Communication path integrity supervision in a network system for automatic alarm data communication
First Claim
1. A method of communication path integrity supervision for a network system of automatic alarm data communication, comprising the steps of:
- providing a network of communication paths;
providing a plurality of automatic alarm data transmitters on the network for transmitting alarm messages;
providing at least one receiver on the network for receiving the message traffic of the transmitters; and
,establishing a protocol between the receiver and the transmitters which achieves supervision of communication path integrity;
configuring the protocol on the transmitter-side to utilize processing circuitry and software for self-empowering any given transmitter to periodically test its ability to establish communication with the receiver by having a given transmitter;
generating a message of a next-appointed "check-in" time;
transmitting such message of a next-appointed "check-in" time to the receiver; and
,monitoring the elapse of time so that before the expiration of the "next-appointed check-in time" the given transmitter returns to the above step of generating a message, hence generating a succeeding message of a successor "next-appointed check-in time;
"configuring the protocol on the receiver-side to utilize processing circuitry and software for organizing the "check-in" message traffic from the transmitters in an appointment schedule by having it, the receiver;
for each received "check-in" message, scheduling or rescheduling an appointment in the appointment schedule for this transmitting transmitter for a next-appointed "check-in" time corresponding to this received "check-in" message; and
monitoring concurrently the appointment schedule against the passage of time for any occurrence of an unmet appointment, which signifies problems with integrity.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication path integrity supervision system is provided in a network system that allows communication of automatic alarm data. This involves a network, needless to say, in which a plurality of automatic alarm data transmitters are linked by diverse paths with at at least one central receiver on the network for receiving the automatic alarm data. In this integrity supervision system, the responsibility for carrying out the integrity supervision functions have been largely shifted onto the remote transmitters--each responsible for its own path or paths--and shifted away from the central receiver to the extent required by the prior art "receiver-polling" protocol. That is, each transmitter includes circuits for generating and sending to the central receiver a succession of "next promised check-in" messages, to be on schedule as promised. The central receiver responds to the reception of each such message by updating a table of such messages, scheduling or rescheduling the promised occurrence for the next check-in message as applicable to that particular remote transmitter. The central receiver is further configured with an alert signal for signaling whenever any remote transmitter fails to meet its scheduled or rescheduled next promised check-in. Given the foregoing, the integrity of the communication paths are supervised.
-
Citations
17 Claims
-
1. A method of communication path integrity supervision for a network system of automatic alarm data communication, comprising the steps of:
-
providing a network of communication paths; providing a plurality of automatic alarm data transmitters on the network for transmitting alarm messages; providing at least one receiver on the network for receiving the message traffic of the transmitters; and
,establishing a protocol between the receiver and the transmitters which achieves supervision of communication path integrity; configuring the protocol on the transmitter-side to utilize processing circuitry and software for self-empowering any given transmitter to periodically test its ability to establish communication with the receiver by having a given transmitter; generating a message of a next-appointed "check-in" time; transmitting such message of a next-appointed "check-in" time to the receiver; and
,monitoring the elapse of time so that before the expiration of the "next-appointed check-in time" the given transmitter returns to the above step of generating a message, hence generating a succeeding message of a successor "next-appointed check-in time;
"configuring the protocol on the receiver-side to utilize processing circuitry and software for organizing the "check-in" message traffic from the transmitters in an appointment schedule by having it, the receiver; for each received "check-in" message, scheduling or rescheduling an appointment in the appointment schedule for this transmitting transmitter for a next-appointed "check-in" time corresponding to this received "check-in" message; and monitoring concurrently the appointment schedule against the passage of time for any occurrence of an unmet appointment, which signifies problems with integrity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of communication path integrity supervision for a network system of automatic alarm data communication, comprising the steps of:
-
providing a network of communication paths; providing a plurality of automatic alarm data communicators for dispatching alarm messages and linking the communicators onto the network; providing at least one receiver on the network for receiving the message traffic of the communicators; and
,establishing a protocol between the receiver and the communicators which achieves supervision of communication path integrity; configuring the protocol on the communicator-side to utilize processing circuitry and software for self-empowering any given communicator to periodically test its ability to establish communication with the receiver by having a given communicator; generating a message of a next-appointed "check-in" time; dispatching such message of a next-appointed "check-in" time to the receiver; and
,monitoring the elapse of time so that before the expiration of the "next-appointed check-in time" the given communicator returns to the above step of generating a message, hence generating a succeeding message of a successor "next-appointed check-in time;
"configuring the protocol on the receiver-side to utilize processing circuitry and software for organizing the "check-in" message traffic from the communicators in an appointment schedule by having it, the receiver; for each received unscheduled "check-in" message, establish an appointment record for the dispatching communicator in the appointment schedule and schedule that communicator for a next-appointed "check-in" time corresponding to that received "check-in" message; for each timely-received scheduled "check-in" message, update the appointment record for that particular communicator in the appointment schedule and reschedule it for a succeeding next-appointed "check-in" time corresponding to that particular received "check-in" message; and monitoring concurrently the appointment schedule against the passage of time for any occurrence of an unmet appointment, and if so then generating an "alert;
"whereby such an "alert" signifies that a certain communicator failed to communicate a timely "check-in" message, which presumptively indicates that such certain communicator would likely have problems communicating alarm messages as well and hence requires further attention. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method of communication path integrity supervision for a network system of automatic alarm data communication, comprising the steps of:
-
providing a network of communication paths; providing a plurality of automatic alarm transmitters on the network for messaging alarm data; providing at least one receiver on the network for receiving the message traffic of the transmitters; and
,configuring any transmitter participating in said method of communication path integrity supervision to utilize processing circuitry and software for self-empowering that transmitter to periodically test its ability to establish communication with the receiver by having that transmitter; generating a message of a next "check-in" time; transmitting such message of a next "check-in" time to the receiver; and
,monitoring the elapse of time so that before the expiration of the "next check-in time" the given transmitter returns to the above step of generating a message, hence generating a succeeding message of a successor "next check-in time;
"configuring the receiver to utilize processing circuitry and software for organizing the "check-in" message traffic from the transmitters in the receiver'"'"'s memory by having it, the receiver; for each received "check-in" message, entering a record or updating the record for that transmitting transmitter in the receiver'"'"'s memory of the next due "check-in" time, which corresponds to the received "check-in" message; and monitoring concurrently the records in the memory against the passage of time for any occurrence of a tardy next "check-in" message, and if so then generating an "alert" which signifies that presumptively a certain transmitter is likely having problems communicating over the network and hence requires further attention. - View Dependent Claims (15, 16, 17)
-
Specification