The present invention relates generally to communications networks and, more particularly, to methods and apparatus for increasing the service quality and efficiency with which data is communicated between entities in such networks.
According to most existing telecommunications standards, the transmission of speech information over a wireless interface takes the form of compressed speech parameters. Upon receipt of compressed speech parameters at a base station in communication with a mobile unit, the speech parameters are processed by a codec (coder/decoder), which converts (expands) the speech parameters into speech samples, typically at a rate of 64 kilobits per second (kb/s) in order to provide compatibility with the public switched telephone network (PSTN). The speech samples at 64 kb/s are then transmitted over the PSTN towards the called party. The speech samples associated with a given call may share the same link as speech samples associated with other calls by virtue of time division multiplexing (TDM), which provides for fixed-duration time slots to be allotted to individual calls.
If the called party is connected directly to the PSTN, such as via a wireline connection, the speech samples having travelled through the network will simply be converted into audio form by a digital telephone unit at the called party site. Of course, the called party may also be a second mobile unit, in which case the speech samples will terminate at a second base station, where a second codec re-converts the speech samples back into compressed speech parameters for transmission to the second mobile unit via a wireless interface. The usage of a source decoder to expand speech parameters into a stream of speech samples, in combination with the use of a destination encoder for re-compression of these samples into a second set of compressed speech parameters, is referred to as operation of codecs in tandem, or “tandem operation”.
Those skilled in the art will appreciate that when both the called and calling parties are mobile units, the tandem operation described above introduces a degradation in service quality, as errors may be introduced by the decompression and re-compression operations performed by the source and destination codecs, respectively. Such error should in principle be avoidable, as neither codec operation is required by virtue of the second base station requiring the compressed speech parameters rather than the expanded speech samples. Thus, it is of interest to find a solution to the problem of service quality in call connections involving tandem codecs.
Two classes of solutions to the problem relating to the service quality in call connections involving tandem codecs have already been described and standardized, or are well in their way towards standardization. The earlier of the two methods, called Tandem-Free Operation (TFO), uses an in-band handshaking protocol to detect the presence of tandem codecs, and then proceeds to insert the compressed speech parameters within the 64 kb/s sample stream. This arrangement bypasses the requirement for decompression at the source codec and (re-)compression at the destination codec, which obviates the occurrence of errors at these two stages. As a result, a high quality of service can be achieved for a given end-to-end call between two mobile units. However, the standardized TFO approach provides no bandwidth advantage, as the full bandwidth ordinarily needed for the 64 kb/s sample stream is consumed for transmission of the compressed speech parameters.
A more recent approach, called Transcoder-Free Operation (TrFO), uses out-of-band signaling to detect call scenarios involving tandem codecs at call set-up time. Thereupon action is taken to put in place a direct end-to-end link to provide for a direct exchange of the compressed speech parameters without the involvement of network transcoders. However, while it provides for a savings and resource reduction compared to the standardized TFO approach, the TrFO implementation suffers from the disadvantage of added cost and complexity due to, for example, the requirement for out-of-band signaling.
For more information on the TFO and TrFO techniques, the reader is invited to refer to the following documents that are hereby incorporated by reference:
It will thus be apparent that there is a need in the industry to provide a solution that is as robust and easy to implement, while also providing bandwidth and resource savings.
Moreover, the use of conventional codec-bypass schemes such as TFO has heretofore been limited to enhancing the quality of calls established between two suitably enabled base station units in a mobile-to-mobile call. When one party is not so enabled, e.g., a telephone connected to a common packet-switched network via a network gateway, the use of conventional codec-bypass techniques is not possible. It would therefore be an advantage to exploit the ability of one party's codec-bypass capabilities, even when the other party is not a suitably enabled base station unit.
In addition, the use of conventional codec-bypass schemes is often limited by the use of backhaul gateways in a network, even when both parties to a call are codec-bypass-enabled base station units. Such gateways compress speech samples into a different format prior to transmittal of the formatted speech samples over a network. Unfortunately, when codec-bypass information is carried within the bit structure of the speech samples, the compression effected by a backhaul gateway results in loss of the information and hence prevents advantageous usage of this facility. Hence, it would be beneficial to be able to allow tandem-free operation in circumstances where a backhaul gateway is used.
The present invention realizes that although an end-to-end codec-bypass connection along a given path between two endpoints may not be possible, it is nevertheless possible to achieve bandwidth savings by establishing a codec-bypass connection along only a portion of the path.
Therefore, according to a first broad aspect, the invention seeks to provide a communication apparatus, comprising a first interface for exchanging data with a first neighboring entity, a second interface for exchanging data with a second neighboring entity, a memory for storing codec information regarding the communication apparatus and a control entity operative to detect a first message from the first neighboring entity via the first interface, the first message being indicative of codec information regarding an originating entity. Responsive to detection of the first message, the control entity is operative to perform an assessment of compatibility between the codec information regarding the originating entity and the codec information regarding the communication apparatus. Responsive to the assessment of compatibility being positive, the control entity is operative to self-identify the communication apparatus as a candidate for terminally supporting a subsequent codec-bypass negotiation with the originating entity. Responsive to the assessment of compatibility being negative, the control entity is operative to self-identify the communication apparatus as a candidate for non-terminally supporting a subsequent codec-bypass negotiation with the originating entity.
According to a second broad aspect, the invention seeks to provide a method of establishing candidacy of a gateway as terminally or non-terminally supporting a codec-bypass negotiation with an originating entity in a communications network. The method comprises detecting a first message received from a first neighboring entity, the first message being indicative of codec information regarding the originating entity; assessing compatibility between the codec information regarding the originating entity and the codec information regarding the gateway; responsive to the assessment of compatibility being positive, self-identifying the gateway as a candidate for terminally supporting a subsequent codec-bypass negotiation with the originating entity; and, responsive to the assessment of compatibility being negative, self-identifying the gateway as a candidate for non-terminally supporting a subsequent codec-bypass negotiation with the originating entity.
The invention also seeks to provide, in accordance with a third broad aspect, computer-readable media tangibly embodying a program of instructions executable by a computer to perform the above method of establishing candidacy of a gateway as terminally or non-terminally supporting a codec-bypass negotiation with an originating entity in a communications network.
According to a fourth broad aspect, the present invention seeks to provide a method of establishing a codec-bypass connection between a first gateway and one of a plurality of in-path gateways located along a path from the first gateway to a second gateway. The method comprises identifying a target in-path gateway from among the plurality of in-path gateways, the target in-path gateway being the in-path gateway furthest along the path from the first gateway which is characterized by codec-bypass connection compatibility with the first gateway, and establishing a codec-bypass connection between the first gateway and the target in-path gateway.
The invention may also be summarized according to a fifth broad aspect as seeking to provide a method of establishing a codec-bypass connection along a path between a first gateway and a second gateway, the path comprising a plurality of in-path gateways. The method comprises identifying a first sub-path between the first gateway and a first target in-path gateway from among the plurality of in-path gateways, the first target in-path gateway being the in-path gateway furthest along the path from the first gateway which is characterized by codec-bypass connection compatibility with the first gateway. The method also comprises identifying a second sub-path between the second gateway and a second target in-path gateway from among the plurality of in-path gateways, the second target in-path gateway being the in-path gateway furthest along the path from the second gateway which is characterized by codec-bypass connection compatibility with the second gateway. The method further comprises determining the lengths of the first and second sub-paths and, if the first sub-path is longer than the second sub-path, establishing a codec-bypass connection between the first gateway and the first target gateway, otherwise if the second sub-path is longer than the first sub-path, establishing a codec-bypass connection between the second gateway and the second target gateway.
These and other aspects and features of the present invention will now become apparent to those of ordinary skill in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying drawings.
In the accompanying drawings:
In accordance with an embodiment of the present invention, arbitrary combinations of wireless/wireline gateways collaborate constructively to reduce bandwidth and delay, and to achieve higher voice quality by removing—to the extent possible—tandem codecs (or vocoders). The present description herein below describes a method to resolve the disposition of the gateways that could find themselves involved in an codec-bypass connection. The gateways being given consideration are those which modify the speech payload (e.g. transcoding between different codec formats, including G.711).
With reference to
Various types of gateways are traversed by the call as it travels along subsequent legs of a call from one endpoint to another. The following definitions of various types of gateways have been provided for purposes of clarity, but without any intent to limit or otherwise restrict the scope of the present invention.
In particular, a “TDM gateway” is defined as a gateway that connects a circuit-switched network to a packet network. A “packet gateway” is defined as a gateway that connects only to a packet network. An “endpoint gateway” (or “termination gateway”) is defined as a gateway located at an extreme end of the signal path. An example of an endpoint gateway is a UMTS gateway. In
In general, a gateway comprises communications interfaces for communicating with neighbouring entities. In the case of an in-path gateway, the neighbouring entities are other gateways. Each gateway is configured to exchange signals in a variety of formats that are defined by a set of codecs with which the gateway is associated. Accordingly, each gateway is equipped with a memory element for storing codec information regarding the gateway in question. In the example of
Once a call is established between the endpoints, the endpoint gateways attempt to establish a codec-bypass connection. This attempt is made through the exchange of codec-bypass negotiation messages during a codec-bypass negotiation. If the two endpoint gateways are associated with a common codec, then an end-to-end codec-bypass connection can indeed be established through codec-bypass negotiation (or “dialogue”). This provides significant quality enhancement.
When the two endpoint gateways are not associated with a common codec, then one may have recourse to a procedure whereby a codec-bypass connection is negotiated (“dialogued”) for only a portion of the path that joins the endpoint gateways. This procedure, which is described in greater detail herein below, results in bandwidth savings and quality enhancement compared with the case where an attempt at establishing end-to-end codec-bypass mode of operation would be altogether abandoned. In a specific embodiment, the gateways along the path joining the endpoint gateways negotiate a codec-bypass mode of operation connection for the longest possible portion of that path.
It is assumed, for the purposes of description, that the various in-path gateways along the path are at least minimally codec-bypass compliant, without necessarily being able to terminate a codec-bypass negotiation or connection. Specifically, depending on the particular codec used by a remote entity and on the particular phase of a codec-bypass negotiation, a gateway is assumed to be at least capable of acquiring a “passive” mode. A gateway in “passive” mode is capable of relaying codec-bypass negotiation messages from one leg to another leg of a call that it serves, but it does not terminate the negotiation, i.e., it only serves to “passively support” a codec-bypass negotiation. However, depending on the capabilities of the gateway, the gateway may also be able to acquire an “active” mode for the purposes of the codec-bypass negotiation. In “active” mode, the gateway is capable of terminally supporting (i.e., terminating) a codec-bypass negotiation on at least one leg of a call that it serves. Thus, the gateway thus operates differently in passive mode and in active mode, assuming that the active mode can be acquired for a given codec-bypass negotiation.
Thus, for example, at 220, endpoint gateway A starts by transmitting an initial codec-bypass negotiation message 202. The initial message 202 carries the codec information regarding endpoint gateway A, specifically a list of codec types and configurations supported by endpoint gateway A. In this case, the codec information identifies “codec X” as being supported at endpoint gateway A. Optionally, an endpoint gateway can provide a designated data element (e.g., a single bit) to identify its codec-bypass messages as having emanated from one end of the end-to-end connection in question.
When the ith in-path gateway (denoted GW(i) for convenience) receives the initial message 202 originated from endpoint gateway A, and if the codec type and codec configuration listed in the initial message 202 matches in-path GW(i)'s internally supported codec type and configuration, then in-path gateway GW(i) will return a response message towards endpoint gateway A through in-path gateways GW(i−1), GW(i−2), etc. The purpose of the response message is to signal to in-path gateway GW(i−1) and beyond (towards the endpoint gateway A) that in-path gateway GW(i) has the ability to support a compatible codec type and configuration. In-path gateway GW(i) thus goes through the process of identifying itself as a candidate gateway, capable of terminating the current codec-bypass negotiation with endpoint gateway A. In-path gateway GW(i) therefore self-identifies itself as an “active” gateway. However, as the response message travels towards endpoint gateway A, any previously determined active gateways in the chain will re-self-identify itself as a passive gateway upon receipt of the response message.
For example, at 222, in-path gateway 1, upon receipt of the initial message 202, realizes that it has a compatible codec type and configuration (namely, codec X). This causes the in-path gateway 1 to make a “mental note” of the fact that it is now active, i.e., in-path gateway 1 is now a candidate for terminating the codec-bypass negotiation with endpoint gateway A. The making of a “mental note” can take many forms, such as self-identification by way of setting a binary flag whose two states correspond to active and passive, respectively. This also results in in-path gateway 1 sending a response message 204 back to the endpoint gateway A. Meanwhile, gateway 1 forwards the initial message 202 towards in-path gateway 2.
At 224, in-path gateway 2, upon receipt of the initial message 202, realizes that it has does not have a codec type and configuration compatible with “codec X”. In-path gateway 2 therefore plays the role of a passive gateway. Under such circumstances, in-path gateway 2 simply forwards the initial message 202 towards in-path gateway 3 without any indication back towards in-path gateway 1.
At 226, in-path gateway 3, upon receipt of the initial message 202, realizes that it has a codec type and configuration compatible with “codec X”. Accordingly, the in-path gateway 3 makes a “mental note” of the fact that it is now active, i.e., in-path gateway 3 is now a candidate for eventually terminating the current codec-bypass negotiation with endpoint gateway A. Again, the making of a “mental note” can take many forms, such as self-identification by way of setting a binary flag whose two states correspond to active and passive, respectively. This also results in in-path gateway 3 forwarding the initial message 202 towards endpoint B, while sending a second response message 206 back to the in-path gateway 2.
At gateway 2, being a passive gateway, the second response message 206 is simply forwarded to in-path gateway 1. However, a different effect is produced at in-path gateway 1, which had previously self-identified itself as active. The receipt of the second response message 206 by the in-path gateway 1 sigls to the in-path gateway 1 that a gateway further down the chain towards endpoint gateway B is now active due to its capability of terminating the current codec-bypass negotiation. Therefore, in-path gateway 1 switches its mode of operation to “passive”.
The above-described process stops when a particular in-path gateway receives a message, i.e. a codec-bypass message transmitted by endpoint gateway B, or when a self-identified candidate fails to receive any codec-bypass messages, e.g. due to absence of the endpoint gateway B for end-to-end codec-bypass connection. In the former case, the self-identified candidate will go into passive mode only temporarily, in order to relay the codec-bypass message back towards endpoint gateway A, so as to allow end-to-end codec-bypass negotiation. If the end-to-end negotiation between endpoint gateways A and B is successful, all in-path gateways, including the one that temporarily went into passive mode, remain in passive mode. However, in the case where there is no end-to-end codec-bypass connection due to a negotiation failure, the last self-identified codec-bypass candidate will transmit a message in an attempt to start a codec-bypass negotiation with endpoint gateway A.
Thus, for example, at 228, endpoint gateway B does not have a codec type and configuration compatible with “codec X”. Therefore, endpoint gateway B either does not send a message back to gateway 3, or (as illustrated) endpoint gateway B sends a neg_fail message 208 (negotiation failure) towards in-path gateway 3. Receipt of the neg_fail message 208 and in-path gateway 3 signals to the in-path gateway 3 that it is the furthest gateway from endpoint gateway A that is capable of terminating the codec-bypass negotiation. Accordingly, as shown in
Of course, it is also possible that no end-to-end codec-bypass connection is possible due to sheer absence of endpoint gateway B. This scenario, shown in
At the same time that endpoint gateway A attempts to dialogue with gateways further along the path towards endpoint gateway B, endpoint gateway B itself may be attempting to dialogue with gateways further along the path towards endpoint gateway A. By completing analogous processes for both endpoint gateways A and B (and waiting until both options have been explored), a codec-bypass communication with the longest possible span from either endpoint can be established.
As illustrated in
Specifically, as per the existing codec-bypass decision algorithm or codec mismatch resolution rules, all codecs are ranked in preference. During the scenario being contemplated, there are two incompatible codec types/configurations at endpoint gateways A and B, but each can establish a respective codec-bypass connection with a different one of the in-path gateways (namely in-path gateway 3 with endpoint gateway A and in-path gateway 2 with endpoint gateway B). An active in-path gateway which has identified itself as the codec-bypass candidate for termination of codec-bypass negotiation in one direction but which supports a less preferred codec type/configuration will continue to send a response message (e.g., 204 or 206 in
In the example of
An in-path gateway that detects codec-bypass negotiation messages only from one “side” (as viewed in the orientation in
As an enhancement, a data element (e.g., a single bit) can be used to identify cases in which a gateway needs to receive traffic in the “original” compression format (i.e. compression format at the time of call setup—e.g., G.711) even after establishment of a codec-bypass connection. This bit can be used in two cases. Firstly, it will be used by passive gateways to make sure that adjacent gateways will continue to send them the traffic signal in the original format (e.g., G.711) as well as in other compressed formats after the establishment of a codec-bypass connection. Secondly, this bit will also be used by active TDM gateways that may not be able to support the codec selected for establishment of a codec-bypass connection, to request that adjacent gateways continue to send them the traffic signal in the original format (e.g., G.711) as well as in other compressed formats after the establishment of a codec-bypass connection.
It should be understood that other modifications of, and additions to, the present invention are possible. For example, the self-identification process described herein above is applicable to the various example, non-limiting scenarios depicted in
Also, it is recalled that the rules and procedures above essentially lead to clarification of a particular in-path gateway's disposition. Specifically, a codec-bypass-compliant in-path gateway will know whether or not it is the last in-path gateway and whether or not it has vocoders common with each of the endpoints. Equipped with this information, should a codec-bypass connection fail to establish due to the absence of a compatible codec type or configuration at either end, the above methods can be applied recursively in order to come up with codec-bypass connection segments where applicable, for the purpose of reducing bandwidth where applicable. The recursive application of the procedure means that the last in-path gateways (rather than the endpoint gateways) would initiate their own search for codec-bypass partners based on their full suite of supported vocoders. In initiating the codec-bypass handshaking these gateways will also take advantage of their knowledge of the vocoders supported by the endpoints to achieve maximum bandwidth savings and voice quality. A pre-defined vocoder order of preference will guide the application of the procedure, e.g., in situations where each of the two last in-path gateways supports the vocoder of different endpoints only. The prescribed order of vocoder preference will determine which of the two last in-path gateways will initiate the new round of codec-bypass handshaking. The in-path gateway which supports a vocoder with a lower priority will wait for a prescribed period of time before initiating its own codec-bypass handshaking. This priority scheme prevents race conditions that may lead to instability.
Should the procedure initiated by the last in-path gateways fail to achieve codec-bypass mode of operation due to the absence of common vocoders, the recursion can be applied again to search for yet more limited application of codec-bypass mode of operation. Thus, the in-path gateways can identify themselves to be in the middle of the path, rather than the last in-path gateway, by monitoring codec-bypass exchanges around them including the usage of a suitable message. Again, the procedure may result in several segments of codec-bypass negotiations, i.e. not limited to a single segment.
Those skilled in the art will appreciate that the control entity of each gateway may be implemented as an arithmetic and logic unit (ALU) having access to a code memory (not shown) which stored program instructions for the operation of the ALU. The program instructions could be stored on a medium which is fixed, tangible and readable directly by the processor, (e.g., removable diskette, CD-ROM, ROM, or fixed disk), or the program instructions could be stored remotely but transmittable to the processor via a modem or other interface device (e.g., a communications adapter) connected to a network over a transmission medium. The transmission medium may be either a tangible medium (e.g., optical or analog communications lines) or a medium implemented using wireless techniques (e.g., microwave, infrared or other transmission schemes).
Those skilled in the art should also appreciate that the program instructions stored in the code memory can be compiled from a high level program written in a number of programming languages for use with many computer architectures or operating systems. For example, the high level program may be written in assembly language, while other versions may be written in a procedural programming language (e.g., “C”) or an object oriented programming language (e.g., “C++” or “JAVA”).
Those skilled in the art should further appreciate that in some embodiments of the invention, the functionality of the control entity may be implemented as pre-programmed hardware or firmware elements (e.g., application specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), etc.), or other related components.
While specific embodiments of the present invention have been described and illustrated, it will be apparent to those skilled in the art that numerous modifications and variations can be made without departing from the scope of the invention as defined in the appended claims.
The present invention claims the benefit under 35 USC §119(e) of prior U.S. provisional patent application Ser. No. 60/448,459 to Rabipour et al., filed Feb. 21, 2003, incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
3652798 | McNeilly et al. | Mar 1972 | A |
4048446 | Hafner et al. | Sep 1977 | A |
4455649 | Esteban et al. | Jun 1984 | A |
4545052 | Steierman | Oct 1985 | A |
5295136 | Ashley et al. | Mar 1994 | A |
5375121 | Nishino et al. | Dec 1994 | A |
5612957 | Gregerson et al. | Mar 1997 | A |
5710976 | Hill et al. | Jan 1998 | A |
5740157 | Demiray et al. | Apr 1998 | A |
5905873 | Hartmann et al. | May 1999 | A |
5930264 | Nguyen | Jul 1999 | A |
5933487 | Strickland | Aug 1999 | A |
5956673 | Weaver et al. | Sep 1999 | A |
5995923 | Mermelstein et al. | Nov 1999 | A |
5999529 | Bernstein et al. | Dec 1999 | A |
6006189 | Strawczynski et al. | Dec 1999 | A |
6009467 | Ratcliff et al. | Dec 1999 | A |
6026086 | Lancelot et al. | Feb 2000 | A |
6031904 | An et al. | Feb 2000 | A |
6046999 | Miki et al. | Apr 2000 | A |
6078595 | Jones et al. | Jun 2000 | A |
6141784 | Davis et al. | Oct 2000 | A |
6144667 | Doshi et al. | Nov 2000 | A |
6147988 | Bartholomew et al. | Nov 2000 | A |
6172990 | Deb et al. | Jan 2001 | B1 |
6246879 | Segura et al. | Jun 2001 | B1 |
6256612 | Vo et al. | Jul 2001 | B1 |
6272358 | Brent et al. | Aug 2001 | B1 |
6275578 | De Trana et al. | Aug 2001 | B1 |
6295302 | Hellwig et al. | Sep 2001 | B1 |
6298055 | Wildfeuer | Oct 2001 | B1 |
6324409 | Shaffer et al. | Nov 2001 | B1 |
6324515 | Rabipour et al. | Nov 2001 | B1 |
6339594 | Civanlar et al. | Jan 2002 | B1 |
6353666 | Henderson et al. | Mar 2002 | B1 |
6389005 | Cruickshank | May 2002 | B1 |
6389016 | Sabaa et al. | May 2002 | B1 |
6392993 | Hamilton et al. | May 2002 | B1 |
6414964 | Holmquist et al. | Jul 2002 | B1 |
6424637 | Pecen et al. | Jul 2002 | B1 |
6463454 | Lumelsky et al. | Oct 2002 | B1 |
6549945 | Sinibaldi et al. | Apr 2003 | B1 |
6553423 | Chen | Apr 2003 | B1 |
6574469 | Xiang et al. | Jun 2003 | B1 |
6600738 | Alperovich et al. | Jul 2003 | B1 |
6614781 | Elliott et al. | Sep 2003 | B1 |
6625169 | Tofano | Sep 2003 | B1 |
6647428 | Bannai et al. | Nov 2003 | B1 |
6658064 | Rotola-Pukkila et al. | Dec 2003 | B1 |
6671367 | Graf et al. | Dec 2003 | B1 |
6693996 | Mansfield | Feb 2004 | B2 |
6721269 | Cao et al. | Apr 2004 | B2 |
6731627 | Gupta et al. | May 2004 | B1 |
6731647 | Yao | May 2004 | B2 |
6765931 | Rabenko et al. | Jul 2004 | B1 |
6778517 | Lou et al. | Aug 2004 | B1 |
6781983 | Armistead | Aug 2004 | B1 |
6795437 | Räsänen et al. | Sep 2004 | B1 |
6842461 | Harris | Jan 2005 | B2 |
6845089 | Gu et al. | Jan 2005 | B1 |
6850778 | Honkala et al. | Feb 2005 | B1 |
6850883 | Kapanen et al. | Feb 2005 | B1 |
6865220 | Abrishami | Mar 2005 | B2 |
6876646 | Dore et al. | Apr 2005 | B1 |
6885638 | Xu et al. | Apr 2005 | B2 |
6898208 | Sligo et al. | May 2005 | B1 |
6944166 | Perinpanathan et al. | Sep 2005 | B1 |
6956816 | Alexander et al. | Oct 2005 | B1 |
6967958 | Ono et al. | Nov 2005 | B2 |
6967972 | Volftsun et al. | Nov 2005 | B1 |
6973024 | Joseph et al. | Dec 2005 | B1 |
6983163 | Sato et al. | Jan 2006 | B2 |
6985530 | Zerbe | Jan 2006 | B1 |
6990340 | Tamura et al. | Jan 2006 | B2 |
6999459 | Callon et al. | Feb 2006 | B1 |
7006489 | Li et al. | Feb 2006 | B2 |
7023819 | Falsafi | Apr 2006 | B2 |
7054318 | Eneroth et al. | May 2006 | B2 |
7054320 | Lee et al. | May 2006 | B1 |
7058085 | Earnshaw et al. | Jun 2006 | B2 |
7068623 | Barany et al. | Jun 2006 | B1 |
7072358 | Suvanen | Jul 2006 | B2 |
7082143 | LeBlanc et al. | Jul 2006 | B1 |
7085289 | Cromer et al. | Aug 2006 | B2 |
7089011 | Mangal | Aug 2006 | B1 |
7095733 | Yarlagadda et al. | Aug 2006 | B1 |
7103021 | Jou | Sep 2006 | B2 |
7106701 | Stümpert et al. | Sep 2006 | B2 |
7133694 | Lanig et al. | Nov 2006 | B2 |
7136375 | Koistinen | Nov 2006 | B1 |
7162024 | Wah et al. | Jan 2007 | B2 |
7174156 | Mangal | Feb 2007 | B1 |
7180892 | Tackin | Feb 2007 | B1 |
7181209 | Tamura | Feb 2007 | B2 |
7233595 | Hollis et al. | Jun 2007 | B1 |
7240000 | Harada | Jul 2007 | B2 |
7245589 | Neulist et al. | Jul 2007 | B2 |
7245931 | Wang et al. | Jul 2007 | B2 |
7280530 | Chang et al. | Oct 2007 | B2 |
7304984 | Butler et al. | Dec 2007 | B2 |
7305229 | Fox et al. | Dec 2007 | B2 |
7349698 | Gallagher et al. | Mar 2008 | B2 |
7369859 | Gallagher | May 2008 | B2 |
7400881 | Kallio | Jul 2008 | B2 |
7411941 | Chu et al. | Aug 2008 | B2 |
7471655 | Gallagher et al. | Dec 2008 | B2 |
7483374 | Nilakantan et al. | Jan 2009 | B2 |
7593415 | Li et al. | Sep 2009 | B2 |
7729346 | Lee et al. | Jun 2010 | B2 |
7792096 | Doleh et al. | Sep 2010 | B2 |
7792150 | Chen et al. | Sep 2010 | B2 |
7830864 | Li | Nov 2010 | B2 |
7835346 | He et al. | Nov 2010 | B2 |
7990865 | Chu et al. | Aug 2011 | B2 |
8027265 | Chu et al. | Sep 2011 | B2 |
20010024960 | Mauger | Sep 2001 | A1 |
20010036158 | Hallenstal et al. | Nov 2001 | A1 |
20010043577 | Barany et al. | Nov 2001 | A1 |
20020001302 | Pickett | Jan 2002 | A1 |
20020013147 | Fauconnier et al. | Jan 2002 | A1 |
20020019881 | Bokhari et al. | Feb 2002 | A1 |
20020027930 | Huh et al. | Mar 2002 | A1 |
20020049860 | Koistinen | Apr 2002 | A1 |
20020054571 | Falsafi | May 2002 | A1 |
20020072364 | Tamura | Jun 2002 | A1 |
20020106029 | Bunn et al. | Aug 2002 | A1 |
20020118673 | Abrishami et al. | Aug 2002 | A1 |
20030005106 | Isoda | Jan 2003 | A1 |
20030032440 | Sato et al. | Feb 2003 | A1 |
20030058822 | Jou | Mar 2003 | A1 |
20030063569 | Kalliokulju et al. | Apr 2003 | A1 |
20030072273 | Aiello et al. | Apr 2003 | A1 |
20030093509 | Li et al. | May 2003 | A1 |
20030112796 | Kwan | Jun 2003 | A1 |
20030117954 | De Neve et al. | Jun 2003 | A1 |
20030123466 | Somekh et al. | Jul 2003 | A1 |
20030123485 | Yi et al. | Jul 2003 | A1 |
20030133423 | LaDue | Jul 2003 | A1 |
20030134653 | Sarkkinen et al. | Jul 2003 | A1 |
20030135376 | Harada | Jul 2003 | A1 |
20030135784 | Yamaguchi et al. | Jul 2003 | A1 |
20030189720 | Bei et al. | Oct 2003 | A1 |
20030195981 | Graf et al. | Oct 2003 | A1 |
20030210659 | Chu et al. | Nov 2003 | A1 |
20030233274 | Urken et al. | Dec 2003 | A1 |
20040008652 | Tanzella et al. | Jan 2004 | A1 |
20040010582 | Oliver | Jan 2004 | A1 |
20040037224 | Choi et al. | Feb 2004 | A1 |
20040037314 | Spear | Feb 2004 | A1 |
20040047364 | Briggs et al. | Mar 2004 | A1 |
20040066745 | Joe | Apr 2004 | A1 |
20040073424 | Geppert et al. | Apr 2004 | A1 |
20040090989 | Kobayashi | May 2004 | A1 |
20040100914 | Hellwig et al. | May 2004 | A1 |
20040101125 | Graf et al. | May 2004 | A1 |
20040110539 | El-Maleh et al. | Jun 2004 | A1 |
20040114588 | Bhaskaran | Jun 2004 | A1 |
20040114626 | Cline et al. | Jun 2004 | A1 |
20040114922 | Hardee | Jun 2004 | A1 |
20040131025 | Dohler et al. | Jul 2004 | A1 |
20040133419 | El-Maleh et al. | Jul 2004 | A1 |
20040136447 | LeBlanc | Jul 2004 | A1 |
20040196867 | Ejzak et al. | Oct 2004 | A1 |
20040208132 | Neulist et al. | Oct 2004 | A1 |
20040228279 | Midtun et al. | Nov 2004 | A1 |
20040254786 | Kirla et al. | Dec 2004 | A1 |
20040266426 | Marsh et al. | Dec 2004 | A1 |
20040267897 | Hill et al. | Dec 2004 | A1 |
20050007973 | Jang et al. | Jan 2005 | A1 |
20050013281 | Milton et al. | Jan 2005 | A1 |
20050013286 | Holland et al. | Jan 2005 | A1 |
20050027948 | Marlan et al. | Feb 2005 | A1 |
20050048973 | Hou et al. | Mar 2005 | A1 |
20050064907 | Nealon | Mar 2005 | A1 |
20050073977 | Vanghi et al. | Apr 2005 | A1 |
20050074017 | Qian et al. | Apr 2005 | A1 |
20050084094 | Gass et al. | Apr 2005 | A1 |
20050085181 | Tao | Apr 2005 | A1 |
20050099940 | Ohenoja et al. | May 2005 | A1 |
20050105512 | Myhre et al. | May 2005 | A1 |
20050157823 | Sudhakar | Jul 2005 | A1 |
20050172013 | Tan et al. | Aug 2005 | A1 |
20050185604 | Agarwal | Aug 2005 | A1 |
20050195829 | Ward | Sep 2005 | A1 |
20050232232 | Farber et al. | Oct 2005 | A1 |
20050265279 | Markovic et al. | Dec 2005 | A1 |
20050267746 | Jelinek et al. | Dec 2005 | A1 |
20050286466 | Tagg et al. | Dec 2005 | A1 |
20060046658 | Cruz et al. | Mar 2006 | A1 |
20060050664 | Guey | Mar 2006 | A1 |
20060062225 | Li et al. | Mar 2006 | A1 |
20060067221 | Lee et al. | Mar 2006 | A1 |
20060072555 | St. Hilaire et al. | Apr 2006 | A1 |
20060092927 | Li et al. | May 2006 | A1 |
20060133353 | Wang et al. | Jun 2006 | A1 |
20060154686 | Sarkkinen et al. | Jul 2006 | A1 |
20060193289 | Ronneke et al. | Aug 2006 | A1 |
20060198347 | Hurtta et al. | Sep 2006 | A1 |
20060209873 | Knabchen et al. | Sep 2006 | A1 |
20060229068 | Niemela et al. | Oct 2006 | A1 |
20060268845 | He et al. | Nov 2006 | A1 |
20060291454 | Ali | Dec 2006 | A1 |
20060291483 | Sela | Dec 2006 | A1 |
20070011727 | Mielenz et al. | Jan 2007 | A1 |
20070041320 | Chen et al. | Feb 2007 | A1 |
20070041360 | Gallagher et al. | Feb 2007 | A1 |
20070043558 | Schwarz et al. | Feb 2007 | A1 |
20070104114 | Chu et al. | May 2007 | A1 |
20070116018 | Doleh et al. | May 2007 | A1 |
20070123196 | Tamura | May 2007 | A1 |
20070127357 | Tamura | Jun 2007 | A1 |
20070127436 | Karimi-Cherkandi et al. | Jun 2007 | A1 |
20070135165 | Junghanns et al. | Jun 2007 | A1 |
20070140214 | Zoltan | Jun 2007 | A1 |
20070140293 | Agarwal et al. | Jun 2007 | A1 |
20070165636 | He et al. | Jul 2007 | A1 |
20070171841 | Witzel et al. | Jul 2007 | A1 |
20070186002 | Campbell et al. | Aug 2007 | A1 |
20070286082 | Hikspoors et al. | Dec 2007 | A1 |
20080008312 | Ganesamoorthi et al. | Jan 2008 | A1 |
20080039087 | Gallagher et al. | Feb 2008 | A1 |
20080102794 | Keevill et al. | May 2008 | A1 |
20080123596 | Gallagher et al. | May 2008 | A1 |
20080151845 | Jaakkola et al. | Jun 2008 | A1 |
20080160987 | Wang et al. | Jul 2008 | A1 |
20080225765 | Marinier et al. | Sep 2008 | A1 |
20080240079 | Chu et al. | Oct 2008 | A1 |
20080288245 | El-Maleh et al. | Nov 2008 | A1 |
20080293416 | Yi et al. | Nov 2008 | A1 |
20080316980 | Ahlen et al. | Dec 2008 | A1 |
20100305943 | Witzel et al. | Dec 2010 | A1 |
20110032927 | Chen et al. | Feb 2011 | A1 |
Number | Date | Country |
---|---|---|
2336699 | Jan 2000 | CA |
1504039 | Jun 2004 | CN |
1 553 723 | Dec 2004 | CN |
101341730 | Jan 2009 | CN |
198 29 822 | Jan 2000 | DE |
0 907 280 | Apr 1999 | EP |
1 017 217 | Jul 2000 | EP |
1 076 466 | Feb 2001 | EP |
20011715 | Feb 2003 | FI |
2363295 | Dec 2001 | GB |
2 389 486 | Dec 2003 | GB |
WO 99291326 | Jun 1999 | WO |
WO 9940569 | Aug 1999 | WO |
WO 0051330 | Aug 2000 | WO |
WO 0070885 | Nov 2000 | WO |
WO 0126390 | Apr 2001 | WO |
WO 02052414 | Jul 2002 | WO |
WO 03019961 | Mar 2003 | WO |
WO 03043299 | May 2003 | WO |
WO 03103313 | Dec 2003 | WO |
WO 2004006616 | Jan 2004 | WO |
WO 2004019568 | Mar 2004 | WO |
WO 2004075582 | Sep 2004 | WO |
WO 2005050960 | Jun 2005 | WO |
WO 2005089055 | Sep 2005 | WO |
WO 2007022461 | Feb 2007 | WO |
WO 2007061548 | May 2007 | WO |
WO 2007084417 | Jul 2007 | WO |
WO 2008082605 | Jul 2008 | WO |
Number | Date | Country | |
---|---|---|---|
20040252681 A1 | Dec 2004 | US |
Number | Date | Country | |
---|---|---|---|
60448459 | Feb 2003 | US |