An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hosts on a
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have been proposed. In this paper, a new method for motion vectors (MVs) interpolation with the help
Efficient transceiver design in body area networks requires in-depth understanding of the propagation channel which in this case involves the human body. Several studies have been done to characterize RF propagation on the body surface and determine the
Output of the NIST Smart Grid Interoperability Panel's Priority Action Plan 2: Wireless Communication for smart Grid, working group. It contains a methodology for evaluating wireless technologies by applying smart grid user applications requirements. It
David W. Griffith, Alexandre Delye, Nada T. Golmie
Anticipated handovers that use Link Going Down (LGD) and Link Down (LD) trigger events require the network operator to set the LGD trigger high enough that the handover completes before the LD trigger event. However, setting the LGD trigger too high can
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol, NIST undertook the development of a guide to help educate federal agencies about the possible
In large-scale distributed systems, the interactions of many independent components may lead to emergent global behaviors with unforeseen, often detrimental, outcomes. The increasing importance of distributed systems such as clouds and computing grids will
Using the analogy of an existing smart car, this paper explores Power to the Edge , where the edge is commercial mobile computing. The world is poised for a 5th Cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing
Simulation models for data communications networks encompass numerous parameters that can each take on millions of values, presenting experimenters with a vast space of potential parameter combinations. To apply such simulation models experimenters face a
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data
David W. Griffith, Michael R. Souryal, Camillo A. Gentile, Nada T. Golmie
This paper introduces an IEEE 802.11 analytical model that examines uplink and downlink communications between non-saturated stations and a non-saturated access point. The model integrates channel effects and collisions into a single expression for the
Call admission control between heterogeneous networks,such as an integrated 3GPP LTE and WLAN network, plays an important role to utilize the system resources in a more efficient way. In this paper, we propose that the preference to the WLAN is determined
Alan B. Vinh, Richard A. Rouil, Antonio Izquierdo Manzanares, Alexandre Delye
There are two parts to the Project 25: Inter-RF Subsystem Interface (ISSI) model: 1) The server program that models the behavior of the ISSI protocol(s), along with the server that allows interaction with the graphical user interface application (GUI). 2)
Dhananjay Anand, Jeffrey Fletcher, Ya-Shian Li-Baboud, James Moyne
With the increasing use of Ethernet for real time control of distributed dynamic systems, and inexpensive processing power at the sensor and actuator nodes, there is a growing interest in the process control community to move towards ‘model based'
Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and safety of
Timothy Godfrey, Mullen Sara, Roger C. Dugan, Craig Rodine, David W. Griffith, Nada T. Golmie
Analysis of complex Smart Grid applications require simulation of communications networks and the power system. Analytical models of the communication systems provide a tool for examining the aggregate behavior of the system. An event level analysis in the
Michael R. Souryal, Camillo A. Gentile, David W. Griffith, David E. Cypher, Nada T. Golmie
This paper presents a methodology for assessing the suitability of various wireless technologies for meeting the communication requirements of Smart Grid applications. It describes an approach for translating application requirements to link traffic
Michael R. Souryal, Fabien A. Valoit, Hui Guo, Nader Moayeri, Nicholas W. Damiano, David P. Snyder
Signals at the lower end of the medium frequency range (300 kHz to 3000 kHz) propagate with relatively low attenuation along existing metallic infrastructure in an underground mine, such as cables, pipes and rails. Exploiting this capability, low-bandwidth
The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and to provide recommendations on using these capabilities. WiMAX technology is a wireless
A low complexity Parallel Interference Cancellation (PIC) technique that is applicable to body area networks is presented. Using Direct-Sequence Code Division Multiple Access (DS-CDMA), the technique aims at suppressing interference caused by rapid changes
The need for the development of performance requirements, metrics and test methods for evaluation of location and tracking systems is increasing as these systems begin to become commercially available for use by emergency responders. A working group was
The1IEEE 802.15.3 is an emerging technology for high data rate wireless multimedia applications in Wireless Personal Area Networks (WPAN). In this paper, a discrete event simulation model has been implemented using OPNET2 Modeler to simulate the essential
Image inpainting is a useful and powerful technique for automatically restoring or removing objects in films and damaged pictures. In the last ten years, many excellent inpainting algorithms have been proposed after Bertalmio et al. [1]. However, no paper
Camillo A. Gentile, Nada T. Golmie, Catherine A. Remley, Christopher L. Holloway, William F. Young
Conversion from analog television in the United States combined with the appeal for broadband public safety communications is generating a lot of interest in the so-called 700 MHz band between 698-806 MHz. To our knowledge, no channel propagation model for
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form