Autonomous air taxi separation system and method

12211387 ยท 2025-01-28

Assignee

Inventors

Cpc classification

International classification

Abstract

A system for urban air mobility monitors flight separation for compliance with a safe separation distance. A reference formation airspace is established for a reference air taxi based on minimum longitudinal, lateral and vertical parameters. When penetration of the reference formation airspace is detected, a penetration airspace is established. A centroid of the penetration airspace is determined and a target separation to the centroid is supplied to the air taxi to reestablish safe separation. The extent of separation is also safely contained by the presence of virtual air taxis whose positions on the periphery of the penetrated airspace serve to limit potential penetration of surrounding air taxi air spaces.

Claims

1. A method for managing air taxi flight separation of a reference air taxi during flight for compliance with a predetermined separation distance that includes minimum longitudinal, lateral and vertical separation parameters, the method comprising: receiving a current flight vector for the reference air taxi, receiving position data of the reference air taxi, constructing a reference formation airspace in the form of an ellipsoid, an ovoid, or other non-spheroidal shape with dimensions based upon the minimum longitudinal, lateral, and vertical separation parameters and the position of the reference air taxi as the centroid of the reference formation airspace, receiving position data of at least one other air taxi that has penetrated into the reference formation airspace, constructing a penetration airspace representing a modification of the reference formation airspace deformed by at least the position data of the at least one other air taxi, determining a centroid of the penetration airspace, determining a target separation vector for the reference air taxi representing a direction to the centroid of the penetration airspace, and determining a new flight vector for the reference air taxi based upon the current flight vector combined with the target separation vector, sending to the reference air taxi the new flight vector.

2. The method according to claim 1 further comprising the steps of: defining a plurality of virtual positions spaced about the surface of the reference formation airspace, and wherein the penetration airspace is represented by the plurality of virtual positions and the position of the at least one other air taxi.

3. The method of claim 2 wherein the plurality of virtual positions comprises a set of 6 positions.

4. The method of claim 1 further comprising the steps of: defining a plurality of virtual positions spaced about the surfaces of the reference formation airspace, and wherein the penetration airspace is represented by the plurality of virtual positions and one of the plurality of virtual positions is substituted with the position of the at least one other air taxi.

5. The method of claim 4 wherein the plurality of virtual positions comprises a set of 6 positions.

6. The method according to claim 1 where the target separation vector for the reference air taxi is determined based at least in part on limiting emissions of the reference air taxi.

7. The method according to claim 1 where the target separation vector for the reference air taxi is determined based at least in part on optimizing fuel efficiency of the reference air taxi.

Description

DRAWINGS

(1) The disclosed embodiments may be understood from the following detailed description taken in conjunction with the accompanying drawings of which:

(2) FIG. 1 is a table outlining the key attributes and core air traffic management (ATM) capabilities in the UAM vehicle and UAM air space management domains;

(3) FIG. 2 illustrates an array of surrounding air taxis, those immediately relevant to the maintenance of minimum separation standards longitudinally, laterally, and vertically with respect to the center reference air taxi;

(4) FIG. 3 shows the same array of separation-relevant surrounding air taxis as in FIG. 2, compressed into their minimum separation space, thus creating the reference formation airspace of virtual air taxis surrounding the center air taxi;

(5) FIG. 4 shows how six air taxis combine to form a bubble with the same coverage shown in FIG. 3, but here shown in three dimensions;

(6) In FIG. 5A two diameters are drawn from the perimeter of the bubble, the intersection of which is at the centroid of the circle, which is also the centroid of the earlier bubble;

(7) In FIG. 5B, two air taxis are shown having penetrated the reference formation airspace, violating the safe spacing represented by the bubble, and a location identifying the new centroid of the now deformed airspace;

(8) FIG. 6A illustrates in two dimensions the standard reference formation airspace in which each of the four virtual air taxis is on station at the minimum safe airspace position relative to the center reference air taxi;

(9) FIG. 6B shows the same airspace as FIG. 6A but with two of the left side air taxis penetrating into the reference formation airspace, and the center air taxi taking action to move to a new centroid position based on the shape of the penetrated airspace;

(10) FIG. 7A illustrates the reference formation airspaces of two air taxis that are at a safe separation distance;

(11) FIG. 7B illustrates the same reference formation airspaces of FIG. 7A but where each airspace has been violated, turning them into penetration airspaces with new centroids and complementary movements of each air taxi in independently moving to its own centroid position, and contained by the surrounding virtual air taxis;

(12) FIG. 8 illustrates, according to an embodiment, instrument panels displaying a penetrating air taxi and a central reference air taxi and the flight path of each air taxi being vectored to its respective centroid to restore separation;

(13) FIG. 9 is a process flow diagram illustrating the steps performed by an autonomous separation unit (ASU) according to an embodiment;

(14) FIG. 10 illustrates, according to an embodiment, a system block diagram and flow chart of an autonomous separation unit installed in an air taxi in relation to the flight management system, display units, and flight director systems;

(15) FIG. 11 is a process flow diagram illustrating the steps performed by an autonomous separation unit deployed in an air traffic control region according to an embodiment.

DETAILED DESCRIPTION

(16) Turning to FIG. 1, a table outlining the key attributes 101 and core air traffic management (ATM) capabilities 102 of UAM vehicles 103 and UAM airspace 104 is shown. The major characteristics, vehicle types, and attributes down to navigation and routing are shown in the upper left of the table pertaining to UAM vehicles, ranging from piloted and autonomous to drones. Air Traffic Management (ATM) is accomplished by a combination of capabilities across both vehicle and airspace domains. Customarily, vehicle contribution to safe separation is a combination of simple communications, regulated visibility, and sensors capable of apprehending surrounding air traffic. Eventually, onboard capabilities such as radar and distance measuring equipment (DME) similar to that found in autonomous land vehicles might be deployed as traffic densities increase. Presently, however, and into the foreseeable future, airspace management methods will prevail as the arbiter of safe separation in all circumstances other than imminent collision, for which onboard detection and avoidance (DAA) equipment provides the key vehicle capability.

(17) By contrast, the present disclosure describes a technology enabling individual air taxis and similar UAM vehicles to create their own (autonomous) safe separation. As noted earlier, autonomous safe separation requires three conditions be met: (a) detecting when an air taxi has penetrated the airspace of a reference or center air taxi; (b) independently generating mutually compatible or sympathetic routings to restore safe separation; and (c) automatically containing the direction and range of separation restoral so that the potential for moving into the path of another air taxi is forestalled. With these conditions met, autonomous safe separation is a vehicle-borne air traffic management capability fully compatible with the airspace-based air traffic management.

(18) FIG. 2 illustrates the positions of the minimum separation circumferences 201 of four air taxis in relation to the center reference air taxi 202 circumference 203. This is the minimum number of air taxis that can surround the center air taxi without directly intersecting each other's separation spheres or bubbles. Note, however, that since each circumference subtends the safe separation around its own air taxi, each air taxi is located twice as far from minimum separation as needed. The air taxis surrounding the center reference taxi are even further from each other.

(19) FIG. 3 adopts the perspective of the center air taxi and collapses the distance to all four air taxis 302 so each is exactly at the edge of the safe separation distance of the center reference air taxi's 301 perimeter 303. Since the actual safe separation spacing in an embodiment may be represented by a sphere, an air taxi at any position on the perimeter of such a sphere 303S is at the minimum safe separation distance. The reference formation airspace 303S of the center reference air taxi 301 is the minimum separation airspace, and is subtended by the positions of all the air taxis 302 located around the perimeter of the airspace 303. This formation airspace 303S around the center reference air taxi 301 is a mathematical construct with an interior space and a specifically defined outer surface or perimeter 303 populated here by the virtual air taxis 302. The reference formation airspace 303S moves continuously as the center reference air taxi 301 moves. Computationally, the location of the perimeter of the reference formation airspace 303 is known, and therefore its penetration by any other air taxi can also be determined if that air taxi is detected. Similarly, ascertaining the location (through calculation or sensing) the position of the penetrating air taxi also enables computation of the depth, velocity, and direction of penetration with respect to the reference formation airspace 303S.

(20) FIG. 4 illustrates, according to an embodiment, the structure of the airspace when viewed in three dimensions. Whether seen from the perspective of axis 401 or 402, the view is identical. Where the axes intersect at the center reference air taxi 403, the view is of three identical spheres extending into the page. The center reference air taxi is located at the center 403.

(21) FIG. 5A depicts the equilibrium airspace at 503A. The center of the air taxi space, is known as the centroid of the reference formation airspace, is calculated as the mean position or center of gravity of a geometric shape having diameters of 502A and perimeter 501A. The reference formation airspace of an air taxi located at the center 503A would not be penetrated.

(22) FIG. 5B illustrates, according to an embodiment, the concept of the centroid in the context of a reference formation airspace penetrated by two real air taxis. For purposes of illustration in FIG. 5B and following, virtual air taxis are illustrated with a dashed circle, and real air taxis, such as penetrating air taxis, are represented with a solid circle. As illustrated, the original reference formation airspace 501B has been modified and deformed by the air taxis that have penetrated the reference formation airspace. According to an embodiment, the reference formation airspace is modified by replacing virtual air taxi positions with penetrating air taxi positions to form the penetration airspace. In an alternative embodiment, the reference formation airspace may be deformed by utilizing the position of a penetrating air taxis as an additional point, in addition to the positions of the virtual air taxis, to form the penetration airspace. In the illustrated embodiment in FIG. 5B, two virtual air taxis have been replaced by two penetrating air taxis to form the penetrated airspace 501C. Even such a completely deformed penetration airspace still has a centroid 503B whose location relative to all the vertices of the penetration airspace 501C can be computed as the centroid of the geometric shape defined by the two penetrating air taxis and the two virtual air taxis.

(23) FIGS. 6A and 6B illustrate, according to an embodiment, modification of a reference formation airspace resulting in creation of a new penetrated airspace as the basis for determining a new centroid position and a target separation vector to which the reference air taxi should move to reestablish safe separation as closely as feasible. Reference formation airspace 601A contains the set of virtual air taxis about the perimeter of the reference formation airspace constructed as a circle (in this two-dimensional illustration) with dimensions based on target safe separation parameters of a radius of the circle being the minimum separation distance. In addition to the two virtual air taxis, air taxis 602A and 603A represent real air taxis also at the boundary of the reference formation airspace 601A.

(24) FIG. 6B illustrates the arrangement where the two real air taxis 602B and 603B have penetrated the reference formation airspace 601A, thus deforming the reference formation airspace 601A, and leading to the creation of new penetrated airspace 601B consisting of the virtual air taxis from the reference formation airspace 601A but with two of the closest virtual air taxis replaced with the two penetrating air taxis 602B and 603B. Thus, penetrating air taxis 602B and 603B are shown defining the new penetration airspace 601B with its newly-calculated centroid at 604. To start reestablishing separation, a target separation vector 606 is calculated based upon the current position of the air taxi 605 to the position of the centroid 604. The target separation vector 606 is supplied to air taxi 605 so it can navigate along the target separation vector 606 toward the penetrated airspace centroid 604 thereby regaining or approaching safe separation. Centroid position 604 will always represent a position that moves away from the location of any penetrating air taxis, while also being moderated by the remaining virtual air taxi positions. The nature of the centroid computation is to restore the mean balance across all vertices of the penetration airspace, and this tendency is toward safe separation, because this movement is away from proximity, and will be complemented by other air taxis equipped with ASU technology that will also be moving in complementary directions away from air taxi 605 as will be explained in connection with FIG. 7. This functional action of moving away in complementary directions without interaction is referred to as sympathetic routing.

(25) Turning to FIG. 7A, the experience of one of the penetrating air taxis in the prior example will now be described. Two air taxis 702A and 704A equipped with autonomous separation unit capability are shown under normal conditions, where neither air taxi has yet penetrated the airspace of the other. Each air taxi is flying within its reference formation airspace, namely, reference formation airspace 701A for air taxi 702A and reference formation airspace 703A for air taxi 704A, both positioned on the outer perimeter of the minimum required separation airspace. The reference formation airspaces overlap as noted in FIG. 4, and in an embodiment, satellite GPS data or sensors are informing each air taxi of the presence of the other. Again, for purposes of notation, each real air taxi 702A and 704A is illustrated with solid circles, while the virtual air taxis framing the reference formation airspaces are illustrated with dashed circles. A penetration occurs when, in FIG. 7B, air taxi 704A has shifted to position 704B, possibly due to wind shear driving the air taxi off course. This transition to penetration deforms the perimeters of the reference formation airspaces of both air taxis, since separation has been penetrated for both, thus generating new penetrated airspaces 701B and 703B now containing a combination of virtual air taxis belonging to the original reference formation airspace at a safe separation distance, and an actual penetrating air taxi. In the case of air taxi 702B, penetrating air taxi 704B defines a point of its penetration airspace 701B. In the case of air taxi 704B, one penetrating air taxi 702B is involved in generating its penetration airspace 703B. Irrespective of which air taxi is at fault for causing the penetration, both are at an unsafe distance, both original reference formation airspaces have been penetrated, and the ideal response is for each to take sympathetic action to restore safe separation.

(26) The ASU system in air taxi 704B calculates a new centroid based on its penetration airspace 703B, generating the new centroid position 704CENT among all points of the now-changed airspace. Similarly, air taxi 702B recalculates its own new centroid 702CENT based on the deformations imposed by air taxi 704B. The centroid 704CENT is located deeper into its penetrated airspace and further from its current position because the rest of the original perimeter of the airspace remains intact and serves to contain the continued movement away from the incursion. This functional action contains further separation by imposing virtual boundaries. This third and final capability establishes autonomous separation: penetration detection, sympathetic routing, and now, contained separation.

(27) FIG. 8 illustrates, according to an embodiment, the visual displays of two air taxis illustrating the Autonomous Separation Unit trajectory information. The display 801A shows the situation as reflected in the penetrated airspace 703B, with air taxi call sign U972. The display for penetrated airspace 701B is shown in display 801B and is identified as belonging to air taxi A231. Each display shows both air taxis, since each is inside the reference formation airspace of the other. UA972's display 801A is at the left bottom. In this display, air taxi A231 appears as the bold dash circle air taxi 803A, including its identifying mark, current speed, and altitude. The hatched arrow 802B shows that A231 803A is the air taxi whose display is to the right. Similarly, A231's display 801B is shown at the right bottom, and penetrating air taxi U972 803B is illustrated circled in bold dashed lines in the upper left quadrant of the radial display with its identifying call sign, speed and altitude. The hatched line 802A shows that air taxi U972 803B is the air taxi whose display is to the left. In this situational context, and based on the background computation of the respective centroid locations within each penetrated airspace 701B and 703B, each display shows recommended target separation (SEP) vectors 804A and 804B that each air taxi should pursue, indicating the system-determined direction and speed autonomously provided by each air taxi's ASU system. In display 801A, the vector arrow 804A shows the system-determined target vector from air taxi A231. Similarly, separation vector 804B in display 801B identifies the target separation vector proposed for air taxi A231 as it seeks separation from air taxi U972. Each separation vector leads to the respective centroid destination generated autonomously by each system relative to its own penetrated airspace. Accordingly, both separation vectors move sympathetically away from each other to reestablish separation; all without any communication or central control.

(28) In an embodiment, a target separation vector may be combined with a current flight vector of an air taxi, to guide the air taxi towards the centroid as it continues its flight.

(29) Any number of penetrations can be addressed, resulting only in the potential tightening of the airspace in which the centroid location is computed. Further, while the virtual air taxis are used to frame the reference formation airspace and typically at least a portion of a penetration airspace, these virtual air taxis are not real, and thus offer no risk of real danger even as the centroid draws closer. In fact, the framing virtual air taxis establish the closest location of potentially penetrating real air taxis and circumscribe the range of movement of air taxis as the restoration of safe separation is underway.

(30) FIG. 9 illustrates, according to an embodiment, the process flow performed by the autonomous separation unit installed on an air taxi. The four boxes to the left highlight the major stages of the process flow: in stage 9-1, the system establishes the reference formation airspace and monitors for penetrations based on GPS and related positioning data; in stage 9-2 penetration is detected and the penetrated airspace model is generated; in stage 9-3 the penetration airspace centroid position is computed and a target separation vector to that location is plotted; and in stage 9-4 the target separation vector is either displayed or supplied to an autopilot system of the air taxi to assume a heading according to the target separation vector.

(31) In step 901, operation of the ASU is initiated by ensuring the air taxi ID is entered, the transponder is set, GPS and/or sensor signals can be received, and that in an embodiment both broadcast and reception to and from ATC and other air taxis are enabled. In modern air taxis a flight management system is activated in step 902, and can be set to manual 903 or autopilot 904 operation of the air taxis. In step 905, the system is configured to establish the reference formation airspace that creates a sphere around the air taxi at the safe distance longitudinally, laterally, and vertically. In addition, in an embodiment, risk triggers 907 can be set to govern how far away a potentially-penetrating air taxis should be before being tracked by the system and considered a threat, and when the proximity of an air taxis is such that the separation system is suspended and the Detection and Avoidance (DAA) system 911, takes over.

(32) Once airborne, in step 906 the ASU system monitors broadcast or sensor data from GPS and other air taxi data, and in step 907 assesses the degree to which any air taxi may pose a trigger-level risk. If the threat from an approaching air taxi is deemed a sufficient risk, in step 908 the system will generate a penetration airspace. In an embodiment, a set of virtual air taxis spaced about the perimeter of the penetration airspace may be defined, and virtual air taxis may be replaced or substituted with the data from the nearest-risk, real approaching air taxi(s). In step 909, the approaching air taxi is evaluated to determine if it has penetrated the reference formation airspace of the air taxis. If the approaching air taxi does not breach the separation distances, the system returns to monitoring for vicinity air taxis in step 906. On the other hand, in step 909, if separation is violated and the approaching air taxi has penetrated the reference formation airspace, then in step 910 the incoming distance is checked to see if it is so close and closing so quickly that the system automatically hands off to DAA in step 911. However, if in step 910 DAA is not triggered, the penetration datafor current and additional air taxis if anyis incorporated in step 912, and the updated penetration airspace is constructed in step 913. In step 914, the centroid of the penetration airspace is computed, and in step 915 the target separation vector is generated. In step 916, if in an embodiment the autopilot is engaged, then in step 918 the target separation vector is displayed and supplied to the autopilot system for the air taxi to navigate to the centroid along the target separation vector which will reestablish safe separation. If the autopilot is not engaged, then in step 917 the target separation vector information is displayed, possibly with an audible or visual indicator alerting the pilot to the penetration and the recommended target safe separation vector. Further, after the target separation vector is generated in step 915, the process returns to step 908 to continuously update the penetrated airspace until, in step 909, it determines that a separation violation no longer exists.

(33) FIG. 10 illustrates, according to an embodiment, the Autonomous Separation Unit (ASU) 1006 as deployed in relation to the onboard air taxi systems with which the ASU interacts. In an embodiment, the Flight Management System 1001 receives and processes information from a GPS or sensor system 1003, as well as information from communication and navigation units 1004, which identify its position and receive and process other data, including in an embodiment from air traffic control as well as other air taxis. This information and the data and images generated as a result of its interpretation are displayed on flight display units 1005a and 1005b. Together, these displays show the attitude, altitude, airspeed, and heading of the air taxi and the surrounding air taxis and related situational data. The Autopilot/Flight Director System 1007 that in an embodiment enables the pilot to disengage the autopilot and take manual control of the air taxi, engaging the Flight Control Unit 1008 to access and manage the fly by wire controls 1009 guiding the multiple facets of air taxi attitude, angle of attack, airspeed, tunnel path, and other flight characteristics.

(34) According to an embodiment, the Autonomous Separation Unit 1006 may be installed and interfaced with direct access to the flight management system 1001, in order to facilitate the display of information such as the separation trajectory as shown in FIG. 8, and may send flight data directly to the autopilot system 1007 or send only navigational data to the display units 1005a and 1005b, in the case of manual control of the air taxis through the flight control unit 1008 and fly by wire controls 1009.

(35) FIG. 11 illustrates, according to an embodiment, the steps performed by the autonomous separation unit system when deployed in a UAM air traffic control or equivalent-function setting. The four boxes to the left highlight the major stages of the routine performed by the autonomous separation unit: in step 11-1, the system establishes the reference formation airspaces and monitors data for all designated flights based on received GPS and related area positioning data; in step 11-2, the system detects penetration and generates the penetrated airspace model for any air taxis experiencing separation, including multiple incidents; in step 11-3, the system computes the penetrated airspace centroid positions and generates the target separation vectors to those centroid positions; in step 11-4, the system either displays or directs the air taxis to assume headings according to their respective separation vectors.

(36) In an embodiment, the ASU system is integrated with the Area Control Center 1101 and is interfaced with the available directional and communications systems. In an embodiment, as indicated in step 1102, the ASU is deployed en-route in an urban air traffic information region (ATIR) role, referring to a non-airport-based control center that is primarily engaged in managing air taxis en-route to their destinations and thus not within the control of origin or destination launch and landing points. In an alternative embodiment, the ASU may be deployed at an airport. The ASU can be operated in standby mode 1103 supplying data and information to controllers who would then review, amend if needed, and transmit the recommended separation actions to multiple air taxis. Alternatively, operating in an automated mode 1104, the Area Control Center-based ASU transmits instructions to multiple air taxis simultaneously after tracking and computing individual reference formation airspaces and, when needed, penetration airspaces for multiple air taxis, and determining their target separation vectors as needed.

(37) In addition to separation management for minimum-space adherence purposes, the ASU can also compute and transmit trajectories designed to optimize fuel efficiency and limit emissions. The specific operation of the ASU in an Urban Air Traffic Information Region tracking multiple air taxis and with full access to GPS and all related sensor, positioning, navigation, and air taxi transponder and communications performs the following representative steps: a. In step 1105, the ASU establishes the reference formation airspace for each air taxi in its flight information region, and sets risk triggers across all three dimensions of longitude, latitude, and altitude. b. Next, in step 1106, the ASU continues to gather information from Area Control Center inputs (GPS and related sensors and data), preparing to respond when, in step 1107, risk limits are triggered; otherwise, the system continues monitoring. c. When a risk limit is triggered and a reference formation airspace penetration is imminent, in step 1108, the ASU generates models of the projected penetration, awaiting confirmed determination that penetration has occurred in step 1109. If, in step 1110, the confirmed penetration occurs at such a rapid pace that there is a risk of air taxi collision, the ASU so warns the pilots of the air taxis involved and instructs the respective pilots in command rely on onboard detection and avoidance (DAA) systems 1111 aboard all air taxis so individual pilots with situational awareness can address the relevant risks directly. d. In step 1112, in a dynamic situation potentially involving additional air taxis, surveillance of the airspace continues specifically to detect any additional penetration or triggered risks of penetration that need to also be managed. e. In step 1113, as the penetrated airspace continues to evolve, the overall penetrated airspace modeling and status are continually updated. f. Then, in step 1114, the ASU then generates the centroid location of the penetrated airspace of each air taxis at risk, and the centroid position is then used to set the target separation vector in step 1115. g. In step 1116, Air Traffic Controllers can set or neutralize the automated instructions to air taxis, supporting either display-only, in step 1117, or display and instruct in step 1118. h. The dotted line demarcation 1119 in FIG. 12 marks the scope of ASU operations in an Urban Air Traffic Information Region/Air Traffic Control deployment of the Autonomous Separation Unit, according to an embodiment.

(38) The phrases at least one, one or more, or, and and/or are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions at least one of A, B and C, at least one of A, B, or C, one or more of A, B, and C, one or more of A, B, or C, A, B, and/or C, and A, B, or C means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.

(39) The term a or an entity refers to one or more of that entity. As such, the terms a (or an), one or more, and at least one can be used interchangeably herein. It is also to be noted that the terms comprising, including, and having can be used interchangeably.

(40) Any of the steps, functions, and operations discussed herein can be performed continuously and automatically.

(41) The exemplary systems and methods of this disclosure have been described in relation to computing devices. However, to avoid unnecessarily obscuring the present disclosure, the preceding description omits several known structures and devices. This omission is not to be construed as a limitation. Specific details are set forth to provide an understanding of the present disclosure. It should, however, be appreciated that the present disclosure may be practiced in a variety of ways beyond the specific detail set forth herein.

(42) Furthermore, while the exemplary aspects illustrated herein show the various components of the system collocated, certain components of the system can be located remotely, at distant portions of a distributed network, such as a LAN and/or the Internet, or within a dedicated system. Thus, it should be appreciated, that the components of the system can be combined into one or more devices, such as a server, communication device, or collocated on a particular node of a distributed network, such as an analog and/or digital telecommunications network, a packet-switched network, or a circuit-switched network. It will be appreciated from the preceding description, and for reasons of computational efficiency, that the components of the system can be arranged at any location within a distributed network of components without affecting the operation of the system.

(43) Furthermore, it should be appreciated that the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. These wired or wireless links can also be secure links and may be capable of communicating encrypted information. Transmission media used as links, for example, can be any suitable carrier for electrical signals, including coaxial cables, copper wire, and fiber optics, and may take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.

(44) While the flowcharts have been discussed and illustrated in relation to a particular sequence of events, it should be appreciated that changes, additions, and omissions to this sequence can occur without materially affecting the operation of the disclosed configurations and aspects.

(45) Several variations and modifications of the disclosure can be used. It would be possible to provide for some features of the disclosure without providing others.

(46) In yet another configurations, the systems and methods of this disclosure can be implemented in conjunction with a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like. In general, any device(s) or means capable of implementing the methodology illustrated herein can be used to implement the various aspects of this disclosure. Exemplary hardware that can be used for the present disclosure includes computers, handheld devices, telephones (e.g., cellular, Internet enabled, digital, analog, hybrids, and others), and other hardware known in the art. Some of these devices include processors (e.g., a single or multiple microprocessors), memory, nonvolatile storage, input devices, and output devices. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.

(47) In yet another configuration, the disclosed methods may be readily implemented in conjunction with software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this disclosure is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.

(48) In yet another configuration, the disclosed methods may be partially implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this disclosure can be implemented as a program embedded on a personal computer such as an applet, JAVA or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated measurement system, system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system.

(49) The disclosure is not limited to standards and protocols if described. Other similar standards and protocols not mentioned herein are in existence and are included in the present disclosure. Moreover, the standards and protocols mentioned herein, and other similar standards and protocols not mentioned herein are periodically superseded by faster or more effective equivalents having essentially the same functions. Such replacement standards and protocols having the same functions are considered equivalents included in the present disclosure.