Information Notice 2007-15, Effects of Ethernet-based, Non-Safety Related Controls on the Safe and Continued Operation of Nuclear Power Stations: Difference between revisions
StriderTol (talk | contribs) (Created page by program invented by StriderTol) |
StriderTol (talk | contribs) (StriderTol Bot change) |
||
| Line 16: | Line 16: | ||
{{#Wiki_filter:UNITED STATES | {{#Wiki_filter:UNITED STATES | ||
NUCLEAR REGULATORY COMMISSION | ===NUCLEAR REGULATORY COMMISSION=== | ||
OFFICE OF NUCLEAR REACTOR REGULATION | OFFICE OF NUCLEAR REACTOR REGULATION | ||
WASHINGTON, DC 20555-0001 | WASHINGTON, DC 20555-0001 | ||
===April 17, 2007=== | |||
NRC INFORMATION NOTICE: 2007-15: | |||
EFFECTS OF ETHERNET-BASED, NON-SAFETY | |||
===RELATED CONTROLS ON THE SAFE AND=== | |||
CONTINUED OPERATION OF NUCLEAR POWER | CONTINUED OPERATION OF NUCLEAR POWER | ||
| Line 42: | Line 44: | ||
unanticipated failures of ethernet connected non-safety equipment on the safety and | unanticipated failures of ethernet connected non-safety equipment on the safety and | ||
performance capability of nuclear power stations. NRC expects that recipients will review the | performance capability of nuclear power stations. NRC expects that recipients will review the | ||
information for applicability to their facilities and consider actions, as appropriate, to avoid | information for applicability to their facilities and consider actions, as appropriate, to avoid | ||
similar problems. However, suggestions contained in this IN are not NRC requirements; | similar problems. However, suggestions contained in this IN are not NRC requirements; | ||
therefore, no specific action or written response is required. | therefore, no specific action or written response is required. | ||
| Line 52: | Line 54: | ||
On August 19, 2006, operators at Browns Ferry, Unit 3, manually scrammed the unit following a | On August 19, 2006, operators at Browns Ferry, Unit 3, manually scrammed the unit following a | ||
loss of both the 3A and 3B reactor recirculation pumps. Plant procedures following the loss of | loss of both the 3A and 3B reactor recirculation pumps. Plant procedures following the loss of | ||
recirculation flow required the manual scram. Immediate loss of the recirculation flow placed | recirculation flow required the manual scram. Immediate loss of the recirculation flow placed | ||
the plant in a high power, low flow condition where core thermal hydraulic stability problems | the plant in a high power, low flow condition where core thermal hydraulic stability problems | ||
may exist at boiling-water reactors (BWRs). Generally, intentional operation in this condition, of | may exist at boiling-water reactors (BWRs). Generally, intentional operation in this condition, of | ||
high power and low flow, is not permitted. Although some BWRs are authorized for single loop | high power and low flow, is not permitted. Although some BWRs are authorized for single loop | ||
operation, sudden loss of even one pump could present the plant with the same stability | operation, sudden loss of even one pump could present the plant with the same stability | ||
| Line 68: | Line 70: | ||
The initial investigation into the dual pump trip found that the recirculation pump variable | The initial investigation into the dual pump trip found that the recirculation pump variable | ||
frequency drive (VFD) controllers were nonresponsive. The operators cycled the control power | frequency drive (VFD) controllers were nonresponsive. The operators cycled the control power | ||
off and on, reset the controllers, and restarted the VFDs. The licensee also determined that the | off and on, reset the controllers, and restarted the VFDs. The licensee also determined that the | ||
Unit 3 condensate demineralizer controller had failed simultaneously with the Unit 3 VFD | Unit 3 condensate demineralizer controller had failed simultaneously with the Unit 3 VFD | ||
controllers. The condensate demineralizer primary controller is a dual redundant programmable | controllers. The condensate demineralizer primary controller is a dual redundant programmable | ||
logic control (PLC) system connected to the ethernet-based plant integrated computer system | logic control (PLC) system connected to the ethernet-based plant integrated computer system | ||
(ICS) network. The VFD controllers are also connected to this same plant | (ICS) network. The VFD controllers are also connected to this same plant | ||
ICS network. Both the VFD and condensate demineralizer controllers are | ICS network. Both the VFD and condensate demineralizer controllers are | ||
microprocessor-based utilizing proprietary software. | microprocessor-based utilizing proprietary software. | ||
| Line 86: | Line 88: | ||
The licensee determined that the root cause of the event was the malfunction of the VFD | The licensee determined that the root cause of the event was the malfunction of the VFD | ||
controller because of excessive traffic on the plant ICS network. Testing by site personnel | controller because of excessive traffic on the plant ICS network. Testing by site personnel | ||
performed on the VFD controllers confirmed that the VFD control system is susceptible to | performed on the VFD controllers confirmed that the VFD control system is susceptible to | ||
failures induced by excessive network traffic. The threshold levels for failure of the VFD | failures induced by excessive network traffic. The threshold levels for failure of the VFD | ||
controllers due to excessive network traffic, as determined by the on-site testing, can be | controllers due to excessive network traffic, as determined by the on-site testing, can be | ||
achieved on the existing 10-megabit/second network. The NRC staff's review of industry | achieved on the existing 10-megabit/second network. The NRC staff's review of industry | ||
literature and test reports on network device sensitivity, and the threshold levels for such | literature and test reports on network device sensitivity, and the threshold levels for such | ||
failures, confirmed these testing results. The licensee could not conclusively establish whether | failures, confirmed these testing results. The licensee could not conclusively establish whether | ||
the failure of the PLC caused the VFD controllers to become nonresponsive, or the excessive | the failure of the PLC caused the VFD controllers to become nonresponsive, or the excessive | ||
| Line 104: | Line 106: | ||
network traffic, originating from a different source, caused the PLC and the VFD controllers to | network traffic, originating from a different source, caused the PLC and the VFD controllers to | ||
fail. However, information received from the PLC vendor indicated that the PLC failure was a | fail. However, information received from the PLC vendor indicated that the PLC failure was a | ||
likely symptom of the excessive network traffic. | likely symptom of the excessive network traffic. | ||
To ensure that excessive network traffic will not cause future Unit 3 VFD controller malfunctions, the licensee disconnected these devices from the plant ICS network before restart. The | To ensure that excessive network traffic will not cause future Unit 3 VFD controller malfunctions, the licensee disconnected these devices from the plant ICS network before restart. The | ||
licensee also disconnected the Unit 2 VFD controllers from the plant ICS network. | licensee also disconnected the Unit 2 VFD controllers from the plant ICS network. | ||
| Line 118: | Line 120: | ||
(2) installing a network firewall device on each units VFD controller and condensate | (2) installing a network firewall device on each units VFD controller and condensate | ||
demineralizer controller. The Browns Ferry Unit 3 event is discussed in Licensee Event Report | demineralizer controller. The Browns Ferry Unit 3 event is discussed in Licensee Event Report | ||
05000296/2006-002, dated October 17, 2006, Agencywide Documents Access and | 05000296/2006-002, dated October 17, 2006, Agencywide Documents Access and | ||
| Line 127: | Line 129: | ||
Ethernet is one technology used for local area networking (LAN) of many different types of | Ethernet is one technology used for local area networking (LAN) of many different types of | ||
digital devices such as computers, process controls, modems and PLCs. This allows many of | digital devices such as computers, process controls, modems and PLCs. This allows many of | ||
these devices to transfer data over a common communications cable, typically coaxial cable, or | these devices to transfer data over a common communications cable, typically coaxial cable, or | ||
special grades of twisted pair wire. It is the most widely used LAN technology today. | special grades of twisted pair wire. It is the most widely used LAN technology today. | ||
A data packet is a basic unit of data in a networked environment. In basic networks, data | A data packet is a basic unit of data in a networked environment. In basic networks, data | ||
packets are broadcast, meaning sent to each network device, rather than to one specific device. | packets are broadcast, meaning sent to each network device, rather than to one specific device. | ||
| Line 153: | Line 155: | ||
A firewall is a mechanism used to control and monitor data traffic to and from a network, or | A firewall is a mechanism used to control and monitor data traffic to and from a network, or | ||
device, for the purpose of protecting devices on a network. In effect, it is a filter that blocks unwanted network traffic and limits the amount and type of communication flow. A firewall can | device, for the purpose of protecting devices on a network. In effect, it is a filter that blocks unwanted network traffic and limits the amount and type of communication flow. A firewall can | ||
act as an intrusion detection system by identifying data packets that are denied access, recognizing data packets specifically designed to cause problems, or reporting unusual | act as an intrusion detection system by identifying data packets that are denied access, recognizing data packets specifically designed to cause problems, or reporting unusual | ||
| Line 163: | Line 165: | ||
condensate demineralizer PLC, may have been a factor in causing the malfunction of the VFD | condensate demineralizer PLC, may have been a factor in causing the malfunction of the VFD | ||
controllers is that there is documentation of such failures in commercial process control. For | controllers is that there is documentation of such failures in commercial process control. For | ||
instance, a memory malfunction of one device has been shown to cause a data storm by | instance, a memory malfunction of one device has been shown to cause a data storm by | ||
| Line 169: | Line 171: | ||
continually transmitting data that disrupts normal network operations resulting in other network | continually transmitting data that disrupts normal network operations resulting in other network | ||
devices becoming locked up or nonresponsive. A network found to be operating outside of | devices becoming locked up or nonresponsive. A network found to be operating outside of | ||
normal performance parameters with a device malfunctioning can effect devices on that | normal performance parameters with a device malfunctioning can effect devices on that | ||
network, the network as a whole, or interfacing components and systems. The effects could | network, the network as a whole, or interfacing components and systems. The effects could | ||
range from a slightly degraded performance to complete failure of the component or system. | range from a slightly degraded performance to complete failure of the component or system. | ||
| Line 188: | Line 190: | ||
is important to protect both safety-related and non-safety related devices on the plant network to | is important to protect both safety-related and non-safety related devices on the plant network to | ||
ensure the safe operation of the plant. The August 19, 2006, transient unnecessarily | ensure the safe operation of the plant. The August 19, 2006, transient unnecessarily | ||
challenged the plant safety systems and placed the plant in a potentially unstable high-power, low-flow condition. The potential safety implications for future similar events would depend on | challenged the plant safety systems and placed the plant in a potentially unstable high-power, low-flow condition. The potential safety implications for future similar events would depend on | ||
the type of devices that are connected to the plant ethernet. Careful design and control of the | the type of devices that are connected to the plant ethernet. Careful design and control of the | ||
network architecture can mitigate the risks to plant networks from malfunctioning devices, and | network architecture can mitigate the risks to plant networks from malfunctioning devices, and | ||
| Line 199: | Line 201: | ||
==CONTACT== | ==CONTACT== | ||
This IN requires no specific action or written response. Please direct any questions about this | This IN requires no specific action or written response. Please direct any questions about this | ||
matter to the technical contact listed below or the appropriate Office of Nuclear Reactor | matter to the technical contact listed below or the appropriate Office of Nuclear Reactor | ||
| Line 206: | Line 208: | ||
/RA by TQuay for/ | /RA by TQuay for/ | ||
===Michael J. Case, Director=== | |||
Division of Policy and Rulemaking | Division of Policy and Rulemaking | ||
Office of Nuclear Reactor Regulation | ===Office of Nuclear Reactor Regulation=== | ||
===Technical Contact:=== | ===Technical Contact:=== | ||
===Royce D. Beacom, NRR=== | ===Royce D. Beacom, NRR=== | ||
301-415-2781 E-mail: rdb1@nrc.gov | |||
Note: NRC generic communications may be found on the NRC public Web site, http://www.nrc.gov, under Electronic Reading Room/Document Collections. unwanted network traffic and limits the amount and type of communication flow. A firewall can | Note: NRC generic communications may be found on the NRC public Web site, http://www.nrc.gov, under Electronic Reading Room/Document Collections. unwanted network traffic and limits the amount and type of communication flow. A firewall can | ||
act as an intrusion detection system by identifying data packets that are denied access, recognizing data packets specifically designed to cause problems, or reporting unusual | act as an intrusion detection system by identifying data packets that are denied access, recognizing data packets specifically designed to cause problems, or reporting unusual | ||
| Line 227: | Line 229: | ||
condensate demineralizer PLC, may have been a factor in causing the malfunction of the VFD | condensate demineralizer PLC, may have been a factor in causing the malfunction of the VFD | ||
controllers is that there is documentation of such failures in commercial process control. For | controllers is that there is documentation of such failures in commercial process control. For | ||
instance, a memory malfunction of one device has been shown to cause a data storm by | instance, a memory malfunction of one device has been shown to cause a data storm by | ||
| Line 233: | Line 235: | ||
continually transmitting data that disrupts normal network operations resulting in other network | continually transmitting data that disrupts normal network operations resulting in other network | ||
devices becoming locked up or nonresponsive. A network found to be operating outside of | devices becoming locked up or nonresponsive. A network found to be operating outside of | ||
normal performance parameters with a device malfunctioning can effect devices on that | normal performance parameters with a device malfunctioning can effect devices on that | ||
network, the network as a whole, or interfacing components and systems. The effects could | network, the network as a whole, or interfacing components and systems. The effects could | ||
range from a slightly degraded performance to complete failure of the component or system. | range from a slightly degraded performance to complete failure of the component or system. | ||
| Line 252: | Line 254: | ||
is important to protect both safety-related and non-safety related devices on the plant network to | is important to protect both safety-related and non-safety related devices on the plant network to | ||
ensure the safe operation of the plant. The August 19, 2006, transient unnecessarily | ensure the safe operation of the plant. The August 19, 2006, transient unnecessarily | ||
challenged the plant safety systems and placed the plant in a potentially unstable high-power, low-flow condition. The potential safety implications for future similar events would depend on | challenged the plant safety systems and placed the plant in a potentially unstable high-power, low-flow condition. The potential safety implications for future similar events would depend on | ||
the type of devices that are connected to the plant ethernet. Careful design and control of the | the type of devices that are connected to the plant ethernet. Careful design and control of the | ||
network architecture can mitigate the risks to plant networks from malfunctioning devices, and | network architecture can mitigate the risks to plant networks from malfunctioning devices, and | ||
| Line 263: | Line 265: | ||
==CONTACT== | ==CONTACT== | ||
This IN requires no specific action or written response. Please direct any questions about this | This IN requires no specific action or written response. Please direct any questions about this | ||
matter to the technical contact listed below or the appropriate Office of Nuclear Reactor | matter to the technical contact listed below or the appropriate Office of Nuclear Reactor | ||
| Line 270: | Line 272: | ||
/RA by TQuay for/ | /RA by TQuay for/ | ||
===Michael J. Case, Director=== | |||
Division of Policy and Rulemaking | Division of Policy and Rulemaking | ||
Office of Nuclear Reactor Regulation | ===Office of Nuclear Reactor Regulation=== | ||
===Technical Contact:=== | ===Technical Contact:=== | ||
===Royce D. Beacom, NRR=== | ===Royce D. Beacom, NRR=== | ||
301-415-2781 E-mail: rdb1@nrc.gov | |||
Note: NRC generic communications may be found on the NRC public Web site, http://www.nrc.gov, under Electronic Reading Room/Document Collections. ADAMS Accession | |||
Number: ML071010303 OFFICE | |||
EICA:DE | |||
TECH EDITOR | |||
BC:EICA:DE | |||
BC:ITSB:DIRS | |||
BC:SBWB:DSS | |||
BC:RES:IEEB | |||
NAME | |||
RBeacom | |||
H.Chang/email | |||
AHowe | |||
TKobetz | |||
GCranston | |||
WKemper | |||
DATE | |||
04/16/2007 | |||
01/22/2007 | |||
04/16/2007 | |||
02/06/2007 | |||
02/06/2007 | |||
02/09/2007 OFFICE | |||
BC:NSIR:RSB | |||
BC:RII/DRP/RPB6 NRR/DE/D | |||
PGCB:DPR | |||
PGCB:DPR | |||
BC:PGCB:DPR | |||
D:DPR | |||
NAME | |||
SMorris | |||
MWidman/email | |||
PHiland | |||
DBeaulieu | |||
CHawes | |||
CJackson | |||
===TQuay for MCase=== | |||
DATE | |||
02/13/07 | |||
02/26/2007 | |||
04/03/07 | |||
04/12/07 | |||
04/17/07 | |||
04/17/07 | |||
04/17/07 OFFICIAL RECORD COPY}} | |||
{{Information notice-Nav}} | {{Information notice-Nav}} | ||
Latest revision as of 02:22, 15 January 2025
| ML071010303 | |
| Person / Time | |
|---|---|
| Issue date: | 04/17/2007 |
| From: | Michael Case NRC/NRR/ADRA/DPR |
| To: | |
| References | |
| IN-07-015 | |
| Download: ML071010303 (4) | |
UNITED STATES
NUCLEAR REGULATORY COMMISSION
OFFICE OF NUCLEAR REACTOR REGULATION
WASHINGTON, DC 20555-0001
April 17, 2007
NRC INFORMATION NOTICE: 2007-15:
EFFECTS OF ETHERNET-BASED, NON-SAFETY
RELATED CONTROLS ON THE SAFE AND
CONTINUED OPERATION OF NUCLEAR POWER
STATIONS
ADDRESSEES
All holders of operating licenses for nuclear power reactors, except those who have
permanently ceased operations and have certified that fuel has been permanently removed
from the reactor vessel.
PURPOSE
The U.S. Nuclear Regulatory Commission (NRC) is issuing this information notice (IN) to alert
licensees about recent operating experience related to the effects of potential interactions and
unanticipated failures of ethernet connected non-safety equipment on the safety and
performance capability of nuclear power stations. NRC expects that recipients will review the
information for applicability to their facilities and consider actions, as appropriate, to avoid
similar problems. However, suggestions contained in this IN are not NRC requirements;
therefore, no specific action or written response is required.
DESCRIPTION OF CIRCUMSTANCES
On August 19, 2006, operators at Browns Ferry, Unit 3, manually scrammed the unit following a
loss of both the 3A and 3B reactor recirculation pumps. Plant procedures following the loss of
recirculation flow required the manual scram. Immediate loss of the recirculation flow placed
the plant in a high power, low flow condition where core thermal hydraulic stability problems
may exist at boiling-water reactors (BWRs). Generally, intentional operation in this condition, of
high power and low flow, is not permitted. Although some BWRs are authorized for single loop
operation, sudden loss of even one pump could present the plant with the same stability
problems and could result in the reactor protection system initiating a shutdown of the plant.
The initial investigation into the dual pump trip found that the recirculation pump variable
frequency drive (VFD) controllers were nonresponsive. The operators cycled the control power
off and on, reset the controllers, and restarted the VFDs. The licensee also determined that the
Unit 3 condensate demineralizer controller had failed simultaneously with the Unit 3 VFD
controllers. The condensate demineralizer primary controller is a dual redundant programmable
logic control (PLC) system connected to the ethernet-based plant integrated computer system
(ICS) network. The VFD controllers are also connected to this same plant
ICS network. Both the VFD and condensate demineralizer controllers are
microprocessor-based utilizing proprietary software.
The licensee determined that the root cause of the event was the malfunction of the VFD
controller because of excessive traffic on the plant ICS network. Testing by site personnel
performed on the VFD controllers confirmed that the VFD control system is susceptible to
failures induced by excessive network traffic. The threshold levels for failure of the VFD
controllers due to excessive network traffic, as determined by the on-site testing, can be
achieved on the existing 10-megabit/second network. The NRC staff's review of industry
literature and test reports on network device sensitivity, and the threshold levels for such
failures, confirmed these testing results. The licensee could not conclusively establish whether
the failure of the PLC caused the VFD controllers to become nonresponsive, or the excessive
network traffic, originating from a different source, caused the PLC and the VFD controllers to
fail. However, information received from the PLC vendor indicated that the PLC failure was a
likely symptom of the excessive network traffic.
To ensure that excessive network traffic will not cause future Unit 3 VFD controller malfunctions, the licensee disconnected these devices from the plant ICS network before restart. The
licensee also disconnected the Unit 2 VFD controllers from the plant ICS network.
Licensee corrective actions included (1) developing a network firewall device that limits the
connections and traffic to any potentially susceptible devices on the plant ICS network and
(2) installing a network firewall device on each units VFD controller and condensate
demineralizer controller. The Browns Ferry Unit 3 event is discussed in Licensee Event Report
05000296/2006-002, dated October 17, 2006, Agencywide Documents Access and
Management System, Accession No. ML062900106.
BACKGROUND
Ethernet is one technology used for local area networking (LAN) of many different types of
digital devices such as computers, process controls, modems and PLCs. This allows many of
these devices to transfer data over a common communications cable, typically coaxial cable, or
special grades of twisted pair wire. It is the most widely used LAN technology today.
A data packet is a basic unit of data in a networked environment. In basic networks, data
packets are broadcast, meaning sent to each network device, rather than to one specific device.
To function properly, a device must be able to effectively handle the broadcast data packets it
receives.
A key point is that all network devices must allocate time and resources to read and interpret
each broadcasted data packet, even if the packet is not intended for that particular device.
Excessive data packet traffic on the network may cause connected devices to have a delayed
response to new commands or even to lockup, thereby, disrupting normal network operations.
This excessive network traffic is sometimes called a broadcast (or data) storm.
A firewall is a mechanism used to control and monitor data traffic to and from a network, or
device, for the purpose of protecting devices on a network. In effect, it is a filter that blocks unwanted network traffic and limits the amount and type of communication flow. A firewall can
act as an intrusion detection system by identifying data packets that are denied access, recognizing data packets specifically designed to cause problems, or reporting unusual
(including excessive) traffic patterns, and many other security-based features.
The reason the licensee at Browns Ferry investigated whether the failure of one device, the
condensate demineralizer PLC, may have been a factor in causing the malfunction of the VFD
controllers is that there is documentation of such failures in commercial process control. For
instance, a memory malfunction of one device has been shown to cause a data storm by
continually transmitting data that disrupts normal network operations resulting in other network
devices becoming locked up or nonresponsive. A network found to be operating outside of
normal performance parameters with a device malfunctioning can effect devices on that
network, the network as a whole, or interfacing components and systems. The effects could
range from a slightly degraded performance to complete failure of the component or system.
Major contributors to these network failures can be the addition of devices that are not
compatible, network expansion without a procedure and a overall network plan in place, or the
failure to maintain the operating environment for legacy devices already on the network.
DISCUSSION
While only non-safety related network devices became nonresponsive at Browns Ferry Unit 3, it
is important to protect both safety-related and non-safety related devices on the plant network to
ensure the safe operation of the plant. The August 19, 2006, transient unnecessarily
challenged the plant safety systems and placed the plant in a potentially unstable high-power, low-flow condition. The potential safety implications for future similar events would depend on
the type of devices that are connected to the plant ethernet. Careful design and control of the
network architecture can mitigate the risks to plant networks from malfunctioning devices, and
improper network performance, and ultimately result in safer plant operations.
CONTACT
This IN requires no specific action or written response. Please direct any questions about this
matter to the technical contact listed below or the appropriate Office of Nuclear Reactor
Regulation project manager.
/RA by TQuay for/
Michael J. Case, Director
Division of Policy and Rulemaking
Office of Nuclear Reactor Regulation
Technical Contact:
Royce D. Beacom, NRR
301-415-2781 E-mail: rdb1@nrc.gov
Note: NRC generic communications may be found on the NRC public Web site, http://www.nrc.gov, under Electronic Reading Room/Document Collections. unwanted network traffic and limits the amount and type of communication flow. A firewall can
act as an intrusion detection system by identifying data packets that are denied access, recognizing data packets specifically designed to cause problems, or reporting unusual
(including excessive) traffic patterns, and many other security-based features.
The reason the licensee at Browns Ferry investigated whether the failure of one device, the
condensate demineralizer PLC, may have been a factor in causing the malfunction of the VFD
controllers is that there is documentation of such failures in commercial process control. For
instance, a memory malfunction of one device has been shown to cause a data storm by
continually transmitting data that disrupts normal network operations resulting in other network
devices becoming locked up or nonresponsive. A network found to be operating outside of
normal performance parameters with a device malfunctioning can effect devices on that
network, the network as a whole, or interfacing components and systems. The effects could
range from a slightly degraded performance to complete failure of the component or system.
Major contributors to these network failures can be the addition of devices that are not
compatible, network expansion without a procedure and a overall network plan in place, or the
failure to maintain the operating environment for legacy devices already on the network.
DISCUSSION
While only non-safety related network devices became nonresponsive at Browns Ferry Unit 3, it
is important to protect both safety-related and non-safety related devices on the plant network to
ensure the safe operation of the plant. The August 19, 2006, transient unnecessarily
challenged the plant safety systems and placed the plant in a potentially unstable high-power, low-flow condition. The potential safety implications for future similar events would depend on
the type of devices that are connected to the plant ethernet. Careful design and control of the
network architecture can mitigate the risks to plant networks from malfunctioning devices, and
improper network performance, and ultimately result in safer plant operations.
CONTACT
This IN requires no specific action or written response. Please direct any questions about this
matter to the technical contact listed below or the appropriate Office of Nuclear Reactor
Regulation project manager.
/RA by TQuay for/
Michael J. Case, Director
Division of Policy and Rulemaking
Office of Nuclear Reactor Regulation
Technical Contact:
Royce D. Beacom, NRR
301-415-2781 E-mail: rdb1@nrc.gov
Note: NRC generic communications may be found on the NRC public Web site, http://www.nrc.gov, under Electronic Reading Room/Document Collections. ADAMS Accession
Number: ML071010303 OFFICE
EICA:DE
TECH EDITOR
BC:EICA:DE
BC:ITSB:DIRS
BC:SBWB:DSS
BC:RES:IEEB
NAME
RBeacom
H.Chang/email
AHowe
TKobetz
GCranston
WKemper
DATE
04/16/2007
01/22/2007
04/16/2007
02/06/2007
02/06/2007
02/09/2007 OFFICE
BC:NSIR:RSB
BC:RII/DRP/RPB6 NRR/DE/D
PGCB:DPR
PGCB:DPR
BC:PGCB:DPR
D:DPR
NAME
SMorris
MWidman/email
PHiland
DBeaulieu
CHawes
CJackson
TQuay for MCase
DATE
02/13/07
02/26/2007
04/03/07
04/12/07
04/17/07
04/17/07
04/17/07 OFFICIAL RECORD COPY