US20040156370A1 - System for evolutionary adaptation - Google Patents

System for evolutionary adaptation Download PDF

Info

Publication number
US20040156370A1
US20040156370A1 US10/771,021 US77102104A US2004156370A1 US 20040156370 A1 US20040156370 A1 US 20040156370A1 US 77102104 A US77102104 A US 77102104A US 2004156370 A1 US2004156370 A1 US 2004156370A1
Authority
US
United States
Prior art keywords
nodes
network
set forth
active
further including
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/771,021
Inventor
Stephen Bush
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lockheed Martin Corp
Original Assignee
Lockheed Martin Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lockheed Martin Corp filed Critical Lockheed Martin Corp
Priority to US10/771,021 priority Critical patent/US20040156370A1/en
Assigned to GENERAL ELECTRIC COMPANY reassignment GENERAL ELECTRIC COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BUSH, STEPHEN F.
Assigned to LOCKHEED MARTIN CORPORATION reassignment LOCKHEED MARTIN CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GENERAL ELECTRIC COMPANY
Publication of US20040156370A1 publication Critical patent/US20040156370A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/00835Determination of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to a system for evolutionary adaptation within a wireless network, and more specifically, to a system for evolving services and protocols within wireless network operation.
  • DASHWNs Dynamic Ad-Hoc Wireless Networks
  • the goal of variable topology networks is to maintain message delivery as the network topology varies.
  • Network nodes should be able to dynamically form transient networks.
  • Nodes which may be located on rapidly moving platforms such as aircraft, should be able to join, leave, and re-join networks which may form at any time. Networks spontaneously form and their topologies may change rapidly or almost immediately.
  • QoS Quality of Service
  • a Programmable Network allows control software of the network to be dynamically reprogrammed.
  • An Active Network is an extreme form of programmable network that allows code and data to travel through the network, often in the same packet structure. Active packet code may execute on any node along the path that the packet travels. Active networks may service both mobile and ad-hoc networks.
  • IP Internet Protocol
  • Layering has resulted in many forms of adaptation occurring simultaneously within the network. At times, adaptation in one layer (e.g., congestion control) may occur in a manner antithetical to adaptation in another layer (e.g., route repair).
  • a “meta”-adaptation view namely how adaptive mechanisms work together, is extremely important for an ad-hoc network environment, but is currently lacking.
  • Non-layered ad hoc communication in sensor networks may also provide useful information.
  • a sensor network tends to assume large numbers of constrained sensor devices that transmit asymmetrically to a central location.
  • ad hoc routing must be implemented on the sensors using as little power and processing as possible. This has resulted in fewer network layers and better in-network utilization via active networking.
  • wireless ad-hoc networks It would be desirable for wireless ad-hoc networks to minimize network misconfiguration, bandwidth and processor misallocation, faults caused by distributed denial of service, virus attacks, sub-optimal traffic shaping, sub-optimal routing, sub-optimally fused data, sub-optimal link quality, miscomposed modeling, and sub-optimally tuned components. Further, conventional ad-hoc wireless networks do not have the capability of “self-healing”. If a conventional network encounters a situation that exceeds its predefined tolerances, the conventional network will likely exhibit catastrophic failure.
  • a system in accordance with the present invention operates a wireless ad hoc network.
  • the system includes a plurality of nodes and an active packet.
  • the active packet implements a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes.
  • a computer program product in accordance with the present invention evolutionarily adapts a network.
  • the computer program product includes a first instruction for implementing a genetically programmed adaptation of one of a plurality of nodes in response to a change of condition of the one node of the plurality of nodes and a second instruction for injecting a functional unit into the active packet.
  • the first instruction is executed by an active packet.
  • a method in accordance with the present invention adapts a network.
  • the method includes the steps of: operating a plurality of nodes with active packets; implementing a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes; executing the operating step by the active packet; injecting a functional unit into the active packet; and probabilistically selecting two parental programs based on fitness.
  • FIG. 1 is a schematic representation of an example system for use with the present invention
  • FIG. 2 is a schematic representation of part of a network for use with a system in accordance with the present invention
  • FIG. 3 is a schematic representation of another example system in accordance with the present invention.
  • FIG. 4 is a schematic representation of part of still another example system in accordance with the present invention.
  • FIG. 5 is a schematic representation of yet another example system in accordance with the present invention.
  • FIG. 6 is a schematic representation of still another example system in accordance with the present invention.
  • a system 10 in accordance with the present invention includes an active network packet for implementing genetically programmed adaptation to respond to variable and unforeseen network conditions.
  • the active packet may be represented by a nucleus 101 with each network node 100 being represented by a cell containing the nucleus (FIG. 3).
  • the nucleus 101 may contain a population 111 of chromosomes (i.e., strings of functional units, etc.).
  • Functional Units may be predefined code units within the active packets.
  • a genetic network programming operation may begin with the injection of the functional units, or basic building blocks of genetic material, into the network. This genetic material may be injected into each active node of the network. The genetic material remains inactive until a particular fitness function is injected into the network. Receipt of this particular fitness function causes evolution. Evolution continues as long as the network continues to operate.
  • the system 10 defines the interoperability requirements for an active ad-hoc network by evolutionarily adapting the service of the network. Networks are typically divided into fixed layers to allow for specialization and ease of development. However, different optimization techniques and strategies may be used within different layers, sometimes leading to conflicting goals and lack of optimal convergence.
  • the goal of the system 10 is to define an optimization service that is integrated with the network. Thus, common optimization and fitness goals may be enabled across all layers.
  • the system 10 also allows the automated downward growth of protocol stacks such that as the reliance upon a fixed infrastructure is minimized.
  • the system 10 injects algorithmic information (i.e., executable code, etc) into the network.
  • algorithmic information i.e., executable code, etc
  • Active or programmable capability optimizes this injection. While active ad-hoc network generic adaptation may be standardized via a vehicle other than active packets, active networking allows for convenient implementation of algorithmic change within the network.
  • the system 10 provides an optimization service that is integrated throughout the network architecture. In order to achieve the goal of an infrastructure-less ad-hoc network, the system 10 is highly adaptable. The adaptation framework of the system 10 minimizes reliance upon a fixed infrastructure.
  • the system 10 utilizes a DAHWN layering (FIG. 2) that is not a conventional network stack.
  • DAHWN layering (FIG. 2) that is not a conventional network stack.
  • all of the components above the Active Network Execution Environment are Active Applications and do not require the services of other Active Applications lower in the stack.
  • the Evolutionary Adaptation Service (EAS) provided by the system 10 may be located at the top of the stack, the EAS is available to support all of the components in the stack.
  • the EAS does not rely on all the stack elements beneath it. For example, EAS does not require routing (which may appear below it in the stack), unless it is being remotely injected.
  • EAS is available to support services that appear below the EAS in the stack.
  • a Policies block may require the EAS to provide optimal solutions to security problems or to evolve components that meet specified security requirements (i.e., components with given levels of complexity, etc.).
  • Another example may be complexity probes located deep within the Active Execution Environment (lower in the stack) may use an evolutionary complexity estimator that is provided by the EAS.
  • the system 10 exists within the DAHWN architecture (FIG. 2).
  • the active ad-hoc network genetic adaptation service of the system 10 runs as an active application on an active node.
  • the EAS is independent of the underlying architecture of the DAHWN.
  • the Node Operating System may run one or more Execution Environments (EE) within a protocol stack of a DAHWN. Multiple active applications may execute in any Execution Environment.
  • the protocol stack provides the architecture of an active network overlay of protocols. This overlay scheme uses the Active Network Encapsulation Protocol (ANEP) as a conduit for the underlying network.
  • ANEP Active Network Encapsulation Protocol
  • the genetic adaptation system 10 in accordance with the present invention executes alongside other active applications and interacts with any packet managed entity to provide optimization and adaptation services.
  • EAS is an active ad-hoc Evolutionary Adaptation Service. EAS may provide mathematical optimization results and genetically modify itself to meet a specific fitness criteria.
  • Small-State is an information cache that may generally be created at network nodes 11 (FIG. 1), intended for use by executable components of the same application.
  • Global-State is an information cache created at network nodes 11 , intended to be used by executable components of different applications.
  • Active Application (AA) is an active network protocol or service that is injected into the network in the form of active packets. The active packets are executed within the EE.
  • Active Network allows executable code to be injected into the nodes of the network and allows the code to be executed at the nodes.
  • Active Packet is the executable code that is injected into the nodes of an active network.
  • Node Operating System is the active network operating system. The supporting infrastructure on intermediate network nodes 11 supports one or more execution environments.
  • a Mutation Operation creates a single parental program probabilistically selected from the population based on fitness. A mutation point is randomly chosen, the subtree rooted at that point is depleted, and a new subtree is grown there using the same random growth process that was used to generate the initial population. This type of asexual mutation operation is typically performed sparingly (having a low probability during each generation of the run).
  • Cross-Over is a sexual recombination operation with two parental programs probabilistically selected from the population based on fitness.
  • the two parental programs are usually of different sizes and shapes.
  • a crossover point is randomly chosen in the first parental program and a crossover point is randomly chosen in the second parental program.
  • a subtree is rooted at the crossover point of the first, or receiving, parental program and is deleted and replaced by the subtree from the second, or contributing, parental program.
  • Crossover is the predominant operation in genetic programming (and genetic algorithms) and is performed with a high probability.
  • a Reproduction Operation copies a single individual, probabilistically selected operation based on fitness, into the next generation of the population.
  • a Functional Unit (FU) is an active packet containing code that is capable of operating upon other active packets.
  • the Functional Unit has a well-defined input port and output port through which active packets may flow as the active packets are being executed.
  • Functional Units are the building blocks of a Chromosome.
  • a Functional Unit may range in complexity from very simple math operations to very complex packet modifications upon active packets flowing through the Functional Unit.
  • a chain of Functional Units has an input port and output port. Chains of Function I/O ports form a Chromosome. Evolution occurs by changing the ordering of the Functional Units.
  • a Nucleus is the evolutionary control code and the initial set of Functional Units. Evolutionary Control Code includes evolutionary and genetic programming mechanisms. The Evolutionary Control Code is the particular implementation injected into active nodes.
  • a Fitness Function may define the evolutionary goal.
  • the system 10 continuously evaluates genetic material (chromosomes) to determine how well the genetic material meets the specified fitness criteria.
  • the Fitness Function may be user-defined. However, the Fitness Function must return a relatively high value for ‘fit’ genetic material and a relatively low value for ‘less fit’ genetic material.
  • the above-discussed parameters may be the minimum necessary elements for active ad-hoc network genetic adaptation.
  • Fitness Functions may thereby be injected into the network allowing optimized static and algorithmic results.
  • Such Fitness Functions may be executed seamlessly with other Fitness Functions within the network.
  • the system 10 conforms with existing standards when and where possible.
  • the system 10 facilitates a gradual transition to an active and programmable networking paradigm.
  • the system 10 performs Common In-line Optimization for introducing the use of a common, cross-layer optimization technique.
  • An evolutionary algorithm is an umbrella term used to describe a computer-based problem solving system using computational models.
  • the system 10 may use a variety of EVOLUTIONARY ALGORITHMS. Some examples are GENETIC ALGORITHMS, EVOLUTIONARY PROGRAMMING, EVOLUTION STRATEGIES CLASSIFIER SYSTEMS, and GENETIC PROGRAMMING. These all share a common conceptual base of simulating the evolution of individual structures via processes of SELECTION, MUTATION, and REPRODUCTION. The processes may depend on the perceived performance of the individual structures as defined by an environment.
  • EASs maintain a population of structures that evolve according to rules of selection and “search operators”, or genetic operators such as recombination and mutation (FIG. 4).
  • search operators or genetic operators such as recombination and mutation (FIG. 4).
  • Each individual in the population may receive a measure of fitness within the environment.
  • Reproduction receives attention on high fitness individuals, thus exploiting the available fitness information.
  • Recombination and mutation perturb those individuals, providing general heuristics for Exploration.
  • these algorithms are sufficiently complex to provide robust and powerful adaptive search mechanisms.
  • This genetic programming may start with a “primordial ooze” of randomly-generated computer programs.
  • the set of functions that may appear at the internal points of a program tree may include ordinary arithmetic functions and/or conditional operators.
  • the set of terminals appearing at the external points typically include the program's external inputs (such as the independent variables X and Y) and random constants (such as 3.2 and 0.4).
  • the randomly created programs typically have different sizes and shapes.
  • a main generational loop (FIG. 4) of a run of genetic programming may consist of a fitness evaluation (i.e., Darwinian selection) and genetic operations. Each individual program in the population may be evaluated to determine how fit that individual program is at solving the problem at hand. Programs may then be probabilistically selected from the population based on fitness to participate in the various genetic operations, with re-selection allowed.
  • a fitness evaluation i.e., Darwinian selection
  • Programs may then be probabilistically selected from the population based on fitness to participate in the various genetic operations, with re-selection allowed.
  • the system 10 injects the Fitness Function onto all reachable nodes.
  • the Fitness Function a user-defined function, may read either Simple Network Management Protocol (SNMP) object values or EE Postevents.
  • SNMP Simple Network Management Protocol
  • the result of Fitness Function execution may be a single fitness metric that is used by the Nucleus for evolutionary control. Postevents make only those metrics accessible that are local to the node.
  • a SNMP interface may allow network wide metric access.
  • the Fitness Function once injected into a node, places itself in Small-State.
  • the Fitness Function is picked up by the Nucleus and used to guide the evolution of the system 10 .
  • Chromosomes may accept active packets flowing through the node and act upon those packets. This is determined by the definition of the Functional Units.
  • Example actions include delaying packets, changing packet forwarding, and measuring packet characteristics.
  • Chromosome Strands may be composed of chains of Functional Units.
  • An individual Functional Unit may be derived from an FU class and over-ride the function of the Functional Unit.
  • the FU class ensures that the Functional Unit active packet has the properties required to chain I/O together in a single Chromosome Strand.
  • the Functional Unit has well-defined I/O ports through which other active packets may flow and may execute user-defined actions in the Functional Unit.
  • the goal of the system 10 is to develop in-network self-composition of protocols and services.
  • the system 10 follows a close analogy with biological evolutionary techniques such as Genetic Algorithms.
  • Functional Units or building blocks of code, may be injected into the network.
  • a Fitness Function defined by the user, may be injected into the network.
  • the Functional Units evolve to maximize the Fitness Function.
  • the system 10 may include an EAS prediction framework for enforcing certain minimal requirements on the execution environment.
  • the EE must provide an information cache, or Small State, to enable information exchange between active packets.
  • the EE may also provide an information cache, or Global State, to enable an EAS prediction framework to communicate with a predictively managed active application for querying the current state of the active application.
  • the EE must be able to store and query both Small State and Global State, if Global State is implemented.
  • the EE should provide appropriate access control mechanisms to both Small State and Global State, if Global State is implemented.
  • the EE must provide an interface that enables both the active ad-hoc network genetic adaptation values and the values of the actual component being managed to publish their state to an SNMP. This enables the EAS prediction framework to store the predicted state in a well-known format and also enables legacy SNMP tools to query the predicted state using SNMP operations. Additionally, the system 10 may also update its current state using SNMP, which a Logical Process will be able to query.
  • a generic SNMP agent coded as an active application may be injected into the active nodes.
  • the agent creates a ‘Global State’ on an active node with a well-known name.
  • the agent reads information coded in a well known format that has been written to the ‘Global State’ and publishes it to the SNMP.
  • Any active application that wishes to advertise its state uses an interface that enables it to store its information in the well-known ‘Global State’ in the given format.
  • a Message Packet may be the basic unit of inter-application communication. Each message consists of a message type.
  • the active application should send a message of the valid message type to the SNMP agent to perform the required operation. On receipt of a message, the SNMP agent should attempt to perform the requested operation. The SNMP agent then responds with an acknowledgement message in a particular format.
  • the status code may have one of the following values: OK: indicate successful operation; ERR_DUPENTRY: if for a MSG_ADD operation, an object identifier of given name already exists; and ERR_NOSUCHID: if for a MSG_UPDATE operation, an object identifier of given name does not exist.
  • the status message may be any descriptive string explaining the nature of the failure or should be “Success” for a successful operation.
  • Models injected into the system 10 may allow network state to be predicted and efficiently propagated throughout the active network enabling the system 10 to operate simultaneously in real time as well as project the future state of the system.
  • Network state information such as load, capacity, security, mobility, faults, and other state information with supporting models, is automatically available for use by the system 10 with current values and predictive values.
  • sample load and processor usage prediction applications have been validated using an Atropos Toolkit.
  • the toolkit's distributed simulation infrastructure takes advantage of parallel processing within the network since computation occurs concurrently at all participating active nodes.
  • the example network may be queried in real time to verify the prediction accuracy. Measures, such as rollbacks, are taken to keep the simulation in line with actual performance.
  • a computer program product 500 evolutionarily adapts a network (FIG. 5).
  • the computer program product 500 includes a first instruction 501 for implementing a genetically programmed adaptation of one of a plurality of nodes in response to a change of condition of the one node of the plurality of nodes and a second instruction 502 for injecting a functional unit into the active packet.
  • the first instruction 501 is executed by an active packet.
  • a method 600 adapts a network (FIG. 6).
  • the method 600 includes the steps of: operating 601 a plurality of nodes with active packets; implementing 602 a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes; executing 603 the operating step by the active packet; injecting 604 a functional unit into the active packet; and probabilistically selecting 605 two parental programs based on fitness.
  • program modules include routines, programs, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like.
  • the illustrated aspects of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications argument model. However, some, if not all aspects of the invention can be practiced on stand-alone computers.
  • program modules may be located in both local and remote memory storage devices.
  • An exemplary system for implementing the various aspects of the invention includes a conventional server computer, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit.
  • the processing unit may be any of various commercially available processors. Dual microprocessors and other multi-processor architectures also can be used as the processing unit.
  • the system bus may be any of several types of bus structure including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of conventional bus architectures.
  • the system memory includes read only memory (ROM) and random access memory (RAM).
  • BIOS basic input/output system
  • BIOS basic routines that help to transfer information between elements within the server computer, such as during start-up, is stored in ROM.
  • the server computer further includes a hard disk drive, a magnetic disk drive, e.g., to read from or write to a removable disk, and an optical disk drive, e.g., for reading a CD-ROM disk or to read from or write to other optical media.
  • the hard disk drive, magnetic disk drive, and optical disk drive are connected to the system bus by a hard disk drive interface, a magnetic disk drive interface, and an optical drive interface, respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, etc., for the server computer.
  • computer-readable media refers to a hard disk, a removable magnetic disk and a CD
  • other types of media which are readable by a computer such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, and the like, may also be used in the exemplary operating environment, and further that any such media may contain computer-executable instructions for performing the methods of the present invention.
  • a number of program modules may be stored in the drives and RAM, including an operating system, one or more application programs, other program modules, and program data.
  • a user may enter commands and information into the server computer through a keyboard and a pointing device, such as a mouse.
  • Other input devices may include a microphone, a joystick, a game pad, a satellite dish, a scanner, or the like.
  • These and other input devices are often connected to the processing unit through a serial port interface that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB).
  • a monitor or other type of display device is also connected to the system bus via an interface, such as a video adapter.
  • computers typically include other peripheral output devices (not shown), such as speaker and printers.
  • the server computer may operate in a networked environment using logical connections to one or more remote computers, such as a remote client computer.
  • the remote computer may be a workstation, a server computer, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the server computer.
  • the logical connections include a local area network (LAN) and a wide area network (WAN).
  • LAN local area network
  • WAN wide area network
  • the server computer When used in a LAN networking environment, the server computer is connected to the local network through a network interface or adapter.
  • the server computer When used in a WAN networking environment, the server computer typically includes a modem, or is connected to a communications server on the LAN, or has other means for establishing communications over the wide area network, such as the internet.
  • the modem which may be internal or external, is connected to the system bus via the serial port interface.
  • program modules depicted relative to the server computer, or portions thereof may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.

Abstract

A system in accordance with the present invention operates a wireless ad hoc network. The system includes a plurality of nodes and an active packet. The active packet implements a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes.

Description

    RELATED APPLICATION
  • This application claims the benefit of U.S. Provisional Application No. 60/445,579, filed Feb. 7, 2003.[0001]
  • FIELD OF INVENTION
  • The present invention relates to a system for evolutionary adaptation within a wireless network, and more specifically, to a system for evolving services and protocols within wireless network operation. [0002]
  • BACKGROUND OF THE INVENTION
  • Dynamic Ad-Hoc Wireless Networks (DAHWNs) are a subset of variable topology networks. The goal of variable topology networks is to maintain message delivery as the network topology varies. Network nodes should be able to dynamically form transient networks. Nodes, which may be located on rapidly moving platforms such as aircraft, should be able to join, leave, and re-join networks which may form at any time. Networks spontaneously form and their topologies may change rapidly or almost immediately. An additional challenge required by airborne and heterogeneous air and ground environments is the ability to provide predictable and optimized Quality of Service (QoS) of data transmission over variable topologies. [0003]
  • In order to provide predictable and optimal Quality of Service (QoS) in Dynamic Ad-Hoc Wireless Networks, network architecture must support dynamic adaptation to the rapidly changing environment. The degree to which the network must adapt is dependent on the rate of change of the topology. QoS requirements are most often stated in the form of an optimization problem with a cost function that is optimized by adaptation within the network. An applicable result from complexity theory, a No Free Lunch Theorem, expresses a limit on the ability of any single algorithm, or protocol, to meet QoS requirements. The No Free Lunch Theorem states that all algorithms perform exactly the same, searching for an extremum, when averaged over all cost functions. If a potentially good algorithm appears to outperform poor algorithm on some cost functions, then there exist exactly as many functions where the apparent poor algorithm will outperform the good algorithm. In other words, no single algorithm, or ad-hoc protocol, can optimize all potential QoS requirements. [0004]
  • There are two forms of adaptation of protocols: 1) an algorithm that remains fixed, but includes tunable parameters and 2) an algorithm whose fundamental operation changes. Most conventional theory has focused upon the fixed, but tunable adaptation. In other words, current research is seeking a fixed algorithm with enough degrees of freedom such that optimal operation may be found by tuning a fixed set of parameters. This may be due in part to the difficulty in breaking away from the fixed operation of the Internet Protocol that has a strong grip on the mind-set of most researchers. Great potential exists in examining the latter form of adaptation, particularly in light of the implication of the No Free Lunch Theorem which indicates that simply tuning a given algorithm will not be as optimal as changing the algorithm itself. [0005]
  • Two high-level frameworks that are flexible and customizable enough to allow dynamic change in algorithmic content within networks are: Programmable Networks and Active Networks. A Programmable Network allows control software of the network to be dynamically reprogrammed. An Active Network is an extreme form of programmable network that allows code and data to travel through the network, often in the same packet structure. Active packet code may execute on any node along the path that the packet travels. Active networks may service both mobile and ad-hoc networks. One challenge that must be addressed is the mismatch among adaptation of individual layers of Internet Protocol (IP) and improving the adaptation to suit the characteristics of wireless and ad-hoc network environments. [0006]
  • The most significant gap that has been identified with regard to adaptation within ad-hoc networks is the lack of synergistic adaptation among network layers. Early network implementation focused upon network layering as a mechanism for partitioning computer communications into a set of tractable sub-tasks. [0007]
  • Layering has resulted in many forms of adaptation occurring simultaneously within the network. At times, adaptation in one layer (e.g., congestion control) may occur in a manner antithetical to adaptation in another layer (e.g., route repair). A “meta”-adaptation view, namely how adaptive mechanisms work together, is extremely important for an ad-hoc network environment, but is currently lacking. [0008]
  • One conventional attempt to correct this deficiency is Explicit Link Failure Notification. Congestion and routing each try to adapt based upon limited knowledge of each other, resulting in sub-optimal global behavior. Another example of sub-optimal adaptation behavior is MAC to IP layer address resolution. [0009]
  • Non-layered ad hoc communication in sensor networks may also provide useful information. A sensor network tends to assume large numbers of constrained sensor devices that transmit asymmetrically to a central location. However, ad hoc routing must be implemented on the sensors using as little power and processing as possible. This has resulted in fewer network layers and better in-network utilization via active networking. [0010]
  • It would be desirable for wireless ad-hoc networks to minimize network misconfiguration, bandwidth and processor misallocation, faults caused by distributed denial of service, virus attacks, sub-optimal traffic shaping, sub-optimal routing, sub-optimally fused data, sub-optimal link quality, miscomposed modeling, and sub-optimally tuned components. Further, conventional ad-hoc wireless networks do not have the capability of “self-healing”. If a conventional network encounters a situation that exceeds its predefined tolerances, the conventional network will likely exhibit catastrophic failure. [0011]
  • SUMMARY OF THE INVENTION
  • A system in accordance with the present invention operates a wireless ad hoc network. The system includes a plurality of nodes and an active packet. The active packet implements a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes. [0012]
  • A computer program product in accordance with the present invention evolutionarily adapts a network. The computer program product includes a first instruction for implementing a genetically programmed adaptation of one of a plurality of nodes in response to a change of condition of the one node of the plurality of nodes and a second instruction for injecting a functional unit into the active packet. The first instruction is executed by an active packet. [0013]
  • A method in accordance with the present invention adapts a network. The method includes the steps of: operating a plurality of nodes with active packets; implementing a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes; executing the operating step by the active packet; injecting a functional unit into the active packet; and probabilistically selecting two parental programs based on fitness.[0014]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing and other features of the present invention will become apparent to one skilled in the art to which the present invention relates upon consideration of the following description of the invention with reference to the accompanying drawings, wherein: [0015]
  • FIG. 1 is a schematic representation of an example system for use with the present invention; [0016]
  • FIG. 2 is a schematic representation of part of a network for use with a system in accordance with the present invention; [0017]
  • FIG. 3 is a schematic representation of another example system in accordance with the present invention; [0018]
  • FIG. 4 is a schematic representation of part of still another example system in accordance with the present invention; [0019]
  • FIG. 5 is a schematic representation of yet another example system in accordance with the present invention; and [0020]
  • FIG. 6 is a schematic representation of still another example system in accordance with the present invention.[0021]
  • DESCRIPTION OF AN EXAMPLE EMBODIMENTS
  • A [0022] system 10 in accordance with the present invention (FIG. 3) includes an active network packet for implementing genetically programmed adaptation to respond to variable and unforeseen network conditions. The active packet may be represented by a nucleus 101 with each network node 100 being represented by a cell containing the nucleus (FIG. 3). The nucleus 101 may contain a population 111 of chromosomes (i.e., strings of functional units, etc.). Functional Units may be predefined code units within the active packets. A genetic network programming operation may begin with the injection of the functional units, or basic building blocks of genetic material, into the network. This genetic material may be injected into each active node of the network. The genetic material remains inactive until a particular fitness function is injected into the network. Receipt of this particular fitness function causes evolution. Evolution continues as long as the network continues to operate.
  • The [0023] system 10 defines the interoperability requirements for an active ad-hoc network by evolutionarily adapting the service of the network. Networks are typically divided into fixed layers to allow for specialization and ease of development. However, different optimization techniques and strategies may be used within different layers, sometimes leading to conflicting goals and lack of optimal convergence. The goal of the system 10 is to define an optimization service that is integrated with the network. Thus, common optimization and fitness goals may be enabled across all layers. The system 10 also allows the automated downward growth of protocol stacks such that as the reliance upon a fixed infrastructure is minimized.
  • The [0024] system 10 injects algorithmic information (i.e., executable code, etc) into the network. Active or programmable capability optimizes this injection. While active ad-hoc network generic adaptation may be standardized via a vehicle other than active packets, active networking allows for convenient implementation of algorithmic change within the network.
  • The [0025] system 10 provides an optimization service that is integrated throughout the network architecture. In order to achieve the goal of an infrastructure-less ad-hoc network, the system 10 is highly adaptable. The adaptation framework of the system 10 minimizes reliance upon a fixed infrastructure.
  • The [0026] system 10 utilizes a DAHWN layering (FIG. 2) that is not a conventional network stack. In particular, all of the components above the Active Network Execution Environment are Active Applications and do not require the services of other Active Applications lower in the stack. While the Evolutionary Adaptation Service (EAS) provided by the system 10 may be located at the top of the stack, the EAS is available to support all of the components in the stack. In addition, the EAS does not rely on all the stack elements beneath it. For example, EAS does not require routing (which may appear below it in the stack), unless it is being remotely injected. Also, EAS is available to support services that appear below the EAS in the stack. Specifically, a Policies block may require the EAS to provide optimal solutions to security problems or to evolve components that meet specified security requirements (i.e., components with given levels of complexity, etc.).
  • Another example may be complexity probes located deep within the Active Execution Environment (lower in the stack) may use an evolutionary complexity estimator that is provided by the EAS. The [0027] system 10 exists within the DAHWN architecture (FIG. 2). The active ad-hoc network genetic adaptation service of the system 10 runs as an active application on an active node. The EAS is independent of the underlying architecture of the DAHWN.
  • The Node Operating System (NOS) may run one or more Execution Environments (EE) within a protocol stack of a DAHWN. Multiple active applications may execute in any Execution Environment. The protocol stack provides the architecture of an active network overlay of protocols. This overlay scheme uses the Active Network Encapsulation Protocol (ANEP) as a conduit for the underlying network. The [0028] genetic adaptation system 10 in accordance with the present invention executes alongside other active applications and interacts with any packet managed entity to provide optimization and adaptation services.
  • EAS is an active ad-hoc Evolutionary Adaptation Service. EAS may provide mathematical optimization results and genetically modify itself to meet a specific fitness criteria. Small-State is an information cache that may generally be created at network nodes [0029] 11 (FIG. 1), intended for use by executable components of the same application. Global-State is an information cache created at network nodes 11, intended to be used by executable components of different applications. Active Application (AA) is an active network protocol or service that is injected into the network in the form of active packets. The active packets are executed within the EE. Active Network allows executable code to be injected into the nodes of the network and allows the code to be executed at the nodes. Active Packet is the executable code that is injected into the nodes of an active network. Node Operating System is the active network operating system. The supporting infrastructure on intermediate network nodes 11 supports one or more execution environments.
  • A Mutation Operation creates a single parental program probabilistically selected from the population based on fitness. A mutation point is randomly chosen, the subtree rooted at that point is depleted, and a new subtree is grown there using the same random growth process that was used to generate the initial population. This type of asexual mutation operation is typically performed sparingly (having a low probability during each generation of the run). [0030]
  • Cross-Over is a sexual recombination operation with two parental programs probabilistically selected from the population based on fitness. The two parental programs are usually of different sizes and shapes. A crossover point is randomly chosen in the first parental program and a crossover point is randomly chosen in the second parental program. A subtree is rooted at the crossover point of the first, or receiving, parental program and is deleted and replaced by the subtree from the second, or contributing, parental program. Crossover is the predominant operation in genetic programming (and genetic algorithms) and is performed with a high probability. [0031]
  • A Reproduction Operation copies a single individual, probabilistically selected operation based on fitness, into the next generation of the population. A Functional Unit (FU) is an active packet containing code that is capable of operating upon other active packets. The Functional Unit has a well-defined input port and output port through which active packets may flow as the active packets are being executed. Functional Units are the building blocks of a Chromosome. A Functional Unit may range in complexity from very simple math operations to very complex packet modifications upon active packets flowing through the Functional Unit. [0032]
  • A chain of Functional Units has an input port and output port. Chains of Function I/O ports form a Chromosome. Evolution occurs by changing the ordering of the Functional Units. [0033]
  • A Nucleus is the evolutionary control code and the initial set of Functional Units. Evolutionary Control Code includes evolutionary and genetic programming mechanisms. The Evolutionary Control Code is the particular implementation injected into active nodes. [0034]
  • A Fitness Function may define the evolutionary goal. The [0035] system 10 continuously evaluates genetic material (chromosomes) to determine how well the genetic material meets the specified fitness criteria. The Fitness Function may be user-defined. However, the Fitness Function must return a relatively high value for ‘fit’ genetic material and a relatively low value for ‘less fit’ genetic material.
  • The above-discussed parameters may be the minimum necessary elements for active ad-hoc network genetic adaptation. Fitness Functions may thereby be injected into the network allowing optimized static and algorithmic results. Such Fitness Functions may be executed seamlessly with other Fitness Functions within the network. [0036]
  • The [0037] system 10 conforms with existing standards when and where possible. The system 10 facilitates a gradual transition to an active and programmable networking paradigm. The system 10 performs Common In-line Optimization for introducing the use of a common, cross-layer optimization technique. An evolutionary algorithm is an umbrella term used to describe a computer-based problem solving system using computational models.
  • The [0038] system 10 may use a variety of EVOLUTIONARY ALGORITHMS. Some examples are GENETIC ALGORITHMS, EVOLUTIONARY PROGRAMMING, EVOLUTION STRATEGIES CLASSIFIER SYSTEMS, and GENETIC PROGRAMMING. These all share a common conceptual base of simulating the evolution of individual structures via processes of SELECTION, MUTATION, and REPRODUCTION. The processes may depend on the perceived performance of the individual structures as defined by an environment.
  • More specifically, EASs maintain a population of structures that evolve according to rules of selection and “search operators”, or genetic operators such as recombination and mutation (FIG. 4). Each individual in the population may receive a measure of fitness within the environment. Reproduction receives attention on high fitness individuals, thus exploiting the available fitness information. Recombination and mutation perturb those individuals, providing general heuristics for Exploration. Although simplistic from a biologist's viewpoint, these algorithms are sufficiently complex to provide robust and powerful adaptive search mechanisms. [0039]
  • This genetic programming may start with a “primordial ooze” of randomly-generated computer programs. The set of functions that may appear at the internal points of a program tree may include ordinary arithmetic functions and/or conditional operators. The set of terminals appearing at the external points typically include the program's external inputs (such as the independent variables X and Y) and random constants (such as 3.2 and 0.4). The randomly created programs typically have different sizes and shapes. [0040]
  • A main generational loop (FIG. 4) of a run of genetic programming may consist of a fitness evaluation (i.e., Darwinian selection) and genetic operations. Each individual program in the population may be evaluated to determine how fit that individual program is at solving the problem at hand. Programs may then be probabilistically selected from the population based on fitness to participate in the various genetic operations, with re-selection allowed. [0041]
  • While a more fit program has a better chance of being selected, even individuals known to be unfit are allocated some trials in a mathematically principled way. Thus, genetic programming is not a purely greedy hill-climbing algorithm. The individuals in the initial random population and the offspring produced by each genetic operation are all syntactically valid executable programs. After many genetic operations, a program may emerge that solves, or approximately solves, the problem at hand. [0042]
  • The [0043] system 10 injects the Fitness Function onto all reachable nodes. The Fitness Function, a user-defined function, may read either Simple Network Management Protocol (SNMP) object values or EE Postevents. The result of Fitness Function execution may be a single fitness metric that is used by the Nucleus for evolutionary control. Postevents make only those metrics accessible that are local to the node. A SNMP interface may allow network wide metric access.
  • The Fitness Function, once injected into a node, places itself in Small-State. The Fitness Function is picked up by the Nucleus and used to guide the evolution of the [0044] system 10. Chromosomes may accept active packets flowing through the node and act upon those packets. This is determined by the definition of the Functional Units. Example actions include delaying packets, changing packet forwarding, and measuring packet characteristics.
  • Chromosome Strands may be composed of chains of Functional Units. An individual Functional Unit may be derived from an FU class and over-ride the function of the Functional Unit. The FU class ensures that the Functional Unit active packet has the properties required to chain I/O together in a single Chromosome Strand. The Functional Unit has well-defined I/O ports through which other active packets may flow and may execute user-defined actions in the Functional Unit. [0045]
  • The goal of the [0046] system 10 is to develop in-network self-composition of protocols and services. The system 10 follows a close analogy with biological evolutionary techniques such as Genetic Algorithms. Functional Units, or building blocks of code, may be injected into the network. In addition, a Fitness Function, defined by the user, may be injected into the network. The Functional Units evolve to maximize the Fitness Function.
  • The [0047] system 10 may include an EAS prediction framework for enforcing certain minimal requirements on the execution environment. The EE must provide an information cache, or Small State, to enable information exchange between active packets. The EE may also provide an information cache, or Global State, to enable an EAS prediction framework to communicate with a predictively managed active application for querying the current state of the active application. The EE must be able to store and query both Small State and Global State, if Global State is implemented. The EE should provide appropriate access control mechanisms to both Small State and Global State, if Global State is implemented.
  • The EE must provide an interface that enables both the active ad-hoc network genetic adaptation values and the values of the actual component being managed to publish their state to an SNMP. This enables the EAS prediction framework to store the predicted state in a well-known format and also enables legacy SNMP tools to query the predicted state using SNMP operations. Additionally, the [0048] system 10 may also update its current state using SNMP, which a Logical Process will be able to query.
  • In a particular implementation of such an interface, a generic SNMP agent coded as an active application may be injected into the active nodes. The agent creates a ‘Global State’ on an active node with a well-known name. The agent reads information coded in a well known format that has been written to the ‘Global State’ and publishes it to the SNMP. Any active application that wishes to advertise its state uses an interface that enables it to store its information in the well-known ‘Global State’ in the given format. [0049]
  • The SNMP agent and the active application may use special interfaces to implement messaging between them. A Message Packet may be the basic unit of inter-application communication. Each message consists of a message type. [0050]
  • The active application should send a message of the valid message type to the SNMP agent to perform the required operation. On receipt of a message, the SNMP agent should attempt to perform the requested operation. The SNMP agent then responds with an acknowledgement message in a particular format. [0051]
  • The status code may have one of the following values: OK: indicate successful operation; ERR_DUPENTRY: if for a MSG_ADD operation, an object identifier of given name already exists; and ERR_NOSUCHID: if for a MSG_UPDATE operation, an object identifier of given name does not exist. The status message may be any descriptive string explaining the nature of the failure or should be “Success” for a successful operation. [0052]
  • Models injected into the [0053] system 10 may allow network state to be predicted and efficiently propagated throughout the active network enabling the system 10 to operate simultaneously in real time as well as project the future state of the system. Network state information, such as load, capacity, security, mobility, faults, and other state information with supporting models, is automatically available for use by the system 10 with current values and predictive values. In one example, sample load and processor usage prediction applications have been validated using an Atropos Toolkit. The toolkit's distributed simulation infrastructure takes advantage of parallel processing within the network since computation occurs concurrently at all participating active nodes. The example network may be queried in real time to verify the prediction accuracy. Measures, such as rollbacks, are taken to keep the simulation in line with actual performance.
  • In accordance with the present invention, a [0054] computer program product 500 evolutionarily adapts a network (FIG. 5). The computer program product 500 includes a first instruction 501 for implementing a genetically programmed adaptation of one of a plurality of nodes in response to a change of condition of the one node of the plurality of nodes and a second instruction 502 for injecting a functional unit into the active packet. The first instruction 501 is executed by an active packet.
  • In accordance with the present invention, a [0055] method 600 adapts a network (FIG. 6). The method 600 includes the steps of: operating 601 a plurality of nodes with active packets; implementing 602 a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes; executing 603 the operating step by the active packet; injecting 604 a functional unit into the active packet; and probabilistically selecting 605 two parental programs based on fitness.
  • In order to provide a context for the various aspects of the present invention, the following discussion is intended to provide a brief, general description of a suitable computing environment in which the various aspects of the present invention may be implemented. While the invention has been described above in the general context of computer-executable instructions of a computer program that runs on a computer, those skilled in the art will recognize that the invention also may be implemented in combination with other program modules. [0056]
  • Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like. The illustrated aspects of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications argument model. However, some, if not all aspects of the invention can be practiced on stand-alone computers. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. [0057]
  • An exemplary system for implementing the various aspects of the invention includes a conventional server computer, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The processing unit may be any of various commercially available processors. Dual microprocessors and other multi-processor architectures also can be used as the processing unit. The system bus may be any of several types of bus structure including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of conventional bus architectures. The system memory includes read only memory (ROM) and random access memory (RAM). A basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within the server computer, such as during start-up, is stored in ROM. [0058]
  • The server computer further includes a hard disk drive, a magnetic disk drive, e.g., to read from or write to a removable disk, and an optical disk drive, e.g., for reading a CD-ROM disk or to read from or write to other optical media. The hard disk drive, magnetic disk drive, and optical disk drive are connected to the system bus by a hard disk drive interface, a magnetic disk drive interface, and an optical drive interface, respectively. The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, etc., for the server computer. Although the description of computer-readable media above refers to a hard disk, a removable magnetic disk and a CD, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, and the like, may also be used in the exemplary operating environment, and further that any such media may contain computer-executable instructions for performing the methods of the present invention. [0059]
  • A number of program modules may be stored in the drives and RAM, including an operating system, one or more application programs, other program modules, and program data. A user may enter commands and information into the server computer through a keyboard and a pointing device, such as a mouse. Other input devices (not shown) may include a microphone, a joystick, a game pad, a satellite dish, a scanner, or the like. These and other input devices are often connected to the processing unit through a serial port interface that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB). A monitor or other type of display device is also connected to the system bus via an interface, such as a video adapter. In addition to the monitor, computers typically include other peripheral output devices (not shown), such as speaker and printers. [0060]
  • The server computer may operate in a networked environment using logical connections to one or more remote computers, such as a remote client computer. The remote computer may be a workstation, a server computer, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the server computer. The logical connections include a local area network (LAN) and a wide area network (WAN). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the internet. [0061]
  • When used in a LAN networking environment, the server computer is connected to the local network through a network interface or adapter. When used in a WAN networking environment, the server computer typically includes a modem, or is connected to a communications server on the LAN, or has other means for establishing communications over the wide area network, such as the internet. The modem, which may be internal or external, is connected to the system bus via the serial port interface. In a networked environment, program modules depicted relative to the server computer, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used. [0062]
  • In accordance with the practices of persons skilled in the art of computer programming, the present invention has been described with reference to acts and symbolic representations of operations that are performed by a computer, such as the server computer, unless otherwise indicated. Such acts and operations are sometimes referred to as being computer-executed. It will be appreciated that the acts and symbolically represented operations include the manipulation by the processing unit of electrical signals representing data bits which causes a resulting transformation or reduction of the electrical signal representation, and the maintenance of data bits at memory locations in the memory system (including the system memory, hard drive, floppy disks, and CD-ROM) to thereby reconfigure or otherwise alter the computer system's operation, as well as other processing of signals. The memory locations where such data bits are maintained are physical locations that have particular electrical, magnetic, or optical properties corresponding to the data bits. [0063]
  • It will be understood that the above description of the present invention is susceptible to various modifications, changes and adaptations, and the same are intended to be comprehended within the meaning and range of equivalents of the appended claims. The presently disclosed embodiments are considered in all respects to be illustrative, and not restrictive. The scope of the invention is indicated by the appended claims, rather than the foregoing description, and all changes that come within the meaning and range of equivalence thereof are intended to be embraced therein. [0064]

Claims (18)

Having described the invention, we claim:
1. A system for operating a wireless ad hoc network, said system comprising:
a plurality of nodes; and
an active packet for implementing a genetically programmed adaptation of one of said plurality of nodes in response to a change of condition of said one node of said plurality of nodes.
2. The system as set forth in claim 1 further including a functional unit injected into said active packet.
3. The system as set forth in claim 2 wherein said functional unit remains inactive until a fitness function is injected into said one node of said plurality of nodes.
4. The system as set forth in claim 3 wherein said fitness function allows functional evolution of said plurality of nodes.
5. The system as set forth in claim 4 wherein said system genetically modifies itself to meet a specific fitness criteria.
6. The system as set forth in claim 5 wherein said active packet performs a mutation operation for generating a single parental program.
7. The system as set forth in claim 6 wherein said single parental program has been probabilistically selected based on fitness.
8. A computer program product for evolutionarily adapting a network, said computer program product comprising:
a first instruction for implementing a genetically programmed adaptation of one of a plurality of nodes in response to a change of condition of the one node of the plurality of nodes, said first instruction being executed by an active packet; and
a second instruction for injecting a functional unit into the active packet.
9. The computer program product as set forth in claim 8 further including a third instruction for probabilistically selecting two parental programs based on fitness.
10. The computer program product as set forth in claim 9 wherein the two parental programs have different sizes and shapes.
11. The computer program product as set forth in claim 8 further including a fourth instruction for continuously evaluating the functional unit.
12. The computer program product as set forth in claim 11 further including a fifth instruction for maintaining a population of structures that evolve according to rules of selection and genetic operators.
13. The computer program product as set forth in claim 12 further including a sixth instruction for classifying functional units within functional unit classes.
14. The computer program product as set forth in claim 13 further including a seventh instruction for enforcing minimal requirements on an execution environment of the network.
15. A method for adapting a network, said method comprising the steps of:
operating a plurality of nodes;
implementing a genetically programmed adaptation of one of the plurality of nodes in response to a change of condition of the one node of the plurality of nodes;
executing said operating step by an active packet;
injecting a functional unit into the active packet; and
probabilistically selecting two parental programs based on fitness.
16. The method as set forth in claim 15 further including the step of publishing the state of each of the plurality of nodes to the other nodes.
17. The method as set forth in claim 16 further including the step of predicting a state of the network.
18. The method as set forth in claim 17 further including the step of querying the network to verify the accuracy of said predicting step.
US10/771,021 2003-02-07 2004-02-03 System for evolutionary adaptation Abandoned US20040156370A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/771,021 US20040156370A1 (en) 2003-02-07 2004-02-03 System for evolutionary adaptation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US44557903P 2003-02-07 2003-02-07
US10/771,021 US20040156370A1 (en) 2003-02-07 2004-02-03 System for evolutionary adaptation

Publications (1)

Publication Number Publication Date
US20040156370A1 true US20040156370A1 (en) 2004-08-12

Family

ID=32829912

Family Applications (5)

Application Number Title Priority Date Filing Date
US10/771,027 Abandoned US20040156388A1 (en) 2003-02-07 2004-02-03 System for maintaining quality of service
US10/770,665 Expired - Fee Related US7409716B2 (en) 2003-02-07 2004-02-03 System for intrusion detection
US10/770,694 Active 2026-01-08 US7366185B2 (en) 2003-02-07 2004-02-03 System for evolutionary service migration
US10/771,026 Abandoned US20040157557A1 (en) 2003-02-07 2004-02-03 System for a dynamic ad-hoc wireless network
US10/771,021 Abandoned US20040156370A1 (en) 2003-02-07 2004-02-03 System for evolutionary adaptation

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US10/771,027 Abandoned US20040156388A1 (en) 2003-02-07 2004-02-03 System for maintaining quality of service
US10/770,665 Expired - Fee Related US7409716B2 (en) 2003-02-07 2004-02-03 System for intrusion detection
US10/770,694 Active 2026-01-08 US7366185B2 (en) 2003-02-07 2004-02-03 System for evolutionary service migration
US10/771,026 Abandoned US20040157557A1 (en) 2003-02-07 2004-02-03 System for a dynamic ad-hoc wireless network

Country Status (1)

Country Link
US (5) US20040156388A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050053094A1 (en) * 2003-09-09 2005-03-10 Harris Corporation Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features
US20070226375A1 (en) * 2006-03-23 2007-09-27 Chu Hsiao-Keng J Plug-in architecture for a network stack in an operating system
US20150003284A1 (en) * 2013-06-28 2015-01-01 Aruba Networks, Inc. System and method for efficient state synchronization among neighboring network devices

Families Citing this family (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4228342B2 (en) * 2002-04-12 2009-02-25 日本電気株式会社 Wireless transmission device for wireless network, route control method, and route control program
US7711847B2 (en) 2002-04-26 2010-05-04 Sony Computer Entertainment America Inc. Managing users in a multi-user network game environment
US20030217135A1 (en) 2002-05-17 2003-11-20 Masayuki Chatani Dynamic player management
US8131802B2 (en) 2007-10-05 2012-03-06 Sony Computer Entertainment America Llc Systems and methods for seamless host migration
US20040156388A1 (en) * 2003-02-07 2004-08-12 Lockheed Martin Corporation System for maintaining quality of service
US7500014B1 (en) * 2003-05-07 2009-03-03 Packeteer, Inc. Network link state mirroring
JP5054377B2 (en) * 2003-06-06 2012-10-24 メッシュネットワークス インコーポレイテッド Systems and methods for achieving fairness and service differentiation in ad hoc networks
KR100621369B1 (en) * 2003-07-14 2006-09-08 삼성전자주식회사 Apparatus and method for routing path setting in sensor network
US7068605B2 (en) * 2003-09-09 2006-06-27 Harris Corporation Mobile ad hoc network (MANET) providing interference reduction features and related methods
DE10344345B3 (en) * 2003-09-24 2005-05-12 Siemens Ag Method for communication in an ad hoc radio communication system
US7519371B2 (en) * 2004-02-09 2009-04-14 Qualcomm Incorporated Multi-hop communications in a wireless network
US20050208949A1 (en) * 2004-02-12 2005-09-22 Chiueh Tzi-Cker Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks
JP3761091B2 (en) * 2004-05-07 2006-03-29 株式会社ソニー・コンピュータエンタテインメント Application execution method, file data download method, file data upload method, communication method, and wireless communication terminal device
US8090837B2 (en) * 2004-05-27 2012-01-03 Hewlett-Packard Development Company, L.P. Communication in multiprocessor using proxy sockets
US20060015596A1 (en) * 2004-07-14 2006-01-19 Dell Products L.P. Method to configure a cluster via automatic address generation
US7848757B2 (en) * 2004-10-29 2010-12-07 Samsung Electronics Co., Ltd. Apparatus and method for extending mobility in a mobile ad hoc network
JP2008519533A (en) * 2004-11-05 2008-06-05 メッシュネットワークス インコーポレイテッド System and method for providing a routing metric with congestion for path selection between nodes in a multi-hopping network
US7912973B2 (en) * 2004-12-03 2011-03-22 Microsoft Corporation Message exchange protocol extension negotiation
US20060159024A1 (en) * 2005-01-18 2006-07-20 Hester Lance E Method and apparatus for responding to node anormalities within an ad-hoc network
US7826373B2 (en) * 2005-01-28 2010-11-02 Honeywell International Inc. Wireless routing systems and methods
EP1715654A1 (en) * 2005-04-22 2006-10-25 Create-Net Communication network performing service functions
US7724717B2 (en) * 2005-07-22 2010-05-25 Sri International Method and apparatus for wireless network security
US8249028B2 (en) * 2005-07-22 2012-08-21 Sri International Method and apparatus for identifying wireless transmitters
US8014404B2 (en) * 2005-09-30 2011-09-06 Motorola Solutions, Inc. Method and system for priority based routing
US8045976B2 (en) 2006-04-04 2011-10-25 Aegis Mobility, Inc. Mobility call management
US20070239871A1 (en) * 2006-04-11 2007-10-11 Mike Kaskie System and method for transitioning to new data services
JP4816323B2 (en) * 2006-08-16 2011-11-16 ソニー株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
CA2679931A1 (en) * 2007-03-02 2008-09-12 Aegis Mobility, Inc. Management of mobile device communication sessions to reduce user distraction
KR20090011481A (en) * 2007-07-26 2009-02-02 삼성전자주식회사 Method for intrusion detecting in a terminal device and apparatus therefor
US8224353B2 (en) 2007-09-20 2012-07-17 Aegis Mobility, Inc. Disseminating targeted location-based content to mobile device users
US8954562B2 (en) * 2007-09-28 2015-02-10 Intel Corporation Entropy-based (self-organizing) stability management
US7996510B2 (en) * 2007-09-28 2011-08-09 Intel Corporation Virtual clustering for scalable network control and management
US8811265B2 (en) * 2007-10-19 2014-08-19 Honeywell International Inc. Ad-hoc secure communication networking based on formation flight technology
US9264126B2 (en) 2007-10-19 2016-02-16 Honeywell International Inc. Method to establish and maintain an aircraft ad-hoc communication network
US8614996B1 (en) * 2007-12-12 2013-12-24 Sprint Spectrum L.P. Predictive personality negotiation during session negotiation
WO2009083036A1 (en) * 2007-12-31 2009-07-09 Ip-Tap Uk Assessing threat to at least one computer network
US9467221B2 (en) * 2008-02-04 2016-10-11 Honeywell International Inc. Use of alternate communication networks to complement an ad-hoc mobile node to mobile node communication network
WO2010025562A1 (en) * 2008-09-05 2010-03-11 Aegis Mobility, Inc. Bypassing enhanced services
US8059615B1 (en) 2008-09-08 2011-11-15 Sprint Spectrum L.P. Selective personality negotiation during session negotiation
US8327443B2 (en) * 2008-10-29 2012-12-04 Lockheed Martin Corporation MDL compress system and method for signature inference and masquerade intrusion detection
US8312542B2 (en) * 2008-10-29 2012-11-13 Lockheed Martin Corporation Network intrusion detection using MDL compress for deep packet inspection
WO2010104927A2 (en) 2009-03-10 2010-09-16 Viasat, Inc. Internet protocol broadcasting
US20100284290A1 (en) * 2009-04-09 2010-11-11 Aegis Mobility, Inc. Context based data mediation
GB0909079D0 (en) * 2009-05-27 2009-07-01 Quantar Llp Assessing threat to at least one computer network
US9615213B2 (en) 2009-07-21 2017-04-04 Katasi Llc Method and system for controlling and modifying driving behaviors
US8787936B2 (en) 2009-07-21 2014-07-22 Katasi Llc Method and system for controlling a mobile communication device in a moving vehicle
US9386447B2 (en) 2009-07-21 2016-07-05 Scott Ferrill Tibbitts Method and system for controlling a mobile communication device
US8245302B2 (en) * 2009-09-15 2012-08-14 Lockheed Martin Corporation Network attack visualization and response through intelligent icons
US8245301B2 (en) * 2009-09-15 2012-08-14 Lockheed Martin Corporation Network intrusion detection visualization
US8138918B2 (en) * 2009-09-17 2012-03-20 Raytheon Company Intrusion detection and tracking system
US20110158111A1 (en) * 2009-12-28 2011-06-30 Alcatel-Lucent Canada Inc. Bulk service provisioning on live network
US9762605B2 (en) * 2011-12-22 2017-09-12 Phillip King-Wilson Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer network
US8533319B2 (en) 2010-06-02 2013-09-10 Lockheed Martin Corporation Methods and systems for prioritizing network assets
US8836344B2 (en) 2010-07-27 2014-09-16 Raytheon Company Intrusion detection and tracking system
US8621629B2 (en) 2010-08-31 2013-12-31 General Electric Company System, method, and computer software code for detecting a computer network intrusion in an infrastructure element of a high value target
US9288224B2 (en) 2010-09-01 2016-03-15 Quantar Solutions Limited Assessing threat to at least one computer network
US8874763B2 (en) * 2010-11-05 2014-10-28 At&T Intellectual Property I, L.P. Methods, devices and computer program products for actionable alerting of malevolent network addresses based on generalized traffic anomaly analysis of IP address aggregates
CN103477608A (en) 2011-04-13 2013-12-25 瑞萨移动公司 Sensor network information collection via mobile gateway
JP5977818B2 (en) * 2011-04-25 2016-08-24 コリア ユニバーシティ リサーチ アンド ビジネス ファウンデーション Apparatus and method for controlling backbone network for sensor network
US9106689B2 (en) 2011-05-06 2015-08-11 Lockheed Martin Corporation Intrusion detection using MDL clustering
US8490175B2 (en) * 2011-12-06 2013-07-16 Telcordia Technologies, Inc. Security method for mobile ad hoc networks with efficient flooding mechanism using layer independent passive clustering (LIPC)
CN102448139B (en) * 2011-12-28 2014-08-06 南昌大学 Hierarchical routing method for wireless sensor network
EP2883414B1 (en) * 2012-08-10 2018-11-28 Telefonaktiebolaget LM Ericsson (publ) Self organizing network event reporting
US9245116B2 (en) 2013-03-21 2016-01-26 General Electric Company Systems and methods for remote monitoring, security, diagnostics, and prognostics
US9282008B2 (en) 2013-06-11 2016-03-08 General Electric Company Systems and methods for monitoring system performance and availability
US9667528B2 (en) * 2014-03-31 2017-05-30 Vmware, Inc. Fast lookup and update of current hop limit
US20160044281A1 (en) * 2014-08-07 2016-02-11 Smart Digital LLC Portable Surveillance Device
US9858284B2 (en) * 2015-04-21 2018-01-02 International Business Machines Corporation Crowd sourced data sampling at the crowd
US9699301B1 (en) 2015-05-31 2017-07-04 Emma Michaela Siritzky Methods, devices and systems supporting driving and studying without distraction
WO2017111915A1 (en) 2015-12-21 2017-06-29 Hewlett Packard Enterprise Development Lp Identifying signatures for data sets
WO2017111912A1 (en) * 2015-12-21 2017-06-29 Hewlett Packard Enterprise Development Lp Identifying a signature for a data set
CA3107919A1 (en) 2018-07-27 2020-01-30 GoTenna, Inc. Vinetm: zero-control routing using data packet inspection for wireless mesh networks
US10992689B2 (en) 2018-09-18 2021-04-27 The Boeing Company Systems and methods for relating network intrusions to passenger-owned devices
US10765952B2 (en) 2018-09-21 2020-09-08 Sony Interactive Entertainment LLC System-level multiplayer matchmaking
US10695671B2 (en) 2018-09-28 2020-06-30 Sony Interactive Entertainment LLC Establishing and managing multiplayer sessions
CN110062209B (en) * 2019-04-26 2020-09-01 哈尔滨工业大学 Embedded multi-hop real-time video transmission method and system based on OKMX6Q
US11889392B2 (en) 2019-06-14 2024-01-30 The Boeing Company Aircraft network cybersecurity apparatus and methods
CN110572451B (en) * 2019-09-04 2021-04-30 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
US11811641B1 (en) * 2020-03-20 2023-11-07 Juniper Networks, Inc. Secure network topology

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4780821A (en) * 1986-07-29 1988-10-25 International Business Machines Corp. Method for multiple programs management within a network having a server computer and a plurality of remote computers
US5623495A (en) * 1995-06-15 1997-04-22 Lucent Technologies Inc. Portable base station architecture for an AD-HOC ATM lan
US5717689A (en) * 1995-10-10 1998-02-10 Lucent Technologies Inc. Data link layer protocol for transport of ATM cells over a wireless link
US5930780A (en) * 1996-08-22 1999-07-27 International Business Machines Corp. Distributed genetic programming
US5943322A (en) * 1996-04-24 1999-08-24 Itt Defense, Inc. Communications method for a code division multiple access system without a base station
US5970487A (en) * 1996-11-19 1999-10-19 Mitsubishi Denki Kabushiki Kaisha Genetic algorithm machine and its production method, and method for executing a genetic algorithm
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
US6047319A (en) * 1994-03-15 2000-04-04 Digi International Inc. Network terminal server with full API implementation
US6122759A (en) * 1995-10-10 2000-09-19 Lucent Technologies Inc. Method and apparatus for restoration of an ATM network
US6195697B1 (en) * 1999-06-02 2001-02-27 Ac Properties B.V. System, method and article of manufacture for providing a customer interface in a hybrid network
US6266577B1 (en) * 1998-07-13 2001-07-24 Gte Internetworking Incorporated System for dynamically reconfigure wireless robot network
US6304556B1 (en) * 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US6501995B1 (en) * 1999-06-30 2002-12-31 The Foxboro Company Process control system and method with improved distribution, installation and validation of components
US6529515B1 (en) * 1999-09-30 2003-03-04 Lucent Technologies, Inc. Method and apparatus for efficient network management using an active network mechanism
US6675155B2 (en) * 1997-10-24 2004-01-06 Fujitsu Limited Layout method arranging nodes corresponding to LSI elements having a connecting relationship
US6754188B1 (en) * 2001-09-28 2004-06-22 Meshnetworks, Inc. System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content
US20040156333A1 (en) * 2003-02-07 2004-08-12 General Electric Company System for evolutionary service migration
US6904335B2 (en) * 2002-08-21 2005-06-07 Neal Solomon System, method and apparatus for organizing groups of self-configurable mobile robotic agents in a multi-robotic system
US6917811B2 (en) * 2001-12-27 2005-07-12 Kt Corporation Method for dynamically assigning channel in real time based on genetic algorithm
US7068600B2 (en) * 2002-04-29 2006-06-27 Harris Corporation Traffic policing in a mobile ad hoc network
US7177295B1 (en) * 2002-03-08 2007-02-13 Scientific Research Corporation Wireless routing protocol for ad-hoc networks

Family Cites Families (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5517618A (en) * 1992-02-10 1996-05-14 Matsushita Electric Industrial Co., Ltd. Mobile migration communications control device
US5412654A (en) * 1994-01-10 1995-05-02 International Business Machines Corporation Highly dynamic destination-sequenced destination vector routing for mobile computers
GB2299729B (en) * 1995-04-01 1999-11-17 Northern Telecom Ltd Traffic routing in a telecommunications network
EP0861546B1 (en) 1995-11-16 2004-04-07 Loran Network Systems, L.L.C. Method of determining the topology of a network of objects
US6046988A (en) 1995-11-16 2000-04-04 Loran Network Systems Llc Method of determining the topology of a network of objects
US6088452A (en) 1996-03-07 2000-07-11 Northern Telecom Limited Encoding technique for software and hardware
JP3097581B2 (en) * 1996-12-27 2000-10-10 日本電気株式会社 Ad-hoc local area network configuration method, communication method and terminal
US6130892A (en) * 1997-03-12 2000-10-10 Nomadix, Inc. Nomadic translator or router
US5987024A (en) * 1997-05-09 1999-11-16 Motorola, Inc. Self synchronizing network protocol
JP3141820B2 (en) * 1997-07-18 2001-03-07 日本電気株式会社 Ad hoc local area network
DE69724947T2 (en) 1997-07-31 2004-05-19 Siemens Ag Computer system and method for backing up a file
US6324654B1 (en) 1998-03-30 2001-11-27 Legato Systems, Inc. Computer network remote data mirroring system
US6130881A (en) * 1998-04-20 2000-10-10 Sarnoff Corporation Traffic routing in small wireless data networks
US6321338B1 (en) 1998-11-09 2001-11-20 Sri International Network surveillance
US6104712A (en) * 1999-02-22 2000-08-15 Robert; Bruno G. Wireless communication network including plural migratory access nodes
US6446200B1 (en) 1999-03-25 2002-09-03 Nortel Networks Limited Service management
US6754699B2 (en) 2000-07-19 2004-06-22 Speedera Networks, Inc. Content delivery and global traffic management network system
US6535498B1 (en) * 1999-12-06 2003-03-18 Telefonaktiebolaget Lm Ericsson (Publ) Route updating in ad-hoc networks
US20020029287A1 (en) * 2000-02-02 2002-03-07 Yechiam Yemini Method and apparatus for dynamically addressing a circuits based network
AU2001253613A1 (en) 2000-04-17 2001-10-30 Circadence Corporation System and method for shifting functionality between multiple web servers
US20020099816A1 (en) 2000-04-20 2002-07-25 Quarterman John S. Internet performance system
US7000015B2 (en) * 2000-04-24 2006-02-14 Microsoft Corporation System and methods for providing physical location information and a location method used in discovering the physical location information to an application on a computing device
FI110736B (en) * 2000-08-01 2003-03-14 Nokia Corp Data Transfer Method, Subscriber Terminal and GPRS / EDGE Radio Access Network
US7398317B2 (en) 2000-09-07 2008-07-08 Mazu Networks, Inc. Thwarting connection-based denial of service attacks
US7124440B2 (en) 2000-09-07 2006-10-17 Mazu Networks, Inc. Monitoring network traffic denial of service attacks
US7702806B2 (en) 2000-09-07 2010-04-20 Riverbed Technology, Inc. Statistics collection for network traffic
US7278159B2 (en) 2000-09-07 2007-10-02 Mazu Networks, Inc. Coordinated thwarting of denial of service attacks
US6894991B2 (en) * 2000-11-30 2005-05-17 Verizon Laboratories Inc. Integrated method for performing scheduling, routing and access control in a computer network
CA2327211A1 (en) 2000-12-01 2002-06-01 Nortel Networks Limited Management of log archival and reporting for data network security systems
US7937470B2 (en) 2000-12-21 2011-05-03 Oracle International Corp. Methods of determining communications protocol latency
US7155518B2 (en) * 2001-01-08 2006-12-26 Interactive People Unplugged Ab Extranet workgroup formation across multiple mobile virtual private networks
WO2002057917A2 (en) * 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
US7197565B2 (en) * 2001-01-22 2007-03-27 Sun Microsystems, Inc. System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection
US7165107B2 (en) * 2001-01-22 2007-01-16 Sun Microsystems, Inc. System and method for dynamic, transparent migration of services
US20020122410A1 (en) * 2001-02-13 2002-09-05 Cybiko Inc. Method of wireless data exchange amongst devices of limited range
EP1386432A4 (en) * 2001-03-21 2009-07-15 John A Stine An access and routing protocol for ad hoc networks using synchronous collision resolution and node state dissemination
US7035937B2 (en) * 2001-04-25 2006-04-25 Cornell Research Foundation, Inc. Independent-tree ad hoc multicast routing
US7124173B2 (en) 2001-04-30 2006-10-17 Moriarty Kathleen M Method and apparatus for intercepting performance metric packets for improved security and intrusion detection
US20020198994A1 (en) * 2001-05-15 2002-12-26 Charles Patton Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US20020188656A1 (en) * 2001-05-15 2002-12-12 Charles Patton Combining specialized, spatially distinguished, point to point communications with other wireless networking communications to provide networking configuration in classroom-like settings
US7116661B2 (en) * 2001-05-15 2006-10-03 Sri International Combining multi-hop and multicast wireless networking in classroom-like settings
US7624444B2 (en) 2001-06-13 2009-11-24 Mcafee, Inc. Method and apparatus for detecting intrusions on a computer system
AU2002314824A1 (en) * 2001-06-14 2003-01-02 Meshnetworks, Inc. Routing algorithms in a mobile ad-hoc network
US7743126B2 (en) * 2001-06-28 2010-06-22 Hewlett-Packard Development Company, L.P. Migrating recovery modules in a distributed computing environment
US7161926B2 (en) * 2001-07-03 2007-01-09 Sensoria Corporation Low-latency multi-hop ad hoc wireless network
US20030041042A1 (en) * 2001-08-22 2003-02-27 Insyst Ltd Method and apparatus for knowledge-driven data mining used for predictions
WO2003028245A1 (en) * 2001-09-25 2003-04-03 Meshnetworks, Inc. A system and method employing algorithms and protocols for optimizing carrier sense multiple access (csma) protocols in wireless networks
US7451205B2 (en) * 2001-10-01 2008-11-11 Hewlett-Packard Development Company, L.P. Multimedia stream pre-fetching and redistribution in servers to accommodate mobile clients
US6870846B2 (en) * 2002-04-29 2005-03-22 Harris Corporation Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using dynamic source routing (DSR)
US6954435B2 (en) * 2002-04-29 2005-10-11 Harris Corporation Determining quality of service (QoS) routing for mobile ad hoc networks
US6961310B2 (en) * 2002-08-08 2005-11-01 Joseph Bibb Cain Multiple path reactive routing in a mobile ad hoc network

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4780821A (en) * 1986-07-29 1988-10-25 International Business Machines Corp. Method for multiple programs management within a network having a server computer and a plurality of remote computers
US6047319A (en) * 1994-03-15 2000-04-04 Digi International Inc. Network terminal server with full API implementation
US5623495A (en) * 1995-06-15 1997-04-22 Lucent Technologies Inc. Portable base station architecture for an AD-HOC ATM lan
US5717689A (en) * 1995-10-10 1998-02-10 Lucent Technologies Inc. Data link layer protocol for transport of ATM cells over a wireless link
US6122759A (en) * 1995-10-10 2000-09-19 Lucent Technologies Inc. Method and apparatus for restoration of an ATM network
US5943322A (en) * 1996-04-24 1999-08-24 Itt Defense, Inc. Communications method for a code division multiple access system without a base station
US5930780A (en) * 1996-08-22 1999-07-27 International Business Machines Corp. Distributed genetic programming
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
US5970487A (en) * 1996-11-19 1999-10-19 Mitsubishi Denki Kabushiki Kaisha Genetic algorithm machine and its production method, and method for executing a genetic algorithm
US6675155B2 (en) * 1997-10-24 2004-01-06 Fujitsu Limited Layout method arranging nodes corresponding to LSI elements having a connecting relationship
US6266577B1 (en) * 1998-07-13 2001-07-24 Gte Internetworking Incorporated System for dynamically reconfigure wireless robot network
US6304556B1 (en) * 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US6195697B1 (en) * 1999-06-02 2001-02-27 Ac Properties B.V. System, method and article of manufacture for providing a customer interface in a hybrid network
US6501995B1 (en) * 1999-06-30 2002-12-31 The Foxboro Company Process control system and method with improved distribution, installation and validation of components
US6529515B1 (en) * 1999-09-30 2003-03-04 Lucent Technologies, Inc. Method and apparatus for efficient network management using an active network mechanism
US6754188B1 (en) * 2001-09-28 2004-06-22 Meshnetworks, Inc. System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content
US6917811B2 (en) * 2001-12-27 2005-07-12 Kt Corporation Method for dynamically assigning channel in real time based on genetic algorithm
US7177295B1 (en) * 2002-03-08 2007-02-13 Scientific Research Corporation Wireless routing protocol for ad-hoc networks
US7068600B2 (en) * 2002-04-29 2006-06-27 Harris Corporation Traffic policing in a mobile ad hoc network
US6904335B2 (en) * 2002-08-21 2005-06-07 Neal Solomon System, method and apparatus for organizing groups of self-configurable mobile robotic agents in a multi-robotic system
US20040156333A1 (en) * 2003-02-07 2004-08-12 General Electric Company System for evolutionary service migration

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050053094A1 (en) * 2003-09-09 2005-03-10 Harris Corporation Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features
US7394826B2 (en) * 2003-09-09 2008-07-01 Harris Corporation Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features
US20070226375A1 (en) * 2006-03-23 2007-09-27 Chu Hsiao-Keng J Plug-in architecture for a network stack in an operating system
US20150003284A1 (en) * 2013-06-28 2015-01-01 Aruba Networks, Inc. System and method for efficient state synchronization among neighboring network devices
US9351130B2 (en) * 2013-06-28 2016-05-24 Aruba Networks, Inc. System and method for efficient state synchronization among neighboring network devices

Also Published As

Publication number Publication date
US20040156388A1 (en) 2004-08-12
US20040156333A1 (en) 2004-08-12
US7366185B2 (en) 2008-04-29
US20040157556A1 (en) 2004-08-12
US7409716B2 (en) 2008-08-05
US20040157557A1 (en) 2004-08-12

Similar Documents

Publication Publication Date Title
US20040156370A1 (en) System for evolutionary adaptation
Huebscher et al. A survey of autonomic computing—degrees, models, and applications
US20120182865A1 (en) Systems, Methods, and Apparatuses for Managing the Flow of Traffic in Data Networks
Ghosh et al. A cognitive routing framework for reliable communication in IoT for industry 5.0
Lu et al. Distributed parallel algorithms for online virtual network embedding applications
Koyama et al. A GA-based multi-purpose optimization algorithm for QoS routing
Maheshwari et al. Analysis of congestion control mechanism for iot
Nguyen et al. Toward adaptive joint node and link mapping algorithms for embedding virtual networks: A conciliation strategy
Li et al. A EA-and ACA-based QoS multicast routing algorithm with multiple constraints for ad hoc networks
Logesh Babu et al. Fuzzy rule selection using hybrid artificial bee colony with 2-opt algorithm for MANET
Al-Hamid et al. Vehicular intelligence: Towards vehicular network digital-twin
Jiang et al. Minimum disruption service composition and recovery in mobile ad hoc networks
Maniscalco et al. Binary and m-ary encoding in applications of tree-based genetic algorithms for QoS routing
Chetty et al. Virtual network function embedding under nodal outage using reinforcement learning
Przewoźniczek Subpopulation initialization driven by linkage learning for dealing with the Long-Way-To-Stuck effect
Dao et al. An energy-efficient scheme for maximizing data aggregation tree lifetime in wireless sensor network
Varadarajan et al. Reinforcing reachable routes
Maniu et al. Exploring the possibilities of a self-regulating SDN controller
Xiong et al. An optimized deployment mechanism for virtual middleboxes in NFV-and SDN-enabling network
El Rajab et al. Zero-touch networks: Towards next-generation network automation
Wu Energy-efficient routing protocols in heterogeneous wireless sensor networks
Riggio et al. A Knowledge Plane for Wireless Mesh Networks?
Zhou et al. PQROM: To optimize software defined network QoS-aware routing with proximal policy optimization
Otari et al. A trust management model based on NSGA-II in mobile grid system
Vidyadhar et al. Evaluation of agent-network environment mapping on Open-AI Gym for Q-routing algorithm

Legal Events

Date Code Title Description
AS Assignment

Owner name: LOCKHEED MARTIN CORPORATION, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL ELECTRIC COMPANY;REEL/FRAME:014966/0849

Effective date: 20040128

Owner name: GENERAL ELECTRIC COMPANY, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BUSH, STEPHEN F.;REEL/FRAME:014968/0081

Effective date: 20040122

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION