Back to Blog
Technical

How the TNN Mesh Works

8 min readApril 2026

At the heart of TernaryPhysics Ops is the TNN™ — our proprietary neural network that powers agent discovery, routing, and security. This post explains the benefits and why we built it this way.

TNN™ and TNN Mesh™ are Patent Pending technologies of TernaryPhysics LLC.

What is the TNN™?

The TNN™ (Ternary Neural Network) is our proprietary neural network architecture, designed specifically for efficient, always-on infrastructure monitoring. Its unique design enables extremely fast inference with minimal resource usage.

Key Innovation

Our proprietary architecture enables inference speeds that are orders of magnitude faster than traditional neural networks, while using a fraction of the resources. This allows continuous monitoring without impacting your workloads.

The TNN™ is designed to run efficiently on any hardware — no GPU required. This makes it possible to deploy agents anywhere in your infrastructure, from cloud VMs to edge devices.

TNN™ Benefits

Our TNN™ is designed for always-on monitoring:

Ultra-Compact

Proprietary architecture with minimal footprint.

Sub-Millisecond

Extremely fast inference on any modern hardware.

Minimal Resources

No impact on your workload's performance.

Runs Anywhere

Works on virtually any hardware. No GPU required.

Three Functions of the TNN™

1. Anomaly Detection

The TNN™ continuously monitors metrics from its host resource — CPU, memory, network, disk I/O, request latency, error rates, and more. It learns what "normal" looks like for YOUR specific resource, not generic thresholds.

When metrics deviate from the learned baseline, the TNN™ flags an anomaly. This wakes up the larger TernaryPhysics-7B model for deeper investigation. During normal operation, the LLM sleeps, saving resources.

2. Mesh Discovery

When an agent starts, it automatically discovers other agents in your network using our proprietary discovery protocol. The TNN™ securely identifies and authenticates each agent.

Other agents verify the signature and add the new agent to their mesh topology. This happens automatically — no configuration needed.

$ tp-ops list

AGENT            TYPE            STATUS   MESH
prod-cluster     k8s-agent       active   ● 4 peers
payments-db      postgres-agent  active   ● 4 peers
api-server-01    vm-agent        active   ● 4 peers
cache-primary    redis-agent     active   ● 4 peers
edge-gateway     apigw-agent     active   ● 4 peers

TNN Mesh: 5 agents connected
Routing: all paths optimal

3. Security

Every packet sent between agents is cryptographically signed using our proprietary TNN™ signature scheme. This provides strong authentication without the complexity of traditional PKI.

This eliminates the need for certificates, certificate authorities, and rotation schedules. Security is built into the mesh itself. Our Patent Pending technology ensures that only legitimate agents can join your mesh.

Cross-Agent Queries

When you ask an agent a question, the TNN™ determines which other agents might have relevant information. It routes queries efficiently through the mesh, aggregating responses to build a complete picture.

You → k8s-agent: "Why is checkout slow?"
          │
          ├──→ postgres-agent: "Any DB issues?"
          │         └── "Connection pool at 147/150"
          │
          ├──→ redis-agent: "Any cache issues?"
          │         └── "Cache hit rate normal at 94%"
          │
          └── k8s-agent analyzes + correlates
                    │
                    └── "Root cause: DB connection exhaustion
                         after deploy changed POOL_SIZE"

The TNN™ handles the routing logic, determining the optimal query path based on the mesh topology and agent capabilities. Queries only go to relevant agents — a database question won't bother the Kubernetes agent.

Relay Agents

When agents can't communicate directly (different VPCs, firewalls, air-gapped environments), you can deploy a relay agent to bridge them:

# On a machine that can reach both networks
$ tp-ops drop --type relay-agent

Relay agent dropped!
Bridging: vpc-prod ↔ vpc-staging
Peers: 3 (prod) + 2 (staging) = 5 total

The relay doesn't decrypt or inspect traffic — it just forwards signed packets between network segments. End-to-end security is maintained.

Why We Built Our Own

We could have used existing mesh technologies, but they all assume heavyweight infrastructure: sidecars, control planes, certificate authorities. Our constraints were different:

  • Must run on resource-constrained environments
  • Must enable continuous, always-on monitoring
  • Must be zero-config — agents should just work when dropped
  • Must be secure without external dependencies

The TNN™ gives us all of this with minimal overhead. It's a novel approach, and it works remarkably well.

For more details, check out our TNN Mesh™ documentation or the Architecture overview.