Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Modeling Networked Telemetry

View through CrossRef
This paper presents the modeling of the networks supporting today’s telemetry. The incorporation of networking features has significantly enhanced the capability and performance of modern telemetry systems. The development of Integrated Network-Enhanced Telemetry protocols and the use of networked telemetry applications has introduced a host of potential cybersecurity risks inherent in modern networking. This paper will investigate how telemetry applications are uniquely structured with wide-, local-, and micro-area networks that represent modern telemetry solutions. The development of these models and the traffic on these networks will enable analysis into the unique threats and vulnerabilities of telemetry networks. The core of this paper is the notion that telemetry networks are unique, and modeling these networks is key to the current work. The core premise of this paper is also that telemetry networks look and function like Supervisory Command and Data Acquisition (SCADA) networks. By digging deeply into both of these structures, we have shown here that SCADA architectures can be adapted to telemetry networks. This approach opens the door to a wealth of analysis, strategies, and solutions for telemetry networks that are well developed in the SCADA realm.
Title: Modeling Networked Telemetry
Description:
This paper presents the modeling of the networks supporting today’s telemetry.
The incorporation of networking features has significantly enhanced the capability and performance of modern telemetry systems.
The development of Integrated Network-Enhanced Telemetry protocols and the use of networked telemetry applications has introduced a host of potential cybersecurity risks inherent in modern networking.
This paper will investigate how telemetry applications are uniquely structured with wide-, local-, and micro-area networks that represent modern telemetry solutions.
The development of these models and the traffic on these networks will enable analysis into the unique threats and vulnerabilities of telemetry networks.
The core of this paper is the notion that telemetry networks are unique, and modeling these networks is key to the current work.
The core premise of this paper is also that telemetry networks look and function like Supervisory Command and Data Acquisition (SCADA) networks.
By digging deeply into both of these structures, we have shown here that SCADA architectures can be adapted to telemetry networks.
This approach opens the door to a wealth of analysis, strategies, and solutions for telemetry networks that are well developed in the SCADA realm.

Related Results

Abstract 173: Simple Guidance Improves Appropriate Telemetry Utilization
Abstract 173: Simple Guidance Improves Appropriate Telemetry Utilization
Introduction: Cardiac telemetry is an in-hospital monitoring tool intended for ischemia surveillance, monitor QT-interval prolongation, and detect arrhythmias. It is a ...
Emotions and Networked Learning
Emotions and Networked Learning
Emotions in networked learning have been underresearched despite their importance. The present research is one of the first few attempts to better understand adult learners’ emotio...
Postcolonial Entry Points into Networked Learning
Postcolonial Entry Points into Networked Learning
It would be overly simplistic to assume that these collaborative pedagogical approaches function uniformly across diverse student cohorts. Postcolonial theory can provide a framewo...
Persistent Unmanned Surface Vehicles for Subsea Support
Persistent Unmanned Surface Vehicles for Subsea Support
Abstract This paper discusses the role of unmanned systems in subsea support. Recent developments in mobile unmanned vehicle networks are reviewed, demonstrating ...
Organizing Networked Learning
Organizing Networked Learning
A networked context is dynamic. In this paper, I set up the organization of learning in a networked context starting from four leads. The first lead is analyzing involvement and ac...
Telemetry Drill Pipe: Enabling Technology for the Downhole Internet
Telemetry Drill Pipe: Enabling Technology for the Downhole Internet
Abstract Drill pipe capable of transmitting high-bandwidth data from downhole sensors and surface control signals back to those sensors has been developed and succes...
Review of research methodologies for tigers: Telemetry
Review of research methodologies for tigers: Telemetry
AbstractOver the past half century, wildlife research has relied on technological advances to gain additional insight into the secretive lives of animals. This revolution started i...
Experience and networked learning
Experience and networked learning
This paper reviews the way experience has been understood and the research agendas associated with that understanding in networked learning. In the contemporary context the student...

Back to Top