National Library of Energy BETA

Sample records for network scada communications

  1. Hallmark Project Commercialization of the Secure SCADA Communications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA ...

  2. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication

  3. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  4. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol, a cryptographic security solution for device-to-device communication | Department of Energy Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy

  5. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in

  6. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years, ...

  7. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  8. Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks

    Office of Energy Efficiency and Renewable Energy (EERE)

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both...

  9. SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... How to Partner Small Business Vouchers Pilot at ... Before SCADA, "you had to send people around the plants to ... operational systems in hydroelectric dams; water treatment ...

  10. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  11. Hallmark Cryptographic Serial Communication | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A cryptographic card and link module integrating the Secure SCADA Communications Protocol ... Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a ...

  12. "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vol 7 No 8 | Department of Energy "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications,

  13. Hierarchical EMS/SCADA system, Magyar Villamos Muevek Ttroeszt, Hungarian Electricity Board, feasibility study report. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1991-10-01

    The report concludes a feasibility and requirements study for the Hungarian Eectricity Board (MVMT) to upgrade MVMT's nationwide, hierarchical Energy Management System/Supervisory Control and Data Acquisition (EMS/SCADA) system. The study has resulted in a time-phased implementation plan for the recommended cost-effective solutions, with the associated project schedules and budgetary cost estimates. Specific recommendations are presented for the following closely related implementation projects: The upgrading of an existing EMS in the National Dispatch Center (NDC) including the associated remote facilities at major substations and power plants; The modernization or replacement of the existing SCADA systems and/or implementation of new systems at the regional electric power companies; and The expansion and upgrading of the data communication network that will be required to connect and support the nationwide EMS/SCADA facilities.

  14. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to make decisions as well as human support to maintain the information system. In other words, they were expensive. At the same time, SCADA systems were not as expensive as...

  15. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  16. Social Network and Communications Institutional Change Principle |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Network and Communications Institutional Change Principle Social Network and Communications Institutional Change Principle Federal agencies can use social networks and communications to spark and reinforce behavior change for meeting sustainability goals. This principle is based on research findings showing that people and institutions often are strongly influenced by the behaviors and expectations of others. Methods The social network and communications behavior change

  17. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W.

    2011-12-20

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The processing circuitry is configured to execute computer programming code. Storage media is coupled to the processing circuitry and includes computer programming code configured to cause the processing circuitry to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  18. Communication devices for network-hopping communications and methods of network-hopping communications

    DOE Patents [OSTI]

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  19. National SCADA Test Bed

    Broader source: Energy.gov [DOE]

    The National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems.

  20. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  1. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  2. Intelligent devices simplify remote SCADA installations in substations

    SciTech Connect (OSTI)

    Kopriva, V.J.

    1994-12-31

    Utilities are increasingly relying on Supervisory Control and Data Acquisition (SCADA) Systems for the effective and economical management of electric transmission and distribution systems. Now, advances in equipment and design technologies have created opportunities for an increased level of monitoring and control at electric power substations. In the past, prohibitive factors, including complicated equipment and wiring retrofits, protocol compatibility, and hardware installation and maintenance costs have impeded electric utilities in their attempt at broad based application of SCADA systems in electric substations, particularly at distribution voltage levels. These advances in equipment technologies have provided utilities with the opportunity to install and operate SCADA systems at lower cost, while providing flexibility for system expansion over longer periods. The development of intelligent microprocessor controlled devices and integrated communications has facilitated the use of a distributed design approach to installing SCADA monitoring and control in substations. This approach offers greater hardware flexibility and reduced installation costs while increasing reliability, making the addition of monitoring and control to electric substations increasingly practical. This paper will examine current trends in the application of intelligent microprocessor controlled and electronic devices, in stand alone and distributed applications, and the simplification of techniques for installing SCADA systems in substations. It will also consider the potential advantages to be realized in cost and reliability, and examine the necessary changes in design and operation philosophies required to effectively implement the new technology.

  3. Production Facility SCADA Design Report

    SciTech Connect (OSTI)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.; Woloshun, Keith Albert; Wheat, Robert Mitchell Jr.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  4. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  5. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, D.B.

    1994-07-19

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

  6. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, Dario B.

    1994-01-01

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

  7. Nano Communication Networks Update | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nano Communication Networks Update Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) Nano Communication Networks Update Steve Bush 2011.12.09 Hi everybody, In my last blog I talked about some of the work I have been doing pertaining to advanced communications for the Smart Grid. However, I wanted to post a blog updating

  8. Social Network and Communications Institutional Change Principle

    Office of Energy Efficiency and Renewable Energy (EERE)

    Federal agencies can use social networks and communications to spark and reinforce behavior change for meeting sustainability goals. This principle is based on research findings showing that people and institutions often are strongly influenced by the behaviors and expectations of others.

  9. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  10. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  11. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  12. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation ...

  13. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation Evaluation Report You ...

  14. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  15. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  16. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  17. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  18. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  19. Review of Supervisory Control and Data Acquisition (SCADA) Systems...

    Office of Scientific and Technical Information (OSTI)

    Review of Supervisory Control and Data Acquisition (SCADA) Systems Citation Details In-Document Search Title: Review of Supervisory Control and Data Acquisition (SCADA) Systems ...

  20. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Energy Savers [EERE]

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 ...

  1. Position estimation of transceivers in communication networks

    DOE Patents [OSTI]

    Kent, Claudia A.; Dowla, Farid

    2008-06-03

    This invention provides a system and method using wireless communication interfaces coupled with statistical processing of time-of-flight data to locate by position estimation unknown wireless receivers. Such an invention can be applied in sensor network applications, such as environmental monitoring of water in the soil or chemicals in the air where the position of the network nodes is deemed critical. Moreover, the present invention can be arranged to operate in areas where a Global Positioning System (GPS) is not available, such as inside buildings, caves, and tunnels.

  2. Framework for SCADA Security Policy (October 2005)

    Office of Energy Efficiency and Renewable Energy (EERE)

    Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate...

  3. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... HomeStationary PowerSafety, Security & Resilience of Energy InfrastructureGrid ... (SCADA) Test Bed is a DOE Office of Electricity Delivery and Energy Reliability (OE) ...

  4. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  5. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  6. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  7. Gas Main Sensor and Communications Network System

    SciTech Connect (OSTI)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  8. Cooperative UAV-Based Communications Backbone for Sensor Networks

    SciTech Connect (OSTI)

    Roberts, R S

    2001-10-07

    The objective of this project is to investigate the use of unmanned air vehicles (UAVs) as mobile, adaptive communications backbones for ground-based sensor networks. In this type of network, the UAVs provide communication connectivity to sensors that cannot communicate with each other because of terrain, distance, or other geographical constraints. In these situations, UAVs provide a vertical communication path for the sensors, thereby mitigating geographic obstacles often imposed on networks. With the proper use of UAVs, connectivity to a widely disbursed sensor network in rugged terrain is readily achieved. Our investigation has focused on networks where multiple cooperating UAVs are used to form a network backbone. The advantage of using multiple UAVs to form the network backbone is parallelization of sensor connectivity. Many widely spaced or isolated sensors can be connected to the network at once using this approach. In these networks, the UAVs logically partition the sensor network into sub-networks (subnets), with one UAV assigned per subnet. Partitioning the network into subnets allows the UAVs to service sensors in parallel thereby decreasing the sensor-to-network connectivity. A UAV services sensors in its subnet by flying a route (path) through the subnet, uplinking data collected by the sensors, and forwarding the data to a ground station. An additional advantage of using multiple UAVs in the network is that they provide redundancy in the communications backbone, so that the failure of a single UAV does not necessarily imply the loss of the network.

  9. National SCADA Test Bed | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource ... In December 2012, the lab successfully demonstrated QKD on the University of Illinois test ...

  10. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric...

  11. Intermediate SCADA Security Training Course Slides (September 2006) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Intermediate SCADA Security Training Course Slides (September 2006) Intermediate SCADA Security Training Course Slides (September 2006) Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to discover and identify system vulnerabilities (CIP-005 R3.2, CIP-005 R4, & CIP-007 R8); develop mitigation strategies for resolving these issues

  12. Prediction methods for communication analysis on HPC networks...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prediction methods for communication analysis on HPC networks Event Sponsor: Mathematics and Computing Science Seminar Start Date: Nov 3 2015 - 10:00am BuildingRoom: Building 240...

  13. Social Network and Communications Institutional Change Principle...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    internal or external media channels, such as websites, blogs, newsletters, and emails. ... U.S. Department of Transportation: Internal communications included emails, electronic ...

  14. NBP RFI: Communications Requirements- Comments of Great River...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The IP network transports data information for SCADA, mobile radio voice traffic, metering information, corporate data and voice traffic between office sites, protection operations ...

  15. Signaling communication events in a computer network

    DOE Patents [OSTI]

    Bender, Carl A.; DiNicola, Paul D.; Gildea, Kevin J.; Govindaraju, Rama K.; Kim, Chulho; Mirza, Jamshed H.; Shah, Gautam H.; Nieplocha, Jaroslaw

    2000-01-01

    A method, apparatus and program product for detecting a communication event in a distributed parallel data processing system in which a message is sent from an origin to a target. A low-level application programming interface (LAPI) is provided which has an operation for associating a counter with a communication event to be detected. The LAPI increments the counter upon the occurrence of the communication event. The number in the counter is monitored, and when the number increases, the event is detected. A completion counter in the origin is associated with the completion of a message being sent from the origin to the target. When the message is completed, LAPI increments the completion counter such that monitoring the completion counter detects the completion of the message. The completion counter may be used to insure that a first message has been sent from the origin to the target and completed before a second message is sent.

  16. U.S. DOE/OE National SCADA Test Bed Supports | Department of...

    Energy Savers [EERE]

    U.S. DOEOE National SCADA Test Bed Supports U.S. DOEOE National SCADA Test Bed Supports To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) ...

  17. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  18. Network Communication as a Service-Oriented Capability

    SciTech Connect (OSTI)

    Johnston, William; Johnston, William; Metzger, Joe; Collins, Michael; Burrescia, Joseph; Dart, Eli; Gagliardi, Jim; Guok, Chin; Oberman, Kevin; O'Conner, Mike

    2008-01-08

    In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as"services" -- they can be allocated and used with service guarantees that allows them to be integrated into systems that perform complex tasks. Network communication is currently not a service -- it is provided, in general, as a"best effort" capability with no guarantees and only statistical predictability. In order for Grids (and most types of systems with widely distributed components) to be successful in performing the sustained, complex tasks of large-scale science -- e.g., the multi-disciplinary simulation of next generation climate modeling and management and analysis of the petabytes of data that will come from the next generation of scientific instrument (which is very soon for the LHC at CERN) -- networks must provide communication capability that is service-oriented: That is it must be configurable, schedulable, predictable, and reliable. In order to accomplish this, the research and education network community is undertaking a strategy that involves changes in network architecture to support multiple classes of service; development and deployment of service-oriented communication services, and; monitoring and reporting in a form that is directly useful to the application-oriented system so that it may adapt to communications failures. In this paper we describe ESnet's approach to each of these -- an approach that is part of an international community effort to have intra-distributed system communication be based on a service-oriented capability.

  19. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Energy Savers [EERE]

    Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have ...

  20. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  1. Microsoft Word - Utilities Form Consortium to Fund SCADA Testing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory ...

  2. Visualizing Wind Farm Wake Losses using SCADA Data

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Reliability Enhancement for Wind Visualizing Wind Farm Wake Losses using SCADA ... the Department of Energy's Continuous Reliability Enhancement for Wind (CREW) project. ...

  3. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  4. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supervisory Control and Data Acquisition (SCADA) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste

  5. National SCADA Test Bed Fact Sheet

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in

  6. Multiply-agile encryption in high speed communication networks

    SciTech Connect (OSTI)

    Pierson, L.G.; Witzke, E.L.

    1997-05-01

    Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networks, can satisfy a wide variety of security requirements if that hardware is key-agile, robustness-agile and algorithm-agile. Hence, multiply-agile encryption provides enhanced solutions to the secrecy, interoperability and quality of service issues in high-speed networks. This paper defines these three types of agile encryption. Next, implementation issues are discussed. While single-algorithm, key-agile encryptors exist, robustness-agile and algorithm-agile encryptors are still research topics.

  7. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied,

  8. Apparatus and method for data communication in an energy distribution network

    DOE Patents [OSTI]

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  9. STEPS TO ESTABLISH A REAL-TIME TRANSMISSION MONITORING SYSTEM...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Remote sites connected to the SCADA system are especially vulnerable because they are often unmanned. SCADA network owners could take steps to ensure that any communication links ...

  10. Increasing capacity of baseband digital data communication networks

    DOE Patents [OSTI]

    Frankel, R.S.; Herman, A.

    This invention provides broadbank network capabilities for baseband digital collision detection transceiver equipment for communication between a plurality of data stations by affording simultaneous transmission of multiple channels over a broadband pass transmission link such as a coaxial cable. Thus, a fundamental carrier wave is transmitted on said link, received at local data stations and used to detect signals on different baseband channels for reception. For transmission the carrier wave typically is used for segregating a plurality of at least two transmission channels into typically single sideband upper and lower pass bands of baseband bandwidth capability adequately separated with guard bands to permit simple separation for receiving by means of pass band filters, etc.

  11. Increasing capacity of baseband digital data communication networks

    DOE Patents [OSTI]

    Frankel, Robert S.; Herman, Alexander

    1985-01-01

    This invention provides broadband network capabilities for baseband digital collision detection transceiver equipment for communication between a plurality of data stations by affording simultaneous transmission of multiple channels over a broadband pass transmission link such as a coaxial cable. Thus, a fundamental carrier wave is transmitted on said link, received at local data stations and used to detect signals on different baseband channels for reception. For transmission the carrier wave typically is used for segregating a plurality of at least two transmission channels into typically single sideband upper and lower pass bands of baseband bandwidth capability adequately separated with guard bands to permit simple separation for receiving by means of pass band filters, etc.

  12. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  13. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  14. Determining a bisection bandwidth for a multi-node data communications network

    DOE Patents [OSTI]

    Faraj, Ahmad A.

    2010-01-26

    Methods, systems, and products are disclosed for determining a bisection bandwidth for a multi-node data communications network that include: partitioning nodes in the network into a first sub-network and a second sub-network in dependence upon a topology of the network; sending, by each node in the first sub-network to a destination node in the second sub-network, a first message having a predetermined message size; receiving, by each node in the first sub-network from a source node in the second sub-network, a second message; measuring, by each node in the first sub-network, the elapsed communications time between the sending of the first message and the receiving of the second message; selecting the longest elapsed communications time; and calculating the bisection bandwidth for the network in dependence upon the number of the nodes in the first sub-network, the predetermined message size of the first test message, and the longest elapsed communications time.

  15. Line-plane broadcasting in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  16. Line-plane broadcasting in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  17. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    sector (September 2009) | Department of Energy SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA)

  18. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure,

  19. Radar network communication through sensing of frequency hopping

    DOE Patents [OSTI]

    Dowla, Farid; Nekoogar, Faranak

    2013-05-28

    In one embodiment, a radar communication system includes a plurality of radars having a communication range and being capable of operating at a sensing frequency and a reporting frequency, wherein the reporting frequency is different than the sensing frequency, each radar is adapted for operating at the sensing frequency until an event is detected, each radar in the plurality of radars has an identification/location frequency for reporting information different from the sensing frequency, a first radar of the radars which senses the event sends a reporting frequency corresponding to its identification/location frequency when the event is detected, and all other radars in the plurality of radars switch their reporting frequencies to match the reporting frequency of the first radar upon detecting the reporting frequency switch of a radar within the communication range. In another embodiment, a method is presented for communicating information in a radar system.

  20. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOE/OE NSTB program's research and development (R&D) of advance security tools and to heighten awareness among energy sector partners of the more than 30 NSTB projects underway in FY2009. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan (260.95 KB) More Documents & Publications National SCADA Test

  1. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    SciTech Connect (OSTI)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a new Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.

  2. DNS as a Covert Channel Within Protected Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DNS as a Covert Channel Within Protected Networks DNS as a Covert Channel Within Protected Networks This whitepaper discusses ways to detect DNS exfiltration attempts based on current known methods, and provides recommendations for mitigation of this exposure. DNS as a Covert Channel Within Protected Networks (994.64 KB) More Documents & Publications ProActive DNS Blacklisting Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Introduction SCADA Security for

  3. Response Time Test for The Application of the Data Communication Network to Nuclear Power Plant

    SciTech Connect (OSTI)

    Shin, Y.C.; Lee, J.Y.; Park, H.Y.; Seong, S.H.; Chung, H.Y.

    2002-07-01

    This paper discusses the response time test for the application of the Data Communication Network (DCN) to Nuclear Power Plant (NPP). Conventional Instrumentation and Control (I and C) Systems using the analog technology in NPP have raised many problems regarding the lack of spare parts, maintenance burden, inaccuracy, etc.. In order to solve the problems, the Korean Next Generation Reactor (KNGR) I and C system has adopted the digital technology and new design features of using the data communication networks. It is essential to prove the response time requirements that arise from the introduction of digital I and C technology and data communication networks to nuclear power plant design. For the response time test, a high reliable data communication network structure has been developed to meet the requirements of redundancy, diversity, and segmentation. This paper presents the results of network load analysis and response time test for the KNGR DCN prototype. The test has been focused on the response time from the field components to the gateway because the response times from the gateway to the specific systems are similar to those of the existing design. It is verified that the response time requirements are met through the prototype test for KNGR I and C systems. (authors)

  4. Communication: Separable potential energy surfaces from multiplicative artificial neural networks

    SciTech Connect (OSTI)

    Koch, Werner, E-mail: wkoch@thethirdrock.net; Zhang, Dong H. [State Key Laboratory of Molecular Reaction Dynamics and Center for Theoretical Computational Chemistry, Dalian Institute of Chemical Physics, Chinese Academy of Sciences, 457 Zhongshan Road, Dalian (China)

    2014-07-14

    We present a potential energy surface fitting scheme based on multiplicative artificial neural networks. It has the sum of products form required for efficient computation of the dynamics of multidimensional quantum systems with the multi configuration time dependent Hartree method. Moreover, it results in analytic potential energy matrix elements when combined with quantum dynamics methods using Gaussian basis functions, eliminating the need for a local harmonic approximation. Scaling behavior with respect to the complexity of the potential as well as the requested accuracy is discussed.

  5. Locating hardware faults in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  6. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  7. On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lin, Yunyue; Wu, Qishi; Cai, Xiaoshan; Du, Xiaojiang; Kwon, Ki-Hyeon

    2010-01-01

    Data transmission from sensor nodes to a base station or a sink node often incurs significant energy consumption, which critically affects network lifetime. We generalize and solve the problem of deploying multiple base stations to maximize network lifetime in terms of two different metrics under one-hop and multihop communication models. In the one-hop communication model, the sensors far away from base stations always deplete their energy much faster than others. We propose an optimal solution and a heuristic approach based on the minimal enclosing circle algorithm to deploy a base station at the geometric center of each cluster. In themore » multihop communication model, both base station location and data routing mechanism need to be considered in maximizing network lifetime. We propose an iterative algorithm based on rigorous mathematical derivations and use linear programming to compute the optimal routing paths for data transmission. Simulation results show the distinguished performance of the proposed deployment algorithms in maximizing network lifetime.« less

  8. ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security evaluation of the "baseline" or "as delivered" system performed in the Idaho National Engineering and Environmental Laboratory (INEEL) SCADA test bed as part of the Critical Infrastructure Test Range Development Program, which is funded by the U.S. Department of Energy; Office of

  9. FNCS: A Framework for Power System and Communication Networks Co-Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Fuller, Jason C.; Fisher, Andrew R.; Marinovici, Laurentiu D.; Agarwal, Khushbu

    2014-04-13

    This paper describes the Fenix framework that uses a federated approach for integrating power grid and communication network simulators. Compared existing approaches, Fenix al- lows co-simulation of both transmission and distribution level power grid simulators with the communication network sim- ulator. To reduce the performance overhead of time synchro- nization, Fenix utilizes optimistic synchronization strategies that make speculative decisions about when the simulators are going to exchange messages. GridLAB-D (a distribution simulator), PowerFlow (a transmission simulator), and ns-3 (a telecommunication simulator) are integrated with the frame- work and are used to illustrate the enhanced performance pro- vided by speculative multi-threading on a smart grid applica- tion. Our speculative multi-threading approach achieved on average 20% improvement over the existing synchronization methods

  10. Synchronization Algorithms for Co-Simulation of Power Grid and Communication Networks

    SciTech Connect (OSTI)

    Ciraci, Selim; Daily, Jeffrey A.; Agarwal, Khushbu; Fuller, Jason C.; Marinovici, Laurentiu D.; Fisher, Andrew R.

    2014-09-11

    The ongoing modernization of power grids consists of integrating them with communication networks in order to achieve robust and resilient control of grid operations. To understand the operation of the new smart grid, one approach is to use simulation software. Unfortunately, current power grid simulators at best utilize inadequate approximations to simulate communication networks, if at all. Cooperative simulation of specialized power grid and communication network simulators promises to more accurately reproduce the interactions of real smart grid deployments. However, co-simulation is a challenging problem. A co-simulation must manage the exchange of informa- tion, including the synchronization of simulator clocks, between all simulators while maintaining adequate computational perfor- mance. This paper describes two new conservative algorithms for reducing the overhead of time synchronization, namely Active Set Conservative and Reactive Conservative. We provide a detailed analysis of their performance characteristics with respect to the current state of the art including both conservative and optimistic synchronization algorithms. In addition, we provide guidelines for selecting the appropriate synchronization algorithm based on the requirements of the co-simulation. The newly proposed algorithms are shown to achieve as much as 14% and 63% im- provement, respectively, over the existing conservative algorithm.

  11. Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure

    SciTech Connect (OSTI)

    ZAKRAJSEK, M.F.

    2000-10-17

    The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

  12. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  13. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  14. Communication and Energy Efficiency in Visual Sensor Networks for People Localization

    SciTech Connect (OSTI)

    Karakaya, Mahmut; Qi, Hairong

    2012-01-01

    This paper addresses the communication and energy efficiency in collaborative visual sensor networks (VSNs) for people localization, a challenging computer vision problem of its own. We focus on the design of a light-weight and energy efficient solution where people are localized based on distributed camera nodes integrating the so-called certainty map generated at each node, that records the target non-existence information within the camera s field of view. We first present a dynamic itinerary for certainty map integration where not only each sensor node transmits a very limited amount of data but that a limited number of camera nodes is involved. Then, we perform a comprehensive analytical study to evaluate communication and energy efficiency between different integration schemes, i.e., centralized and distributed integration. Based on results obtained from analytical study and real experiments, the distributed method shows effectiveness in detection accuracy as well as energy and bandwidth efficiency.

  15. Advanced Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration Presentation for BETO 2015 Project Peer Review

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration 2/26/2015 Biochemical Platform Review Jim Collett Pacific Northwest National Laboratory This presentation does not contain any proprietary, confidential, or otherwise restricted information Goal Statement * The Challenge: Hydrocarbon biofuel production will require advanced supervisory control and data acquisition (SCADA) systems for bioconversion of highly variable biomass feedstocks with high levels of

  16. Inter substation data communications

    SciTech Connect (OSTI)

    Lukas, M.R.

    1996-10-01

    The paper briefly describes the scada system operated by ComEd for substation communications. This system has proven a reliable means for monitor and control of the generation, transmission, and distribution system. An attempt to automate stand-alone substation functions into the RTU has had limited success. An automated substation capacitor control algorithm was incorporated into a PC. The PC directly interfaced with the RTU through the serial port for analog monitoring and control of the capacitor banks. There were no further enhancements or development of other control algorithms with the PC. The paper discusses the power system data evolution, the proposed design improvements, and implementation concerns.

  17. Deadlock-free class routes for collective communications embedded in a multi-dimensional torus network

    SciTech Connect (OSTI)

    Chen, Dong; Eisley, Noel A.; Steinmacher-Burow, Burkhard; Heidelberger, Philip

    2013-01-29

    A computer implemented method and a system for routing data packets in a multi-dimensional computer network. The method comprises routing a data packet among nodes along one dimension towards a root node, each node having input and output communication links, said root node not having any outgoing uplinks, and determining at each node if the data packet has reached a predefined coordinate for the dimension or an edge of the subrectangle for the dimension, and if the data packet has reached the predefined coordinate for the dimension or the edge of the subrectangle for the dimension, determining if the data packet has reached the root node, and if the data packet has not reached the root node, routing the data packet among nodes along another dimension towards the root node.

  18. Minimally buffered data transfers between nodes in a data communications network

    DOE Patents [OSTI]

    Miller, Douglas R.

    2015-06-23

    Methods, apparatus, and products for minimally buffered data transfers between nodes in a data communications network are disclosed that include: receiving, by a messaging module on an origin node, a storage identifier, a origin data type, and a target data type, the storage identifier specifying application storage containing data, the origin data type describing a data subset contained in the origin application storage, the target data type describing an arrangement of the data subset in application storage on a target node; creating, by the messaging module, origin metadata describing the origin data type; selecting, by the messaging module from the origin application storage in dependence upon the origin metadata and the storage identifier, the data subset; and transmitting, by the messaging module to the target node, the selected data subset for storing in the target application storage in dependence upon the target data type without temporarily buffering the data subset.

  19. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  20. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    SciTech Connect (OSTI)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell; Woloshun, Keith Albert; Dale, Gregory E.

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  1. Good practice guide on firewall deployment for SCADA and process...

    Broader source: Energy.gov (indexed) [DOE]

    ... More specifically, if the PCN is assigned the private subnet 192.168.1.xxx and the Internet network expects the device to use the corporate assigned addresses in the range ...

  2. An integrated solution for secure group communication in wide-area networks

    SciTech Connect (OSTI)

    Agarwal, Deborah A.; Chevassut, Olivier; Thompson, Mary; Tsudik, Gene

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  3. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  4. E-print Network Web Log News: Research Communications for Scientists...

    Office of Scientific and Technical Information (OSTI)

    Description This Web Log provides the latest information about changes to E-print Network ... questions, concerns and other input by using the Contact Us page. Web Log Archive

  5. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  6. Microsoft Word - Johnston.IOS.Network Communication as a Service-Oriented Capability.5.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communication as a Service-Oriented Capability William JOHNSTON, Joe METZGER, Mike O'CONNOR, Michael COLLINS, Joseph BURRESCIA, Eli DART, Jim GAGLIARDI, Chin GUOK, and Kevin OBERMAN ESnet, Lawrence Berkeley National Laboratory Abstract. In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as "services" - they can be allocated and used with service guarantees that allows them to be integrated into systems

  7. Providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.

    2012-10-23

    Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.

  8. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

    2013-04-16

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  9. SDI (Strategic Defense Initiative) Battle Management/C3 (Command, Control, and Communications) networking technology program plan. Final report, January 1987-October 1988

    SciTech Connect (OSTI)

    Botta, R.; Noll, S.

    1988-12-01

    The Institute for Defense Analyses (IDA) has collected and analyzed information on network technology that is relevant to Battle Management Command, Control, and Communications (BM/C3). This memorandum report represents a program plan that will provide the SDIO BM C3 directorate with administrative and technical insight into network technology. This program plan focuses on C3 network concepts and provides information and analysis to the SDIO to be used in formulating budget requirements for FY 1988 and beyond. Based upon analysis of network requirements and ongoing programs, recommendations have been made for research areas that should be funded, including both the continuation of current work and the initiation of new tasks. While emphasis here is on the SDIO-funded tasks, other relevant government-sponsored and commercial efforts, such as packet radio networks, also have been examined.

  10. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  11. communications | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Improving Emergency Communications Functionality at Lower Cost NNSA's Emergency Communications Network (ECN) provides the capability to exchange real-time voice, data, and video ...

  12. New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Standards | Department of Energy No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in

  13. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Testbeds - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  14. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  15. Advanced Network Toolkit for Assessments and Remote Mapping ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Standards National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) DOEOE National SCADA Test Bed Fiscal Year 2009 Work ...

  16. News Release: Advanced Network Toolkit for Assessments and Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    under the Department of Energy's National SCADA Test Bed Program, Sandia National .... ---... The National SCADA Test Bed (NSTB) is a multi-laboratory ...

  17. Emergency Communications | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Emergency Communications Emergency Communications Network logo NNSA's Emergency Communications Network (ECN) provides managers at NNSA with the capability to exchange real-time voice, data, and video information for managing emergency situations that involve NNSA assets and interests. The Emergency Communications Network is a multi-faceted communications network providing classified and unclassified voice, video, and data communications between NNSA headquarters and approximately 55

  18. Advanced Network Toolkit for Assessments

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Access the software at http:antfarm.rubyforge.org. National SCADA Test Bed Sandia is a ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  19. Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ESnet About ESnet Our Mission The Network ESnet History Governance & Policies Career Opportunities ESnet Staff & Org Chart Contact Us Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net About ESnet A Platform for Science Discovery The Energy Sciences Network (ESnet) is a high-performance, unclassified network built to

  20. Airborne wireless communication systems, airborne communication methods, and communication methods

    SciTech Connect (OSTI)

    Deaton, Juan D.; Schmitt, Michael J.; Jones, Warren F.

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  1. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  2. Damselfly Network Simulator

    Energy Science and Technology Software Center (OSTI)

    2014-04-01

    Damselfly is a model-based parallel network simulator. It can simulate communication patterns of High Performance Computing applications on different network topologies. It outputs steady-state network traffic for a communication pattern, which can help in studying network congestion and its impact on performance.

  3. System restoration of a transmission network

    SciTech Connect (OSTI)

    Ebert, A.; Eppel, M.; Genthe, S.; Schwarzjirg, H.; Stark, J.; Werner, W. [Bayernwerke AG, Karlsfeld (Germany); [Siemens AG, Wien (Austria)

    1995-12-31

    In a large SCADA/EMS-System an Expertsystem for Fault Diagnosis and for System Restoration is integrated. The System Restoration covered by the Expertsystem gives assistance to the operator in any kind of blackout by presenting restoration plans. In case any number of busbars is outaged the system automatically determines the affected network areas and thereby the magnitude of the whole blackout. The restoration of the network is done in phases depending on the kind of blackout and is based on a global utility-strategy-plan. Within this scheme the detailed restoration plan is determined dynamically based on the actual situation and some predefinitions such as load priorities and power plants to be reenergized with priority. The described system covers all cases of blackouts by evaluating a plan based on the individual case. The Expertsystem is a hybrid system using an optimal power flow, too, and is fully integrated in the SCADA/EMS system. The plans of each phase are presented via the common MMI to the operator and supervised due to execution. The system distinguishes between operator wanted deviations and unwanted deviations during execution. Thus the operator at any time can continue as he likes.

  4. Reconfigureable network node

    DOE Patents [OSTI]

    Vanderveen, Keith B.; Talbot, Edward B.; Mayer, Laurence E.

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  5. Implementing the National Broadband Plan by Studying the Communication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This RFI also seeks to collect information about electricity infrastructure's current and projected communications requirements, as well as the types of networks and communications ...

  6. Loan Performance Data and Communication | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance Data and Communication Loan Performance Data and Communication Better Buildings Residential Network Financing and Revenue Peer Exchange Call: Loan Performance Data and ...

  7. Re: NBP RFI: Communications Requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "Smart Grids" and commercial wireless networks can readily satisfy the communications ... applications; (2) commercial wireless networks" ubiquity, security and reliability ...

  8. Host Event Based Network Monitoring

    SciTech Connect (OSTI)

    Jonathan Chugg

    2013-01-01

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  9. Emergency Communications | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    communications network providing classified and unclassified voice, video, and data ... The Mobile ECN is capable of classified and unclassified data, voice, and video; wide-band ...

  10. Protocol for communications in potentially noisy environments

    DOE Patents [OSTI]

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  11. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KB) CEDS 2010 Peer Review - Right-Sized SCADA Communications - Loren Toole & Andy ... - Visualization and Modeling DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan

  12. Calorimetry Network Program

    Energy Science and Technology Software Center (OSTI)

    1998-01-30

    This is a Windows NT based program to run the SRTC designed calorimeters. The network version can communicate near real time data and final data values over the network. This version, due to network specifics, can function in a stand-alone operation also.

  13. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  14. emergency communications

    National Nuclear Security Administration (NNSA)

    0%2A en Emergency Communications http:nnsa.energy.govaboutusourprogramsemergencyoperationscounterterrorismemergencycommunications

  15. Scholarly Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communication Scholarly Communication Scholarly Communication is a broad term referring to the research process in which researchers share and disseminate their research findings, through publication, so they are available to the wider scholarly community and beyond. Key issues in scholarly communication include trends in publishing models, open access, public access, copyright and author rights, data management and infrastructure. Questions? 505-667-5809 Email Current issues in Scholarly

  16. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  17. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear

  18. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  19. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and...

  20. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  1. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  2. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  3. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  4. National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  5. MFC Communications Infrastructure Study

    SciTech Connect (OSTI)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  6. Report: Communications

    Office of Environmental Management (EM)

    The EMAB Communications Team comprising Ms. Jennifer Salisbury, Ms. Lorraine Anderson, Mr. A. James Barnes, and Mr. Tom Winston, has continued to monitor EM's...

  7. Departmental Communications

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1978-09-26

    The order establishes standards on eliminating gender-specific terminology from all DOE communications. Canceled by DOE O 1321.139.

  8. Final Project Report: DOE Award FG02-04ER25606 Overlay Transit Networking for Scalable, High Performance Data Communication across Heterogeneous Infrastructure

    SciTech Connect (OSTI)

    Beck, Micah; Moore, Terry

    2007-08-31

    As the flood of data associated with leading edge computational science continues to escalate, the challenge of supporting the distributed collaborations that are now characteristic of it becomes increasingly daunting. The chief obstacles to progress on this front lie less in the synchronous elements of collaboration, which have been reasonably well addressed by new global high performance networks, than in the asynchronous elements, where appropriate shared storage infrastructure seems to be lacking. The recent report from the Department of Energy on the emerging 'data management challenge' captures the multidimensional nature of this problem succinctly: Data inevitably needs to be buffered, for periods ranging from seconds to weeks, in order to be controlled as it moves through the distributed and collaborative research process. To meet the diverse and changing set of application needs that different research communities have, large amounts of non-archival storage are required for transitory buffering, and it needs to be widely dispersed, easily available, and configured to maximize flexibility of use. In today's grid fabric, however, massive storage is mostly concentrated in data centers, available only to those with user accounts and membership in the appropriate virtual organizations, allocated as if its usage were non-transitory, and encapsulated behind legacy interfaces that inhibit the flexibility of use and scheduling. This situation severely restricts the ability of application communities to access and schedule usable storage where and when they need to in order to make their workflow more productive. (p.69f) One possible strategy to deal with this problem lies in creating a storage infrastructure that can be universally shared because it provides only the most generic of asynchronous services. Different user communities then define higher level services as necessary to meet their needs. One model of such a service is a Storage Network, analogous to

  9. Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Maps Engineering Services The Network Network Maps Network Traffic Volume Historical Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet...

  10. Sentient networks

    SciTech Connect (OSTI)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  11. RE: NBP RFI: Communications Requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tropos Networks is pleased to submit the following commentary and information to the DOE regarding the communication requirements of utilities for Smart Grid applications based on ...

  12. DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy Silver Spring Networks comments on DOE NBP RFI: Comms Requirements

  13. Communications Team

    Office of Energy Efficiency and Renewable Energy (EERE)

    Company: The Hannon GroupJamie Nolan is the communications team lead for the SunShot Initiative, managing a robust portfolio that includes strategic message development, media relations, social...

  14. Universal Common Communication Substrate (UCCS) Specification; Universal Common Communication Substrate (UCCS) Implementation

    Energy Science and Technology Software Center (OSTI)

    2014-08-22

    Universal Common Communication Substrate (UCCS) is a low-level communication substrate that exposes high-performance communication primitives, while providing network interoperability. It is intended to support multiple upper layer protocol (ULPs) or programming models including SHMEM,UPC,Titanium,Co-Array Fortran,Global Arrays,MPI,GASNet, and File I/O. it provides various communication operations including one-sided and two-sided point-to-point, collectives, and remote atomic operations. In addition to operations for ULPs, it provides an out-of-band communication channel required typically required to wire-up communication libraries.

  15. Communicating Hydrogen: Matching Message with Media

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communicating Hydrogen: Matching Message with Media Henry Gentenaar, The Media Network Christy Cooper, DOE Hydrogen Program State/Regional Hydrogen and Fuel Cell Initiatives Networking Meeting NHA Annual Hydrogen Conference March 19, 2007 * San Antonio, TX 1 Making the Hydrogen Message "Stick" * We are a communications-based society - Constant stream of information/constant contact * "Supersaturated" - more info than we can process * Information is nothing if it doesn't

  16. Sandia National Laboratories: Sandia Enabled Communications and

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Authentification Network using Quantum Key Distribution (SECANT QKD) Research Laboratory Directed Research Facebook Twitter YouTube Flickr RSS Top SECANT SECANT Leadership Invited Talks, Publications & Patents News & Events Research SECANT QKD Sandia Enabled Communications and Authentication Network using Quantum Key Distribution (SECANT QKD) is a Grand Challenge in Quantum Communication. This program aims to construct chip-scale, handheld quantum transceivers that can implement DV,

  17. Class network routing

    DOE Patents [OSTI]

    Bhanot, Gyan; Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  18. Organizations and Networks | Open Energy Information

    Open Energy Info (EERE)

    Network (CLEAN) CLEAN aims to improve communication and coordination by bringing together national and international organizations that are assisting developing countries with...

  19. Magnetostatic communication

    DOE Patents [OSTI]

    Daily, William D.

    2008-02-26

    A system for providing communication of information by modulating a magnetostatic field with a magnetostatic transmitter that modulates said magnetostatic field to contain the information and detecting the information in the modulated field at a distance with a magnetostatic detector that detects the modulated magnetic field containing the information.

  20. Flexible network wireless transceiver and flexible network telemetry transceiver

    DOE Patents [OSTI]

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  1. Loan Performance Data and Communication | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance Data and Communication Loan Performance Data and Communication Better Buildings Residential Network Financing and Revenue Peer Exchange Call: Loan Performance Data and Communication, Call Slides and Discussion Summary, May 23, 2013. Call Slides and Discussion Summary (508.8 KB) More Documents & Publications PowerSaver Loan Program EcoHouse Program Overview Loan Programs for Low- and Moderate-Income Households

  2. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, Dario B.

    1996-01-01

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  3. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, D.B.

    1996-12-31

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor to a plurality of slave processors to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor`s status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer, a digital signal processor, a parallel transfer controller, and two three-port memory devices. A communication switch within each node connects it to a fast parallel hardware channel through which all high density data arrives or leaves the node. 6 figs.

  4. Brief Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    112001 (6pp) doi:10.1088/0741-3335/53/11/112001 BRIEF COMMUNICATION Electron temperature fluctuations during sawtooth events in a reversed-field pinch C P Kasten 1 , D J Den Hartog 1,2 , H D Stephens 1,2,3 , C C Hegna 1 and J A Reusch 1 1 Department of Physics, University of Wisconsin-Madison, Madison, WI, USA 2 Center for Magnetic Self Organization in Laboratory and Astrophysical Plasmas, University of Wisconsin-Madison, Madison, WI 53706, USA E-mail: cale.kasten@gmail.com and djdenhar@wisc.edu

  5. Acoustic system for communication in pipelines

    DOE Patents [OSTI]

    Martin, II, Louis Peter; Cooper, John F.

    2008-09-09

    A system for communication in a pipe, or pipeline, or network of pipes containing a fluid. The system includes an encoding and transmitting sub-system connected to the pipe, or pipeline, or network of pipes that transmits a signal in the frequency range of 3-100 kHz into the pipe, or pipeline, or network of pipes containing a fluid, and a receiver and processor sub-system connected to the pipe, or pipeline, or network of pipes containing a fluid that receives said signal and uses said signal for a desired application.

  6. Transparent communications permit unmanned operations

    SciTech Connect (OSTI)

    1995-07-01

    Not-normally-manned platforms are not a new development. However, their use in harsher environments has until recently, been limited. Development of reliable communications networks capable of handling the large amounts of data required for process control in real time with distributed control systems (DCSs) has been a key factor in making the concept viable for harsher, more remote environments. The article below examines the transparent communications network and DCS installed on Pickerill field, offshore UK, by Fisher-Rosemount Systems and its operational parameters. Pickerill field, some 50 mi off the Lincolnshire coast, comprises two small unmanned platforms producing gas under remote control from Arco`s operations base at Great Yarmouth about 60 mi south. Reliable communication is required both with the two platforms offshore and with Conoco`s gas processing operators at Theddlethorpe. Fundamental to project success was the ability of the process control system to provide entirely secure and transparent communication with equipment offshore and thus enable operators at Great Yarmouth to interact with the process as if it were local to their control center.

  7. Handheld portable real-time tracking and communications device

    SciTech Connect (OSTI)

    Wiseman, James M.; Riblett, Jr., Loren E.; Green, Karl L.; Hunter, John A.; Cook, III, Robert N.; Stevens, James R.

    2012-05-22

    Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

  8. Detection and response to unauthorized access to a communication device

    DOE Patents [OSTI]

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  9. Network Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistics Network Activity Network Activity PDSF Network Uplinks to NERSC (dual 10 Gbps) NERSC Uplink to ESnet Last edited: 2011-03-31 22:20:59...

  10. Re: NBP RFI: Communications Requirements- Comments of AT&T Inc...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    inform federal Smart Grid policy by participating in DOE"s examination of the communications requirements of electric utilities deploying Smart Grid capabilities in their networks. ...

  11. Buildings-to-Grid Technical Opportunities: From the Information and Communications Technology Perspective

    SciTech Connect (OSTI)

    Kuruganti, Teja; Brabmley, Michael

    2014-03-28

    Information and communications technology (ICT) has enabled the integration of computer and audio-visual networks, leading to unprecedented exchange of data between various users and entities.

  12. tee0074.pdf

    Office of Environmental Management (EM)

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 21 Steps 1. Identify all connections to SCADA networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Disconnect unnecessary

  13. Comments of Hughes Network Systems, LLC and Inmarsat Inc. | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hughes and Inmarsat are global leaders in providing satellite networks and services and satellite services, respectively. Hughes and Inmarsat, both global satellite communications ...

  14. ALS Communications Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Communications Group Print From left: Ashley White, Lori Tamura, Keri Troutman, and Carina Braun. The ALS Communications staff maintain the ALS Web site; write and edit all...

  15. Global interrupt and barrier networks

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E; Heidelberger, Philip; Kopcsay, Gerard V.; Steinmacher-Burow, Burkhard D.; Takken, Todd E.

    2008-10-28

    A system and method for generating global asynchronous signals in a computing structure. Particularly, a global interrupt and barrier network is implemented that implements logic for generating global interrupt and barrier signals for controlling global asynchronous operations performed by processing elements at selected processing nodes of a computing structure in accordance with a processing algorithm; and includes the physical interconnecting of the processing nodes for communicating the global interrupt and barrier signals to the elements via low-latency paths. The global asynchronous signals respectively initiate interrupt and barrier operations at the processing nodes at times selected for optimizing performance of the processing algorithms. In one embodiment, the global interrupt and barrier network is implemented in a scalable, massively parallel supercomputing device structure comprising a plurality of processing nodes interconnected by multiple independent networks, with each node including one or more processing elements for performing computation or communication activity as required when performing parallel algorithm operations. One multiple independent network includes a global tree network for enabling high-speed global tree communications among global tree network nodes or sub-trees thereof. The global interrupt and barrier network may operate in parallel with the global tree network for providing global asynchronous sideband signals.

  16. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  17. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Acceptable use policy Account and password policy Configuration management Security ... Accounts and Passwords The account and password policy will describe proper care of ...

  18. Comments of Dakota Electric Association | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dakota Electric Association Comments of Dakota Electric Association DEA has deployed a fully integrated IP network to 26 substation sites. An IP based network transports data information for Supervisory Control and Data Acquisition (SCADA) and Load Management systems. A private Wide Area Network (WAN) was implemented by DEA in 2001 due to lack of comprehensive coverage by major carriers. In addition to the WAN, DEA relies on commercial services to communicate with load management receivers via

  19. Communication Consultant Contract

    Broader source: Energy.gov [DOE]

    Communication Consultant Contract, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  20. Communications Consultant RFP

    Broader source: Energy.gov [DOE]

    Communications Consultant RFP, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  1. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    DOE Patents [OSTI]

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  2. Communicating Hydrogen: Matching Message with Media | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communicating Hydrogen: Matching Message with Media Communicating Hydrogen: Matching Message with Media This presentation by DOE's Christy Cooper was given at the State/Regional Hydrogen and Fuel Cell Initiatives Networking Meeting in March 2007. h2_communications_media.pdf (250.63 KB) More Documents & Publications Documnet for Hydrogen State and Regional Workshop, March 30, 2008, Sacramento, CA Public Relations for Energy Sustainability Microsoft Word - What's New in IE8 v3

  3. Anomaly Detection in Dynamic Networks

    SciTech Connect (OSTI)

    Turcotte, Melissa

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the

  4. On Building Inexpensive Network Capabilities

    SciTech Connect (OSTI)

    Shue, Craig A; Kalafut, Prof. Andrew; Allman, Mark; Taylor, Curtis R

    2011-01-01

    There are many deployed approaches for blocking unwanted traffic, either once it reaches the recipient's network, or closer to its point of origin. One of these schemes is based on the notion of traffic carrying capabilities that grant access to a network and/or end host. However, leveraging capabilities results in added complexity and additional steps in the communication process: Before communication starts a remote host must be vetted and given a capability to use in the subsequent communication. In this paper, we propose a lightweight mechanism that turns the answers provided by DNS name resolution---which Internet communication broadly depends on anyway---into capabilities. While not achieving an ideal capability system, we show the mechanism can be built from commodity technology and is therefore a pragmatic way to gain some of the key benefits of capabilities without requiring new infrastructure.

  5. Optimized data communications in a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A

    2014-10-21

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  6. Optimized data communications in a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.

    2014-08-19

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  7. Advanced mobile networking, sensing, and controls.

    SciTech Connect (OSTI)

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  8. Modular sensor network node

    DOE Patents [OSTI]

    Davis, Jesse Harper Zehring; Stark, Jr., Douglas Paul; Kershaw, Christopher Patrick; Kyker, Ronald Dean

    2008-06-10

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  9. Implementing controlled-unitary operations over the butterfly network

    SciTech Connect (OSTI)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2014-12-04

    We introduce a multiparty quantum computation task over a network in a situation where the capacities of both the quantum and classical communication channels of the network are limited and a bottleneck occurs. Using a resource setting introduced by Hayashi [1], we present an efficient protocol for performing controlled-unitary operations between two input nodes and two output nodes over the butterfly network, one of the most fundamental networks exhibiting the bottleneck problem. This result opens the possibility of developing a theory of quantum network coding for multiparty quantum computation, whereas the conventional network coding only treats multiparty quantum communication.

  10. High-speed, intra-system networks

    SciTech Connect (OSTI)

    Quinn, Heather M; Graham, Paul S; Manuzzato, Andrea; Fairbanks, Tom; Dallmann, Nicholas; Desgeorges, Rose

    2010-06-28

    Recently, engineers have been studying on-payload networks for fast communication paths. Using intra-system networks as a means to connect devices together allows for a flexible payload design that does not rely on dedicated communication paths between devices. In this manner, the data flow architecture of the system can be dynamically reconfigured to allow data routes to be optimized for the application or configured to route around devices that are temporarily or permanently unavailable. To use intra-system networks, devices will need network controllers and switches. These devices are likely to be affected by single-event effects, which could affect data communication. In this paper we will present radiation data and performance analysis for using a Broadcom network controller in a neutron environment.

  11. The Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Engineering Services The Network Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net The Network A Nationwide Platform for Science Discovery The

  12. BGE Communications Requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BGE Communications Requirements BGE Communications Requirements Chart of BGE Communications Requirements PDF icon BGE Communications Requirements More Documents & Publications ...

  13. Robotic Intelligence Kernel: Communications

    Energy Science and Technology Software Center (OSTI)

    2009-09-16

    The INL Robotic Intelligence Kernel-Comms is the communication server that transmits information between one or more robots using the RIK and one or more user interfaces. It supports event handling and multiple hardware communication protocols.

  14. CRAD, Communications Assessment Plan

    Broader source: Energy.gov [DOE]

    Lines of authority are clearly defined with clear and open communications existing between all departments and all levels.

  15. Communications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Communications SI Communications graphic.png To effectively inform grid operations with high-level integration of solar, visibility is required across multiple spatial scales (from the end-user load through the distribution substation and beyond) and at multiple time scales (from microseconds to hours and days). Advances in information, communications, and sensor technologies are needed to adequately monitor the behavior and manage the impact of the solar technologies integrating

  16. Communications systems and methods for subsea processors

    DOE Patents [OSTI]

    Gutierrez, Jose; Pereira, Luis

    2016-04-26

    A subsea processor may be located near the seabed of a drilling site and used to coordinate operations of underwater drilling components. The subsea processor may be enclosed in a single interchangeable unit that fits a receptor on an underwater drilling component, such as a blow-out preventer (BOP). The subsea processor may issue commands to control the BOP and receive measurements from sensors located throughout the BOP. A shared communications bus may interconnect the subsea processor and underwater components and the subsea processor and a surface or onshore network. The shared communications bus may be operated according to a time division multiple access (TDMA) scheme.

  17. Network Upgrade for the SLC: PEP II Network

    SciTech Connect (OSTI)

    Crane, M.; Call, M.; Clark, S.; Coffman, F.; Himel, T.; Lahey, T.; Miller, E.; Sass, R.; /SLAC

    2011-09-09

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status information is included.

  18. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  19. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Coteus, Paul W.; Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2011-08-16

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

  20. Fusion Communication Summit cover

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMUNICATIONS SUMMIT for U.S. Magnetic Fusion September 12-13, 2012 Princeton University - Frist Campus Center Princeton, New Jersey, USA Mission Statement Announcements...

  1. Notifications and Communications

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume provides a description of appropriate notifications and communications during an emergency. Canceled by DOE G 151.1-4.

  2. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    SciTech Connect (OSTI)

    Zarkesh-Ha, Payman

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  3. RE: NBP RFI Reply Comments: Communications Requirements | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy RE: NBP RFI Reply Comments: Communications Requirements RE: NBP RFI Reply Comments: Communications Requirements The National Rural Electric Cooperative Association and American Public Power Association file these brief reply comments in support of the comments and reply comments filed by the Utilities Telecom Council ("UTC"). Both organizations strongly believe that the Administration should ensure that adequate spectrum is available for internal, utility networks.

  4. Administrative Records Schedule: Communication Records | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Administrative Records Schedule: Communication Records Administrative Records Schedule: Communication Records The principal records documenting communication function PDF icon ...

  5. Coherent soliton communication lines

    SciTech Connect (OSTI)

    Yushko, O. V. Redyuk, A. A.; Fedoruk, M. P.; Turitsyn, S. K.

    2014-11-15

    The data transmission in coherent fiber-optical communication lines using solitons with a variable phase is studied. It is shown that nonlinear coherent structures (solitons) can be applied for effective signal transmission over a long distance using amplitude and optical-phase keying of information. The optimum ratio of the pulse width to the bit slot at which the spectral efficiency (transmitted bits per second and hertz) is maximal is determined. It is shown that soliton fiber-optical communication lines can ensure data transmission at a higher spectral efficiency as compared to traditional communication lines and at a high signal-to-noise ratio.

  6. Roadmap for Testing and Validation of Electric Vehicle Communication Standards

    SciTech Connect (OSTI)

    Pratt, Richard M.; Tuffner, Francis K.; Gowri, Krishnan

    2012-07-12

    Vehicle to grid communication standards are critical to the charge management and interoperability among plug-in electric vehicles (PEVs), charging stations and utility providers. The Society of Automobile Engineers (SAE), International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and the ZigBee Alliance are developing requirements for communication messages and protocols. While interoperability standards development has been in progress for more than two years, no definitive guidelines are available for the automobile manufacturers, charging station manufacturers or utility backhaul network systems. At present, there is a wide range of proprietary communication options developed and supported in the industry. Recent work by the Electric Power Research Institute (EPRI), in collaboration with SAE and automobile manufacturers, has identified performance requirements and developed a test plan based on possible communication pathways using power line communication (PLC). Though the communication pathways and power line communication technology options are identified, much work needs to be done in developing application software and testing of communication modules before these can be deployed in production vehicles. This paper presents a roadmap and results from testing power line communication modules developed to meet the requirements of SAE J2847/1 standard.

  7. Future Communications Needs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Future Communications Needs Future Communications Needs Chart of Oncor Electric Delivery's Future Communications Needs PDF icon Future Communications Needs More Documents & ...

  8. Communications Records | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PDF icon ADM 120.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 12: COMMUNICATIONS RECORDS ADM 12 PDF Administrative Records Schedule: Communication Records

  9. communications requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Utilities to Inform Federal Smart Grid Policy Re: NBP RFI: Communications Requirements NBP RFI: Communications Requirements- Comments of Lake Region Electric Cooperative- Minnesota

  10. Report: EM Communications

    Office of Environmental Management (EM)

    EMAB and specifically asked for the Board's input with regard to tools (e.g., plain language) and strategies that will allow EM to be proactive in its communications, and...

  11. ALS Communications Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communications Group Print From left: Ashley White, Lori Tamura, and Keri Troutman. The ALS Communications staff maintain the ALS Web site; write and edit all print and electronic publications for the ALS, including Science Highlights, Science Briefs, brochures, handouts, and the monthly newsletter ALSNews; and create educational and scientific outreach materials. In addition, members of the group organize bi-monthly Science Cafés, create conference and workshop Web sites and publicity, and

  12. Portable Instrumented Communication Library

    Energy Science and Technology Software Center (OSTI)

    1993-06-10

    PICL is a subroutine library that can be used to develop parallel programs that are portable across several distributed-memory multiprocessors. PICL provides a portable syntax for key communication primitives and related system calls. It also provides portable routines to perform certain widely-used, high-level communication operations, such as global broadcast and global summation. PICL provides execution tracing that can be used to monitor performance or to aid in debugging.

  13. ALS Communications Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communications Group Print From left: Ashley White, Lori Tamura, and Keri Troutman. The ALS Communications staff maintain the ALS Web site; write and edit all print and electronic publications for the ALS, including Science Highlights, Science Briefs, brochures, handouts, and the monthly newsletter ALSNews; and create educational and scientific outreach materials. In addition, members of the group organize bi-monthly Science Cafés, create conference and workshop Web sites and publicity, and

  14. Nothing But Networking for Residential Network Members

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Peer Exchange Call: Nothing But Networking for Residential Network Members, Call Slides and Discussion Summary, March 12, 2015.

  15. ORISE: Health Communication and Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Oak Ridge Institute for Science Education Health Communication, Marketing and Training Health communication, marketing and training services are provided through ORAU, the managing contractor of DOE's Oak Ridge Institute for Science and Education. ORAU blends communication, marketing, and technical training skills with public health, preparedness, epidemiology and environmental health, and cutting edge technology to develop communication programs that inform the public and equip health

  16. Buildings-to-Grid Technical Opportunities: From the Information and Communications Technology Perspective

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    From the Information and Communications Technology Perspective Teja Kuruganti, Oak Ridge National Laboratory Michael Brambley, Pacific Northwest National Laboratory Information and communications technology (ICT) has enabled the integration of computer and audio-visual networks, leading to unprecedented exchange of data between various users and entities. By providing the infrastructure to coordinate millions of distributed assets within and across buildings, including variable loads,

  17. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect (OSTI)

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  18. A connecting network with fault tolerance capabilities

    SciTech Connect (OSTI)

    Ciminiera, L.; Serra, A.

    1986-06-01

    A new multistage interconnection network is presented in this paper. It is able to handle the communications between the connected devices correctly, even in the presence of fault(s) in the network. This goal is achieved by using redundant paths with a fast procedure able to dynamically reroute the message. It is also shown that the rerouting properties are still valid when broadcasting transmission is used.

  19. Downhole drilling network using burst modulation techniques

    DOE Patents [OSTI]

    Hall; David R. , Fox; Joe

    2007-04-03

    A downhole drilling system is disclosed in one aspect of the present invention as including a drill string and a transmission line integrated into the drill string. Multiple network nodes are installed at selected intervals along the drill string and are adapted to communicate with one another through the transmission line. In order to efficiently allocate the available bandwidth, the network nodes are configured to use any of numerous burst modulation techniques to transmit data.

  20. Chart of communications requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Chart of communications requirements Chart of communications requirements Chart of communications requirements for BGE Chart of communications requirements (109.11 KB) More Documents & Publications BGE Communications Requirements Lower Colorado River Authority Lower Colorado River Authority

  1. DOE Vendor Communications Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vendor Communications Plan DOE Vendor Communications Plan Vendor Communication Plan.pdf (172.98 KB) More Documents & Publications DOE Vendor Communication Plan Improving Communication with Industry during the Acquisition Process MEMORANDUM FOR CHIEF ACQUISITION OFFICERS

  2. Global-Address Space Networking (GASNet) Library

    Energy Science and Technology Software Center (OSTI)

    2011-04-06

    GASNet (Global-Address Space Networking) is a language-independent, low-level networking layer that provides network-independent, high-performance communication primitives tailored for implementing parallel global address space SPMD languages such as UPC and Titanium. The interface is primarily intended as a compilation target and for use by runtime library writers (as opposed to end users), and the primary goals are high performance, interface portability, and expressiveness. GASNet is designed specifically to support high-performance, portable implementations of global address spacemore » languages on modern high-end communication networks. The interface provides the flexibility and extensibility required to express a wide variety of communication patterns without sacrificing performance by imposing large computational overheads in the interface. The design of the GASNet interface is partitioned into two layers to maximize porting ease without sacrificing performance: the lower level is a narrow but very general interface called the GASNet core API - the design is basedheavily on Active Messages, and is implemented directly on top of each individual network architecture. The upper level is a wider and more expressive interface called GASNet extended API, which provides high-level operations such as remote memory access and various collective operations. This release implements GASNet over MPI, the Quadrics "elan" API, the Myrinet "GM" API and the "LAPI" interface to the IBM SP switch. A template is provided for adding support for additional network interfaces.« less

  3. DMA engine for repeating communication patterns

    DOE Patents [OSTI]

    Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-09-21

    A parallel computer system is constructed as a network of interconnected compute nodes to operate a global message-passing application for performing communications across the network. Each of the compute nodes includes one or more individual processors with memories which run local instances of the global message-passing application operating at each compute node to carry out local processing operations independent of processing operations carried out at other compute nodes. Each compute node also includes a DMA engine constructed to interact with the application via Injection FIFO Metadata describing multiple Injection FIFOs where each Injection FIFO may containing an arbitrary number of message descriptors in order to process messages with a fixed processing overhead irrespective of the number of message descriptors included in the Injection FIFO.

  4. To: Exparte Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    mmarkweiss@aol.com [mailto:mmarkweiss@aol.com] Sent: Tuesday, March 24, 2015 11:12 PM To: Exparte Communications Subject: Memorandum of MHARR Meeting with DOE Officials on March 16, 2015 March 24, 2015 Office of General Counsel U.S. Department of Energy 1000 Independence Avenue, S.W. Washington, D.C. 20585 Memorandum for the record Ex-Parte Communication U.S. Department of Energy Meeting - Tuesday, March 16, 2015, 2:30-3:00 P.M. The purpose of this meeting was to provide additional information

  5. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  6. Sophia

    Energy Science and Technology Software Center (OSTI)

    2013-01-10

    Sophia is a passive, real time tool for interdevice communication discovery and monitoring of the active elements in a Supervisory Control and Data Acquisition (SCADA) system.

  7. City of Quincy, FL Smart Grid Project | Open Energy Information

    Open Energy Info (EERE)

    (SCADA) and load control systems to Quincy's distribution system, and 3) adding demand response programs to all customer classes including programmable communicating...

  8. Communications 101 | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engagement Communication & Engagement Intergovernmental Programs Intergovernmental Programs The Office of Environmental Management supports, by means of grants and cooperative agreements, a number of institutionalized activities and relationships with various national intergovernmental organizations. Read more Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) The mission of the Environmental Management Advisory Board is to provide independent and

  9. Ultra-wideband radar sensors and networks

    DOE Patents [OSTI]

    Leach, Jr., Richard R; Nekoogar, Faranak; Haugen, Peter C

    2013-08-06

    Ultra wideband radar motion sensors strategically placed in an area of interest communicate with a wireless ad hoc network to provide remote area surveillance. Swept range impulse radar and a heart and respiration monitor combined with the motion sensor further improves discrimination.

  10. Portable control device for networked mobile robots

    DOE Patents [OSTI]

    Feddema, John T.; Byrne, Raymond H.; Bryan, Jon R.; Harrington, John J.; Gladwell, T. Scott

    2002-01-01

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  11. Network Fault Tolerance in Open MPI

    SciTech Connect (OSTI)

    Shipman, Galen; Graham, Richard L; Bosilca, George

    2007-01-01

    High Performance Computing (HPC) systems are rapidly growing in size and complexity. As a result, transient and persistent network failures can occur on the time scale of application run times, reducing the productive utilization of these systems. The ubiquitous network protocol used to deal with such failures is TCP/IP, however, available implementations of this protocol provide unacceptable performance for HPC system users, and do not provide the high bandwidth, low latency communications of modern interconnects. This paper describes methods used to provide protection against several network errors such as dropped packets, corrupt packets, and loss of network interfaces while maintaining high-performance communications. Micro-benchmark experiments using vendor supplied TCP/IP and O/S bypass low-level communications stacks over InfiniBand and Myrinet are used to demonstrate the high-performance characteristics of our protocol. The NAS Parallel Benchmarks are used to demonstrate the scalability and the minimal performance impact of this protocol. The micro-benchmarks show that providing higher data reliability decrease performance by up to 30% relative to unprotected communications, but provide performance improvements of a factor of four over TCP/IP running over InfiniBand DDR. The NAS Parallel Benchmarks show virtually no impact of the data reliability protocol on overall run-time.

  12. Distributed downhole drilling network

    DOE Patents [OSTI]

    Hall, David R.; Hall, Jr., H. Tracy; Fox, Joe; Pixton, David S.

    2006-11-21

    A high-speed downhole network providing real-time data from downhole components of a drilling strings includes a bottom-hole node interfacing to a bottom-hole assembly located proximate the bottom end of a drill string. A top-hole node is connected proximate the top end of the drill string. One or several intermediate nodes are located along the drill string between the bottom-hole node and the top-hole node. The intermediate nodes are configured to receive and transmit data packets transmitted between the bottom-hole node and the top-hole node. A communications link, integrated into the drill string, is used to operably connect the bottom-hole node, the intermediate nodes, and the top-hole node. In selected embodiments, a personal or other computer may be connected to the top-hole node, to analyze data received from the intermediate and bottom-hole nodes.

  13. CAT Communicator | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    News Archives CAT Communicator CAT Communicator was a newsletter intended to provide APS information to CAT members. 1994 (Volume 5) Number 2 1995 (Volume 6) Number 1 Number 2...

  14. Major Communications Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Major Communications Reports Major Communications Reports May 18, 2012 Green Button Data: More Power to You May 28, 2009 Major Communications Report May 28, 2009 May 7, 2009 Major Communications Report May 7, 2009 May 5, 2009 Major Communications Report May 5, 2009 April 30, 2009 Major Communications Report April 30, 2009 April 28, 2009 Major Communications Report April 28, 2009 April 17, 2009 Major Communications Report April 17, 2009 March 24, 2009 Major Communications Report March 24, 2009

  15. ESnet - the energy sciences network strategic plan

    SciTech Connect (OSTI)

    1996-12-01

    The goal of the Energy Sciences Network (ESnet) Program is to provide a highly capable and reliable communications infrastructure that supports the Department of Energy`s (DOE) missions and enables DOE researchers to tap the power of leading-edge information technologies. ESnet provides an essential infrastructure that enhances national competitiveness and accelerates the development of future generations of high-performance, distributed computing systems and networks. These computing systems and networks are vital to modern scientific research. In addition, they enable development of new approaches to energy management, environmental restoration and waste management, national security, industrial processing, and health care, and also facilitate public access to government information. Extensive networks developed by the DOE`s high-energy physics and fusion energy research communities were the forerunners of the ESnet. These networks initially provided improved access to high-energy accelerator sites and to the Magnetic Fusion Energy Supercomputer Center, which opened at Lawrence Livermore National Laboratory in 1974.

  16. Marketing and Communications Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Plan Marketing and Communications Plan This is a document from Energy ... PDF icon Marketing and Communications Plan More Documents & Publications Sonoma County ...

  17. Hazard Communication Training - Upcoming Implementation Date...

    Energy Savers [EERE]

    Hazard Communication Training - Upcoming Implementation Date for New Hazard Communication Standard Hazard Communication Training - 10 CFR 851, Worker Safety and Health Program, ...

  18. TEC Communications Topic Group

    Office of Environmental Management (EM)

    Tribal Issues Topic Group Judith Holm, Chair April 21, 2004 Albuquerque, NM Tribal Issues Topic Group * February Tribal Summit with Secretary of Energy (Kristen Ellis, CI) - Held in conjunction with NCAI mid-year conference - First Summit held in response to DOE Indian Policy - Addressed barriers to communication and developing framework for interaction Tribal Issues Topic Group * Summit (continued) - Federal Register Notice published in March soliciting input on how to improve summit process

  19. Involvement and Communication Committee.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public Involvement and Communication Committee Chair 1 : Liz Mattson 4 , Member Vice Chair 1 : Shannon Cram, Member Committee Members 2 : Shelley Cimon Paige Knight Alissa Cordner Liz Mattson Shannon Cram Ken Niles Rob Davis Ed Pacheco Tom Galioto Dan Serres Floyd Hodges Jean Vanni Unofficial Committee Members or Other Interested Parties 3 : Earl Fordham Gerry Pollet Susan Leckband 4 Steve Hudson 4 Facilitator: Cathy McCague 4 Agency & Technical Support: Kris Holmes 4 DOE-RL Randy Bradbury 4

  20. Network Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Acceptable Use Policy About ESnet Our Mission The Network ESnet History Governance & Policies ESnet Policy Board ESCC Acceptable Use Policy Data Privacy Policy Facility Data Policy Career Opportunities ESnet Staff & Org Chart Contact Us Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net ESnet Acceptable Use Policy The

  1. Biomonitoring with Wireless Communications

    SciTech Connect (OSTI)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  2. Gigabit network technology. Final technical report

    SciTech Connect (OSTI)

    Davenport, C.M.C. [ed.

    1996-10-01

    Current digital networks are evolving toward distributed multimedia with a wide variety of applications with individual data rates ranging from kb/sec to tens and hundreds of Mb/sec. Link speed requirements are pushing into the Gb/sec range and beyond the envelop of electronic networking capabilities. There is a vast amount of untapped bandwidth available in the low-attenuation communication bands of an optical fiber. The capacity in one fiber thread is enough to carry more than two thousand times as much information as all the current radio and microwave frequencies. And while fiber optics has replaced copper wire as the transmission medium of choice, the communication capacity of conventional fiber optic networks is ultimately limited by electronic processing speeds.

  3. Historical Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Maps Network Traffic Volume Historical Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Network R&D Software-Defined Networking (SDN) Experimental Network Testbeds Performance (perfSONAR) Software & Tools Development Data for Researchers Partnerships Publications Workshops Science Engagement Move your data Programs & Workshops Science

  4. Nothing But Networking for Residential Network Members | Department...

    Energy Savers [EERE]

    Nothing But Networking for Residential Network Members Nothing But Networking for Residential Network Members Better Buildings Residential Network Peer Exchange Call: Nothing But ...

  5. spread_comp_02 TOC

    Broader source: Energy.gov (indexed) [DOE]

    ... Any location that has a connection to the SCADA network is a target, especially unmanned or unguarded remote sites. Conduct a physical security survey and inventory access points ...

  6. The NIAC Convergence of Physical and Cyber Technbologies and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working...

  7. Microsoft PowerPoint - SS2_8H_NERC_SANS_Final.ppt

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Corporate ICCP Peer Utility Modem Pool I II III IV Sensor Campus Sensors 10 SANS SCADA ... Trivial File Transfer Protocol (TFTP) RFC 783 Sun Microsystems Network File System ...

  8. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Yearly Network Traffic HPSS Yearly Network Traffic Yearly Summary of IO Traffic Between Storage and Network Destinations These bar charts show the total transfer traffic for...

  9. Microsoft Word - Johnston.IOS.Network Communication as a Service...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Case Study: The Data Analysis for the Large Hadron Collider a The major high energy physics (HEP) experiments of the next twenty years will break new ground in our understanding ...

  10. Introduction to SCADA Protection and Vulnerabilities (Technical...

    Office of Scientific and Technical Information (OSTI)

    large electric utility still owns power generation facilities, power transmission and ... of the system occurs at the nodes of the grid, the generation facilities, and substations. ...