Self-forming, self-healing configuration permitting substitution of agents to effect a live repair
First Claim
1. A self-healing configuration, comprising:
- uniquely identifiable elements that cooperate to accomplish at least one task, each said element having at least one function, each said element able to communicate with any other of said elements via at least one link; and
at least one architecture implemented in software to specify which said links are employed in a particular scenario, wherein at least a specified one of said elements assumes at least one function of any said element that is compromised during operation of said configuration.
1 Assignment
0 Petitions
Accused Products
Abstract
In select embodiments of the present invention, a configuration incorporates a suite of agents in a “flat” hardware architecture and superimposes thereon a self-forming, self-healing, hierarchical architecture implemented in software. Embodiments may be employed in various applications, such as maintaining network integrity. In one embodiment, a building security monitoring network provides for network agents to each be capable of communication with any other agents on a network at network startup. Shortly after network initialization, the software architecture is superimposed on (rides on) the flat hardware architecture, re-arranging communication links to provide an efficient hierarchy of control and substituting working agents for compromised agents as necessary in the network. All of this is done in a “live” network, not requiring shutdown, or even reduced operation to accomplish. This “dual” architecture (hierarchical software and flat hardware) provides excellent reliability in those “layered” network applications requiring near total reliability, such as security surveillance.
-
Citations
19 Claims
-
1. A self-healing configuration, comprising:
-
uniquely identifiable elements that cooperate to accomplish at least one task, each said element having at least one function, each said element able to communicate with any other of said elements via at least one link; and
at least one architecture implemented in software to specify which said links are employed in a particular scenario, wherein at least a specified one of said elements assumes at least one function of any said element that is compromised during operation of said configuration. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A self-healing network, comprising:
-
uniquely identifiable agents that cooperate to accomplish at least one task, each said agent having at least one function, each said agent able to communicate with any other of said agents via at least one link, wherein each said agent maintains an IP address and at least one database with one entry in at least one of said databases being the class of said agent; and
at least one architecture implemented in software to specify which said links are employed in a particular scenario, wherein at least a specified one of said agents assumes at least one function of any said agent that is compromised during operation of said network. - View Dependent Claims (7, 8, 9)
-
-
10. A method for establishing a self-healing configuration, comprising:
-
arranging uniquely identifiable elements in at least one array to facilitate accomplishing at least one task, each said element having at least one function, each said element able to communicate with any other of said elements via at least one link; and
superimposing at least one architecture upon said arrays, said architecture implemented in software to specify which said links are employed in a particular scenario; and
specifying at least one of said elements to assume at least one said function of said elements compromised during operation of said configuration. - View Dependent Claims (11, 12, 13)
-
-
14. A method for establishing a self-healing network, comprising:
-
arranging uniquely identifiable agents in at least one first network, each said agent having at least one function, each said agent able to communicate with any other of said agents via at least one link wherein each said agent maintains an IP address and at least one database with one entry in at least one of said databases being the class of said agent; and
superimposing at least one architecture upon said first networks, said architecture implemented in software to specify which said links are employed in a particular scenario; and
specifying at least one of said agents to assume at least one said function of said agents compromised during operation of said self-healing network. - View Dependent Claims (15, 16, 17)
-
-
18. A self-forming and self-healing network, comprising:
-
uniquely identifiable agents that cooperate to accomplish at least one task, each said agent having at least one function, each said agent able to communicate with any other of said agents via at least one link, wherein each said agent maintains an IP address and at least one database with one entry in at least one of said databases being the class of said agent; and
at least one hierarchical architecture implemented in software to specify which said links are employed in a particular scenario, wherein said agents may be added or subtracted to at least one of said levels via at least one self-forming attribute provided in said software, and wherein at least a specified one of said agents assumes at least one function of any said agent that is compromised during operation of said network. - View Dependent Claims (19)
-
Specification