Wide Web, Wikipedia, software architecture, world trade, social and citation networks, brain neural networks, DNA sequences and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos and Random Matrix theory.

  17. Betweenness Centrality in Dense Random Geometric Networks

    E-Print Network [OSTI]

    Dettmann, Carl

    separation, and are the classic model used within the expanding field of ad-hoc wireless networks. In order. In router-based communication networks, the router itself has a normalised betweenness of unity, since all there is no router [2]­[4]. These structures are known as wire- less ad-hoc (or `relay') networks, where packets

  18. LANAI HIGH-DENSITY IRRADIANCE SENSOR NETWORK FOR CHARACTERIZING...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on-site RF communication coverage a National Instruments (NI) Wireless Sensor Network (WSN) module with data acquisition capabilities was selected. The NI WSN-3212 module...

  19. From enclosure to embrace : punitive isolation and network culture

    E-Print Network [OSTI]

    Rockwood, Jason Willis Krider

    2009-01-01

    Cultural theorists such as Henry Jenkins¹, Lawrence Lessig², Yochai Benkler³ , Robert Hassan?, and Manuel Castells?, have written extensively on the role of network communications technologies in reconfiguring contemporary ...

  20. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network management and QoS provisioning - 1Andrea Bianco ­ TNG group - Politecnico di Torino Telecommunication management and QoS provisioning - 2Andrea Bianco ­ TNG group - Politecnico di Torino Stanford, California

  1. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  2. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  3. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015ExecutiveFluorescent LampFort Collins,47328 Vol. 77, No.Framework

  4. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesign

  5. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram Overview Home

  6. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram OverviewTraining

  7. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram

  8. Scholarly Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque| Stanford Synchrotron RadiationCommunication Scholarly

  9. On the role of feedback in network coding

    E-Print Network [OSTI]

    Sundararajan, Jay Kumar, 1982-

    2009-01-01

    Network coding has emerged as a new approach to operating communication networks, with a promise of improved efficiency in the form of higher throughput, especially in lossy conditions. In order to realize this promise in ...

  10. New No-Cost ANTFARM Tool Maps Control System Networks to Help...

    Office of Environmental Management (EM)

    Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that...

  11. Project no.: IST-FP6-STREP -027513 Project full title: Critical Utility InfrastructurAL Resilience

    E-Print Network [OSTI]

    Neves, Nuno

    to the hybrid composition of those infrastructures: operational network, called generically SCADA, devoted unwittingly, the SCADA network is sometimes connected to. In consequence, in scientific terms, our problem can systems problem including interconnected SCADA/embedded networks, corporate intranets, and Internet

  12. Persuasive Negotiation and Communication

    E-Print Network [OSTI]

    Richmond, Geraldine L.

    Persuasive Negotiation and Communication Techniques Geri Richmond University of Oregon COACh http://coach.uoregon.edu #12;Today's focus Successful techniques for increasing your communication and negotiation skills communication includes body language Up to 93 % of communication is non-verbal. The eyes communicate more than

  13. An Approach to Wireless Communications at Sandia National Laboratories

    SciTech Connect (OSTI)

    WITZKE, EDWARD L.

    2002-10-01

    Wireless communication plays an increasing role in military, industrial, public safety, and academic computer networks. Although in general, radio transmitters are not currently permitted in secured areas at Sandia, wireless communications would open new opportunities, allowing mobile and pervasive user access. Without wireless communications, we must live in a ''non-mainstream'' world of fixed, wired networks, where it becomes ever more difficult to attract and retain the best professionals. This report provides a review of the current state of wireless communications, which direction wireless technology is heading, and where wireless technology could be employed at Sandia. A list of recommendations on harnessing the power of wireless communications is provided to aid in building a state-of-the-art communication environment for the 21st century at Sandia.

  14. October 11, 2006 Formal Modeling and Analysis of the Modbus Protocol

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and distributed control ap- plications. This report systems --sometimes called SCADA systems-- have been used for many years in manufacturing, transport

  15. Proposal of CSP based Network Design and Construction

    E-Print Network [OSTI]

    Fukunaga, Chikara

    Proposal of CSP based Network Design and Construction Session:Network and Protocol Short PaperWire network. The design was based on a formal method using CSP ( Communicating Sequential Processes]. In this paper we discuss the reason why we use CSP as a formal design method for the router-network system

  16. Mojtaba Abkenar, Nabil Al-Rousan, Tanjila Farah, Rajvir Gill, Sukhchandan Lally, Ravinder Paul, Don Xu, and Ljiljana Trajkovi Communication Networks Laboratory, School of Engineering Science, Simon Fraser University

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    transit providers are connected to routers via 1 Gig and 10 Gig network links · Data are sent to Traffic

  17. ECE 5332 Communications and Control in Smart Grid

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    ECE 5332 Communications and Control in Smart Grid A.H. MohsenianRad (U of T) 1Networking;Course Overview Dr. Hamed Mohsenian-Rad Texas Tech UniversityCommunications and Control in Smart Grid 2 · Graduate Course on Introduction to Smart Grid. · No Official Prerequisites: Background in the following

  18. Finding Hidden Group Structure in a Stream of Communications

    E-Print Network [OSTI]

    Zaki, Mohammed Javeed

    in a communication network is a group of individuals planning an activity over a communication medium with- out group. The algorithms construct larger hidden groups by build- ing them up from smaller ones activity provides the ideal environment for groups to plan their activity undetected: the related

  19. Cooperative Energy Harvesting Communications with Relaying and Energy Sharing

    E-Print Network [OSTI]

    Yener, Aylin

    Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu where the transmitters harvest their energy in an inter- mittent fashion. In this network, communication of transferring energy to one another, i.e., energy cooperation. Energy is partially lost during transfer

  20. Minimizing Communication for Eigenproblems and the Singular Value Decomposition

    E-Print Network [OSTI]

    California at Berkeley, University of

    , James Demmel , and Ioana Dumitriu February 28, 2012 Abstract Algorithms have two kinds of costs, or between processors over a network. The cost of communication can greatly exceed the cost of arithmetic, so and analyze their convergence properties and communication costs. Our algorithms use randomization in two ways

  1. A SELF SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS

    E-Print Network [OSTI]

    Kent, University of

    attached to sensor nodes have a limited transmission range, multi-hop communication is needed to flexiblyA SELF ­ SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS SENSOR NETWORKS #Antonio Gonzalez-Velazquez1 , Ian W Marshall2 , Lionel Sacks1 1 Department of Electronic and electric engineering

  2. Information and Communications Infrastructure

    E-Print Network [OSTI]

    Communications Utilization and Performance________________________ 20 5.3 Systems Support Utilization and Performance ____________________________ 21 5.4 Radio Communications Systems Utilization and Performance of the communications infrastructure and information systems used during this time period. It addresses resources

  3. Asian Communication Modes

    E-Print Network [OSTI]

    Zhang, Yan Bing

    2008-01-01

    Communication in its simplest form refers to the ongoing process of sharing and understanding meaning (? Communication: Definitions and Concepts). Much of a problematic intercultural communication stems from different ways that message is composed...

  4. Optical Communication Without Photons

    E-Print Network [OSTI]

    Nicolas Gisin

    2013-04-30

    I analyse a recent quantum communication protocol by Salih et al. that allows one to communicate without any particle carrying the information from the sender to the receiver. I show how this can equally be achieved using classical communication.

  5. COMMUNICATION Revised 2006

    E-Print Network [OSTI]

    Texas at Arlington, University of

    Z HAZARD COMMUNICATION PROGRAM Revised 2006 Environmental Health & Safety #12;TABLE OF CONTENTS................................................................................................. 1 B. Applicability of THCA (Texas Hazard Communication Act) 502............. 1 C. Definitions ................................................... 14 A. Hazard Communication Coordinator/Safety Representatives................... 15 B. Employee

  6. Communication Standards and Recommendations

    E-Print Network [OSTI]

    Communication Standards and Recommendations Introduction & Purpose 3 Standards & Recommendations Communication 4 Training 10 Evaluation 11 PMO Workgroup Participation 12 Staffing 12 Communications-related Tracking Grantee Portal Standards and Recommendations 13

  7. Abstract--Wireless Sensor Network (WSN) is an emerging special type of ad-hoc wireless networks technology. It is

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Abstract-- Wireless Sensor Network (WSN) is an emerging special type of ad-hoc wireless networks that differentiate it from other types of wireless networks. These differences raise new challenges to be overcome are wireless networks where nodes can communicate wirelessly with each other without the need for a fixed

  8. Global interrupt and barrier networks

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton-On-Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kopcsay, Gerard V. (Yorktown Heights, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY)

    2008-10-28

    A system and method for generating global asynchronous signals in a computing structure. Particularly, a global interrupt and barrier network is implemented that implements logic for generating global interrupt and barrier signals for controlling global asynchronous operations performed by processing elements at selected processing nodes of a computing structure in accordance with a processing algorithm; and includes the physical interconnecting of the processing nodes for communicating the global interrupt and barrier signals to the elements via low-latency paths. The global asynchronous signals respectively initiate interrupt and barrier operations at the processing nodes at times selected for optimizing performance of the processing algorithms. In one embodiment, the global interrupt and barrier network is implemented in a scalable, massively parallel supercomputing device structure comprising a plurality of processing nodes interconnected by multiple independent networks, with each node including one or more processing elements for performing computation or communication activity as required when performing parallel algorithm operations. One multiple independent network includes a global tree network for enabling high-speed global tree communications among global tree network nodes or sub-trees thereof. The global interrupt and barrier network may operate in parallel with the global tree network for providing global asynchronous sideband signals.

  9. Deep-Space Optical Communications: Future

    E-Print Network [OSTI]

    Djordjevic, Ivan B.

    INVITED P A P E R Deep-Space Optical Communications: Future Perspectives and Applications Current technologies available for deep-space optical data transmission and networking are discussed in this paper IEEE, Abhijit Biswas, and Ivan B. Djordjevic, Senior Member IEEE ABSTRACT | The concept of deep

  10. Energy Harvesting Wireless Communications-Part I

    E-Print Network [OSTI]

    Ulukus, Sennur

    #12;Motivation Energy efficient communication means something different than it did a decade ago-medical-devices-controlled-wireless-technology-nanotechnology/ (bottom) http://scitechdaily.com/smart-pills-will-track-patients-from-the-inside-out/ Energy Harvesting;Motivation New Wireless Network Design Challenge: A set of energy feasibility constraints based on harvests

  11. Distributed Sensing and Estimation Under Communication Constraints

    E-Print Network [OSTI]

    Mostofi, Yasamin

    . Murray University of New Mexico California Institute of Technology Abstract-- In this paper we consider the impact of imperfect communication links on distributed sensing and estimation in mobile networks. First a wide range of applications such as environmental monitoring, surveillance and security, smart homes

  12. Communicating with Energy Harvesting Transmitters and Receivers

    E-Print Network [OSTI]

    Yener, Aylin

    Communicating with Energy Harvesting Transmitters and Receivers Kaya Tutuncuoglu Aylin Yener a general framework for utility maximization of a wireless network with energy harvesting nodes. The focus is on applying this framework to the single-link problem with an energy harvesting transmitter and an energy

  13. Communication Issues in Pervasive Healthcare Systems and

    E-Print Network [OSTI]

    Vouyioukas, Demosthenes

    Vouyioukas Department of Information and Communication Systems Engineering, University of the Aegean studies to highlight the successes and concerns of homecare projects. There are several software/off-body networks technologies are discussed along with the provision of future trends for pervasive healthcare

  14. Communication and Computation in Distributed CSP Algorithms

    E-Print Network [OSTI]

    Krishnamachari, Bhaskar

    Communication and Computation in Distributed CSP Algorithms C`esar Fern`andez1 , Ram´on B´ejar1 in the context of networked distributed systems. In order to study the performance of Distributed CSP (DisCSP consider two complete DisCSP algorithms: asynchronous backtracking (ABT) and asynchronous weak commitment

  15. Efficient In-Network Moving Object Tracking in Wireless Sensor Networks

    E-Print Network [OSTI]

    Tseng, Yu-Chee

    -sensing MEMS technologies has made wireless sensor networks possible. Such environments may have manyEfficient In-Network Moving Object Tracking in Wireless Sensor Networks Chih-Yu Lin, Wen-Chih Peng-Chee Tseng) Abstract The rapid progress of wireless communication and embedded micro-sensing MEMS tech

  16. ORISE: Public Health Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communication Public Health Communication The Oak Ridge Institute for Science and Education (ORISE) assists government agencies and organizations in addressing public health...

  17. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01

    small size, low power and low cost UV LEDs were developedof the limited power by a LED. The major considerations indetection efficiency Power of a single LED 0.2 mW Wavelength

  18. Communication Paradigms for Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Collins, Justin Scott

    2014-01-01

    Mur06] Amy L. Murphy et al. “Lime: A Coordination Middlewareof mobile devices using the LIME II tuple-space framework. ”Bogdan Carbunar and et al. “Lime revisited. ” In Mobile

  19. DESIGNING COMMUNICATION NETWORKS VIA HILBERT MODULAR FORMS

    E-Print Network [OSTI]

    Theory, the arithmetic examples are partic- ularly interesting: all Ramanujan graphs are super-expanders; but in addition the examples have many other useful properties, for example very good expansion constants

  20. The Wireless Networking and Communications Group

    E-Print Network [OSTI]

    Heath Jr., - Robert W.

    Operator 70-80% of traffic offload CAPEX/OPEX saving $$$ Customer loyalty & reduce churn Multi-play bundled

  1. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01

    4.4.1 Outage Probability . . . . . . .transmission throughput and outage probability against p fortransmission throughput and outage probability against ? for

  2. Modeling and Performance Analysis of Communication Networks

    E-Print Network [OSTI]

    Xie,Jiang (Linda)

    ­Friday Breakfast 7:45am-9:45am Dinner 5:00pm-7:00pm Saturday Brunch 10:30am­1:00pm Sunday Lunch 12:15pm­1:15pm

  3. Architecting Space Communication Networks Marc Sanchez Net

    E-Print Network [OSTI]

    de Weck, Olivier L.

    of Aeronautics and Astronautics in partial fulfillment of the requirements for the degree of Master of Science in Aeronautics and Astronautics at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2014 c Massachusetts Institute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Department of Aeronautics and Astronautics May 22, 2014 Certified by

  4. Social Network and Communications Institutional Change Principle |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4Energy Smooth Brome MonitoringSocial Media Social

  5. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities

    E-Print Network [OSTI]

    Fan, Zhong; Gormus, Sedat; Efthymiou, Costas; Kalogridis, Georgios; Sooriyabandara, Mahesh; Zhu, Ziming; Lambotharan, Sangarapillai; Chin, Woon Hau

    2011-01-01

    Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.

  6. Distributed storage with communication costs

    E-Print Network [OSTI]

    Armstrong, Craig Kenneth

    2011-01-01

    in Electrical & Computer Engineering (Communication Theoryin Electrical & Computer Engineering (Communication Theory

  7. Optimized data communications in a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.

    2014-08-19

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  8. Optimized data communications in a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A

    2014-10-21

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  9. Advanced mobile networking, sensing, and controls.

    SciTech Connect (OSTI)

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  10. Desirable Properties of a Nationwide Public Safety Communication System Report and Recommendations of the

    E-Print Network [OSTI]

    1 Desirable Properties of a Nationwide Public Safety Communication System Report communication system. The subcommittee on Public Safety Networks has met in person and by phone and online to and potentially useful objectives for the design of a nationwide public safety communication system

  11. Stabilization of Linear Dynamical Systems with Scalar Quantizers under Communication Constraints

    E-Print Network [OSTI]

    Reissig, Gunther

    Stabilization of Linear Dynamical Systems with Scalar Quantizers under Communication Constraints for stabilizing the system at reduced data rates. I. INTRODUCTION Historically, communication and control have been an increasing demand on networks consisting of control and communication systems which are subject

  12. Maximizing degrees of freedom in wireless networks

    E-Print Network [OSTI]

    Borade, Shashibhushan Prataprao, 1981-

    2004-01-01

    We consider communication from a single source to a single destination in a wireless network with fading. Both source and destination have multiple antennas. The information reaches the destination through a sequence of ...

  13. Complexity of service value networks: Conceptualization

    E-Print Network [OSTI]

    of the services ecosystem. The paper then discusses what transformative role information and communication for consumers by providing greater levels of value network integration, information visibility, and means, consulting, logistics, information technology (IT), telecommunications, software, and health care. 1

  14. Clock synchronization for mobile ad hoc networks 

    E-Print Network [OSTI]

    Chandra, Rajan

    2013-02-22

    synchronization uses MANet specific communication primitives with Minimum Connected Dominating Set (MCDS) approximation algorithms. This involves using a subset of nodes in the network to broadcast clock information to neighboring nodes. Several MCDS approximation...

  15. A Survey of Network Design Problems

    E-Print Network [OSTI]

    Wong, Richard T.

    This report is a survey of the design of various types of networks that frequently occur in the study of transportation and communication problems. The report contains a general framework which facilitates comparisons ...

  16. A Survey of Network Design Problems

    E-Print Network [OSTI]

    Wong, Richard T.

    Network design problems arise in many different application areas such as air freight, highway traffic, and communication systems. The intention of this survey is to present a coherent unified view of a number of papers ...

  17. Wireless secrecy in large-scale networks

    E-Print Network [OSTI]

    Pinto, Pedro C.

    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections ...

  18. Networked Slepian-Wolf: Theory, Algorithms and Scaling Laws

    E-Print Network [OSTI]

    Cristescu, Razvan

    is analyzed. Index Terms-- Slepian-Wolf coding, linear programming, sensor networks, energy efficiency with Slepian-Wolf coding and explicit communication (conditional encoding based on explicitly communicated side, shortest path tree I. INTRODUCTION A. Problem Motivation Consider networks that transport supplies among

  19. On Cooperative Coding for Narrowband PLC Networks Lutz Lampea

    E-Print Network [OSTI]

    Lampe, Lutz

    On Cooperative Coding for Narrowband PLC Networks Lutz Lampea and A.J. Han Vinckb a line communications (PLC) is an old data-communication concept that has received renewed interest coding methods for LF NB PLC systems operating in low- voltage access networks. Keywords: Power line

  20. 360 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 3, MARCH 2015 Energy Harvesting Wireless Communications

    E-Print Network [OSTI]

    Ulukus, Sennur

    contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from harvesting wireless networks is considered in detail covering both energy cooperation aspects and simulta

  1. On Building Inexpensive Network Capabilities

    SciTech Connect (OSTI)

    Shue, Craig A; Kalafut, Prof. Andrew; Allman, Mark; Taylor, Curtis R

    2011-01-01

    There are many deployed approaches for blocking unwanted traffic, either once it reaches the recipient's network, or closer to its point of origin. One of these schemes is based on the notion of traffic carrying capabilities that grant access to a network and/or end host. However, leveraging capabilities results in added complexity and additional steps in the communication process: Before communication starts a remote host must be vetted and given a capability to use in the subsequent communication. In this paper, we propose a lightweight mechanism that turns the answers provided by DNS name resolution---which Internet communication broadly depends on anyway---into capabilities. While not achieving an ideal capability system, we show the mechanism can be built from commodity technology and is therefore a pragmatic way to gain some of the key benefits of capabilities without requiring new infrastructure.

  2. Anomaly Detection in Dynamic Networks

    SciTech Connect (OSTI)

    Turcotte, Melissa

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the communication counts. In a sequential analysis, anomalous behavior is then identified from outlying behavior with respect to the fitted predictive probability models. Seasonality is again incorporated into the model and is treated as a changepoint model on the transition probabilities of a discrete time Markov process. Second stage analytics are then developed which combine anomalous edges to identify anomalous substructures in the network.

  3. Communications Consultant RFP

    Broader source: Energy.gov [DOE]

    Communications Consultant RFP, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  4. Communication Sciences and Disorders

    E-Print Network [OSTI]

    Saldin, Dilano

    Communication Sciences and Disorders Communication Sciences and Disorders When the ability to communicate is disrupted, every aspect of daily living is affected. As a Speech-Language Pathologist or Audiologist, your evaluation and treatment helps clients and their families to improve communication skills

  5. Communication Consultant Contract

    Office of Energy Efficiency and Renewable Energy (EERE)

    Communication Consultant Contract, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  6. POSTGRADUATE MONTEREY, CALIFORNIA

    E-Print Network [OSTI]

    is unlimited. IDENTIFYING SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS ON A NETWORK VIA REMOTE Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance 6. AUTHOR And Data Acquisition (SCADA) and other control systems which operate the critical infrastructure

  7. This is the author version published as: This is the accepted version of this article. To be published as

    E-Print Network [OSTI]

    Boyd, Colin

    attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In: The 24th Management Scheme in Wireless Sensor Networks for PCS/SCADA Hani Alzaid and DongGook Park and Juan Gonz and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called

  8. Tamper Event Detection on Distributed Devices in Critical Infrastructure Jason Reeves, Sean Smith

    E-Print Network [OSTI]

    Smith, Sean W.

    of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data opportunity for attackers to infiltrate and damage a utility's SCADA network, and protecting these networks is critical. While a large body of work exists in both the physical tampering and SCADA protection spheres

  9. QUT Digital Repository: http://eprints.qut.edu.au/

    E-Print Network [OSTI]

    Boyd, Colin

    in wireless sensor networks for PCS/SCADA. In: Proceedings of the 1st International ICST Conference on Sensor Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA Hani Alzaid 1 , Dong. Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently

  10. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    SciTech Connect (OSTI)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  11. Correct-by-Construction and Optimal Synthesis of Beacon-Enabled ZigBee Network

    E-Print Network [OSTI]

    Kumar, Ratnesh

    Correct-by-Construction and Optimal Synthesis of Beacon-Enabled ZigBee Network S. Xu and R. Kumar-effective and correct-by- construction communication network (focusing on ZigBee wireless networks) subject to a set of latency, throughput and error-rate. For a ZigBee based wireless network (one of the popular networks), we

  12. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  13. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2013

    E-Print Network [OSTI]

    PAPER Privacy in the Internet of Things: Threats and Challenges Jan Henrik Ziegeldorf1 , Oscar Garcia, Germany 2 Philips Research, Eindhoven, Netherlands ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet

  14. FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks

    E-Print Network [OSTI]

    Fault­Tolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks (SPAWN) BETTINA WEISS communication technologies, wireless ad hoc networks are increasingly commonplace nowadays. Spontaneous (``ad wireless sensor networks and disaster area communication systems. It is also a major enabling technology

  15. WDS-Based Layer 2 Routing for Wireless Mesh Networks [Extended Abstract

    E-Print Network [OSTI]

    Chuah, Chen-Nee

    - struct flow-based MAC tables at each wireless router. For an incoming packet, the router will matchWDS-Based Layer 2 Routing for Wireless Mesh Networks [Extended Abstract] Dhruv Gupta, Jason Le-communication Networks]: Network Architecture and Design--wireless communication General Terms design

  16. Modular sensor network node

    DOE Patents [OSTI]

    Davis, Jesse Harper Zehring (Berkeley, CA); Stark, Jr., Douglas Paul (Tracy, CA); Kershaw, Christopher Patrick (Hayward, CA); Kyker, Ronald Dean (Livermore, CA)

    2008-06-10

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  17. Office of Communication - Speakers' Bureau

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Communication Office of Communication home | Office of Communication staff | speakers' bureau | available materials | links | talk to Fermilab Speakers' Bureau The Office...

  18. Social area networks: data networking of the people, by the people, for the people

    E-Print Network [OSTI]

    Aharony, Nadav

    In this position paper we explore a holistic approach for the integration of social and human-level concepts with all layers of the communication network. This integration is bidirectional - the social information can help ...

  19. The Impact of Doppler Spreading on Delay Performance over Multi-hop Wireless Communications

    E-Print Network [OSTI]

    Haddadi, Hamed

    , such as larger transmission range, more frequency efficiency, flexible organizing and power saving, networks promising technologies to provide high data rate transmission through wireless link in multi-hop networks communications are very promising technologies for next generation network to provide high data rate transmission

  20. Optimize Storage Placement in Sensor Networks

    E-Print Network [OSTI]

    Li, Qun

    of limited storage, communication capacity, and battery power is ameliorated. Placing storage nodesOptimize Storage Placement in Sensor Networks Bo Sheng, Member, IEEE, Qun Li, Member, IEEE, and Weizhen Mao Abstract--Data storage has become an important issue in sensor networks as a large amount