Embodiments described herein relate generally to data communication, and particularly to methods and systems for deadlock-free rerouting for resolving local link failures in a network using detour paths.
Communication networks used in applications such as High-Performance Computing (HPC) systems and datacenters typically comprise a large number of network elements interconnected by links. A high-reliability communication network should be able to recover quickly from link failure events.
Methods for recovery from link failures are known in the art. For example, a white paper by Mellanox® Technologies, 2019, describes a solution called SHIELD™—(Self-Healing Interconnect Enhancement for Intelligent Datacenters), which takes advantage of the intelligence already built into the latest generation of InfiniBand switches. By making the fabric capable with self-healing autonomy, the speed with which communications can be corrected in the face of a link failure can be sped up by 5000×, fast enough to save communications from expensive retransmissions or absolute failure.
Aspects of the SHIELD solution are described, for example, in U.S. Pat. No. 9,729,473, which describes a method in a network element that includes multiple interfaces for connecting to a communication network. The method includes receiving via an ingress interface packets that are not allowed to undergo re-routing and that are addressed to a destination via a first egress interface. The packets are forwarded via the first egress interface when there is a valid path from the first egress interface to the destination. When there is no valid path from the first egress interface to the destination, a second egress interface is selected from a group of multiple egress interfaces that have respective paths to the destination and are assigned to packets for which re-routing is allowed, and the packets are forwarded via the second egress interface until recovering a path to the destination.
U.S. Pat. No. 9,137,143, describes a multiprocessor computer system comprising a dragonfly processor interconnect network that comprises a plurality of processor nodes and a plurality of routers. The routers are operable to adaptively route data by selecting from among a plurality of network paths from a target node to a destination node in the dragonfly network based on one or more of network congestion information from neighboring routers and failed network link information from neighboring routers.
An embodiment that is described herein provides a computing system including multiple network elements arranged in at least one group. A plurality of the network elements in the group are designated as spines and another plurality are designated as leaves, the spines and the leaves in the group are interconnected in a bipartite topology, and at least some of the spines and leaves in the group are configured to: receive in a first leaf, from a source node, packets destined to be delivered to a destination node via a second leaf, forward the packets by the first leaf, via a first link, to a first spine, and forward the packets by the first spine to the second leaf via a second link. In response to detecting that the second link has failed, apply a detour path from the first leaf to the second leaf, the detour path including a detour link that delivers packets in a spine-to-leaf direction and another detour link that delivers packets in a leaf-to-spine direction, and forward subsequent packets, which are received in the first leaf and are destined to the second leaf, via the detour path.
In some embodiments, the detour path is predefined, and the at least some of the spines and leaves in the group are configured to apply the detour path by applying the predefined detour path. In other embodiments, the at least some of the spines and leaves in the group are configured to apply the detour path by communicating with one another. In yet other embodiments, the failing link connects to a given port of a spine or a leaf, and the spine or the leaf is configured to apply the detour path by forwarding received packets to a port different from the given port.
In an embodiment, in response to detecting by the first leaf that the first link has failed, the at least some of the spines and leaves in the group are configured to select an alternative path from the first leaf to the second leaf via a second spine. In another embodiment, in response to detecting by the first spine that the second link has failed and further detecting by the first leaf that the first link is operative, the at least some of the spines and leaves in the group are configured to apply the detour path including a path from the first spine to the second leaf via a third leaf and a second spine. In yet another embodiment, the first spine is configured to receive packets destined to the second leaf via the second link, from a remote spine outside the group, and in response to detecting by the first spine that the second link has failed, the spines and leaves in the group are configured to apply the detour path including a partial path from the first spine to the second leaf via a third leaf and a second spine.
In some embodiments, the multiple spines and the multiple leaves are arranged in multiple groups, each group including multiple spines and multiple leaves interconnected in a bipartite topology, each group connects to other groups using spine-to-spine links, and a topology of the multiple spines and multiple leaves is deadlock-free using up to a number Nv of Virtual Lanes (VLs). When a single link failure occurs within the group but not in any other link in the topology, the spines and the leaves in the group are configured to resolve the failing link using a detour path that includes a detour link in a spine-to-leaf direction and another detour link delivering packets in a leaf-to-spine direction, and the topology including the detour path is also deadlock-free using up to Nv VLs. In other embodiments, a first spine in a first group connects via a first link to a second spine in a second group and connects via a second link to a third spine in the second group, both the second spine and the third spine connect to a common leaf in the second group, and in response to detecting, by the first spine, that the first link has failed, the first spine is configured to forward packets to the common leaf via the second link. In yet other embodiments, the spines and leaves are configured to support source node to destination node paths having up to four concatenated links, and in response to two or more single-link failures occurring within respective two or more groups simultaneously, the spines and leaves in the two or more groups are configured to resolve the link failures locally, using respective two or more detour paths, each detour path included a detour link that delivers packets in a spine-to-leaf direction and another detour link that delivers packets in a leaf-to-spine direction, and the topology including the two or more detour paths remains deadlock-free.
In an embodiment, a given spine and a given leaf in the group are preselected to serve as a detour link in a leaf-to-spine direction, and the at least some of the spines and leaves in the group are configured to apply a given detour path that includes a spine-to-leaf link and the detour link that resolves a link failure between another spine and another leaf in the group. In another embodiment, the group including Ns spines and Nl leaves, and the at least some of the spines and leaves in the group are configured to resolve, using a detour path that includes a spine-to-leaf link and the detour link, up to (N−1) simultaneous link failures within the group, N being a smallest number between Ns and Nl. In yet another embodiment, in response to detecting, by a leaf connected via a given link to the given spine that the given link has failed, the leaf is configured to connect to another spine for serving as a detour link with the given leaf instead of the given spine, and to notify the other leaves in the group to connect to the another spine.
In some embodiments, in response to detecting, by a spine connected via a given link to the given leaf that the given link has failed, the spine is configured to connect to another leaf for serving as a detour link with the given spine instead of the given leaf, and to notify the other spines in the group to connect to the another leaf. In other embodiments, the group belongs to a plurality of groups interconnected using spine-to-spine links, in each of the groups respective detour link in a spine-to-leaf direction and another detour link in a leaf-to-spine direction are preselected for locally resolving, using a detour path that includes the respective detour link and another detour link, up to a respective number N′ of simultaneous link failures smaller than both the number of spines and the number of leaves in the group, the spines and the leaves in the groups support source node to destination node paths having up to four concatenated links, and a topology of the spines and the leaves in the groups is deadlock-free even when numbers up to N′ of link failures are resolved simultaneously in the respective groups using the respective detour links.
There is additionally provided, in accordance with an embodiment that is described herein, a method including, in a computing system that includes multiple network elements arranged in at least one group, a plurality of the network elements in the group are designated as spines and another plurality are designated as leaves, the spines and the leaves in the group are interconnected in a bipartite topology, the method including receiving in a first leaf, from a source node, packets destined to be delivered to a destination node via a second leaf, and forwarding the packets by the first leaf, via a first link, to a first spine, and forwarding the packets by the first spine to the second leaf via a second link. In response to detecting that the second link has failed a detour path is applied from the first leaf to the second leaf, the detour path including a detour link that delivers packets in a spine-to-leaf direction and a detour link that delivers packets in a leaf-to-spine direction. Subsequent packets, which are received in the first leaf and are destined to the second leaf are forwarded via the detour path.
These and other embodiments will be more fully understood from the following detailed description of the embodiments thereof, taken together with the drawings in which:
Embodiments that are described herein provide improved methods and systems for recovering from link failures in a network.
A computing system typically comprises a network built from multiple network elements interconnected by links. When a link in the network fails, packets that are normally forwarded via this link may be dropped until establishing an alternative path to the destination.
In principle, the network may comprise a central entity that detects or is notified of a failing link and reconfigures one or more of the network elements so as to create an alternative path to the destination. Centralized recovery methods of this sort, however, react slowly and may take on the order of seconds, which is typically unacceptable in terms of network reliability.
Lossless networks typically apply flow control techniques to prevent buffer overfill and packet drop events. Rerouting in such networks, however, may result in buffers of multiple switches interconnected cyclically becoming full, preventing these switches from further sending or receiving packets. Such an undesired condition is referred to as a “deadlock condition” or simply “deadlock” for brevity. One way to avoid deadlock is to allocate buffers to multiple Virtual lanes (VLs), but this requires extra storage space. As will be described below, using certain detour paths, link failures are resolvable without causing deadlock.
In the disclosed embodiments, switches recover from a link failure by applying a local detour path, independently of remote link failures. This approach provides a fast recovery mechanism, until the link is fixed, or until a central entity reconfigures an alternative path. The disclosed embodiments are applicable for example, to topologies comprising one or more interconnected groups having bipartite topology.
In some embodiments, a computing system comprises multiple network elements arranged in at least one group, wherein a plurality of the network elements in the group are designated as spines and another plurality are designated as leaves. The spines and the leaves in the group are interconnected in a bipartite topology. The spines and leaves in the group are configured to receive in a first leaf, from a source node, packets destined to be delivered to a destination node via a second leaf. The first leaf forwards the packets via a first link to a first spine, which forwards the packets to the second leaf via a second link. In response to detecting that the second link has failed, at least some of the spines and leaves apply a detour path from the first leaf to the second leaf, the detour path including a detour link that delivers packets in a spine-to-leaf direction and a detour link that delivers packets in a leaf-to-spine direction. The spines and leaves forward subsequent packets, which are received in the first leaf and are destined to the second leaf, via the detour path.
The spines and leaves may apply the detour path in various ways. In one embodiment, the detour path is predefined, and the spines and leaves in the group are configured to apply the predefined detour path. In another embodiment, the spines and leaves in the group are configured to apply the detour path by communicating with one another. In yet another embodiment, the failing link connects to a given port of a spine or a leaf, and the spine or the leaf is configured to apply the detour path by forwarding received packets to a port different from the given port.
In some embodiments, in response to detecting by the first leaf that the first link has failed, the spines and leaves in the group are configured to select an alternative path from the first leaf to the second leaf via a second spine. In other embodiments, in response to detecting by the first spine that the second link has failed and further detecting by the first leaf that the first link is operative, the spines and leaves in the group are configured to apply the detour path including a path from the first spine to the second leaf via a third leaf and a second spine.
In some embodiments, the multiple spines and the multiple leaves are arranged in multiple groups, each group comprising multiple spines and multiple leaves interconnected in a bipartite topology, wherein each group connects to other groups using spine-to-spine links. This topology, also referred to herein as a “multi-group topology,” is deadlock-free using up to a number Nv of Virtual Lanes (VLs). As an example, the Dragonfly Plus (DF+) topology comprises multiple bipartite groups and is deadlock-free using two VL values denoted, e.g., VL0 and VL1.
When a single link failure occurs within a group but not in any other link in the topology, at least some of the spines and leaves in the group are configured to resolve the failing link using a detour path that includes a detour link delivering packets in a spine-to-leaf direction and a detour link delivering packets in a leaf-to-spine direction. It can be shown that the multi-group topology including the detour path is also deadlock-free using up to Nv VLs. This is advantages because increasing the number of VLs used requires additional buffering space in memory.
The multi-group topology supports recovering from an inter-group link failure using an alternative inter-group link. The multi-group topology supports 3-hop, 4-hop and 6-hop paths from a source node to a destination node. It can be shown that if no 6-hop paths are used, multiple simultaneous intra-group single-link failures can be resolved by applying local detour paths in the respective groups, while the multi-group topology with the applied detour paths remaining deadlock-free.
In some embodiments, a given spine and a given leaf in a group are preselected to serve as a default detour link in a leaf-to-spine direction. In such embodiments, the spines and leaves in the group are configured to apply a given detour path that includes a detour link in a spine-to-leaf direction and the detour link, and that resolves a link failure between any other spine and any other leaf in the group (when the bipartite is fully connected). Consider, for example, a group comprising Ns spines and Nl leaves. The spines and leaves in the group are configured to resolve, using a detour path that includes the default detour link, up to (N−1) simultaneous link failures within the group, N being a smallest number between Ns and Nl. Resolving (N−1) simultaneous failures is possible when the bipartite topology is fully connected.
When a leaf connected via a given link to the given spine detects that the given link has failed, the leaf is configured to connect to another spine for serving as a default detour link with the given leaf instead of the given spine. The leaf also notifies the other leaves in the group to connect to the other spine. When a spine connected via a given link to the given leaf detects that the given link has failed, the spine is configured to connect to another leaf for serving as a default detour link with the leaf instead of the given leaf. The spine also notifies the other spines in the group to connect to the other leaf.
The method of predefining a default detour link that is shared among multiple detour paths, as described above, is applicable also in multi-group topologies. In such embodiments, using a detour path that includes the respective detour link, up to a respective number N′ of simultaneous link failures smaller than both the number of spines and the number of leaves in the group can be resolved, under a constraint of source to destination node paths having up to four concatenated links. The multi-group topology is deadlock-free even when numbers up to N′ of link failures are resolved simultaneously in the respective groups using the respective detour links. N′ is achievable when the groups comprise fully connected bipartite topologies.
In the disclosed techniques, spines and leaves in one group resolve local link failures independently of other groups. The group resolves the link failure by applying a detour path that includes a detour link from a leaf to a spine, without causing deadlock. This allows fast rerouting for resolving link failures in complex topologies such as the DF+.
In computing system 20 network nodes 24 communicate with one another over a network 26, which is built from multiple network elements 28. In the example of
In the example of
In general, a bipartite graph refers to a graph in which vertices are partitioned into two sets, and every edge in the graph has an endpoint in each of the two sets. In the present context, a bipartite topology comprises multiple spines and multiple leaves, wherein each spine may connect to one or more leaves, and each leaf may connect to one or more spines. In other words, spine-to-spine and leaf-to-leaf links are not allowed. A bipartite topology is referred to as “fully connected” when each spine connects to all leaves and each leaf connects to all spines. In general, however, a bipartite topology is not necessarily fully connected, in which case, a spine (or leaf) may connect to a partial subset of the entire leaves (spines).
In the example of
Each port 32 serves both as an ingress port for receiving packets from another switch or from a network node, and as an egress port for transmitting packets to another switch or to a network node. Packet processor 34 applies to packets received via ports 32 various processing such as verification, filtering, prioritization, and forwarding. Packet processor 34 applies to packets to be transmitted to the network processing such as modifying a Virtual Lane (VL) with which the packets are associated.
Packet processor 34 may perform packet forwarding using a forwarding table 38, based, for example, on source and destination addresses carried in a packet header. Using the forwarding table, the switch determines an egress port for each received packet. Switch 28 stores received packets that have been processed and await transmission in queues in memory 36. In alternative embodiments, other packet processing and forwarding methods such as using Access Control Lists (ACLs) can also be used.
Switch 28 comprises a switch controller 40. Among other tasks, switch controller 40 updates forwarding table 38 for creating, together with other switches in network 26, a detour path that resolves a network malfunction due to a link failure. In some embodiments, the switch controller stores one or more predefined detour paths. Upon a link failure, the switch controller updates forwarding table 38 in accordance with a respective predefined detour path. In other embodiments, switch controller 40 communicates with other switches in network 26 for selecting a detour path, and applies the selected detour path by updating forwarding table 38.
In
Let “Li(n−m)” denote an ith leaf forwarding packets received via port ‘n’ to port ‘m’. Similarly, let “Sj(k−1)” denote a jth spine forwarding packets received via port ‘k’ to port ‘l’. Using these notations, the initial path from SRC node to DST node is given by: SRC node→L1(5-1)→S2(0-2)→L3(1-6)→DST node.
Let “Li(n)” denote the nth port of leaf Li, and let “Sj(m)” denote the mth port of spine Sj. Within the bipartite topology, the initial path includes a first link denoted “Link1” from L1(1) to S2(0), and a second link denoted “Link2” from S2(2) to L3(1). When one of Link1 and Link2 fails, the entire path from SRC node to DST node fails. Next the cases of Link1 or Link2 failing are described separately.
In response to detecting by L1 that Link1 has failed, the spines and the leaves in network 26 apply an alternative path from L1 to the L3 via a spine other than S2. In the example of
In response to detecting by S2 that Link2 has failed, and further detecting by L1 that Link1 is operative, the spines and the leaves in network 26 apply a detour path that includes a path from spine S2 to leaf L3 via another leaf, e.g., L2 and another spine, e.g., S4. In this example, the detour path is given by SRC node→L1(5-1)→S2(0-1)→L2(1-3)→S4(1-2)→L3(3-6)→DST node. When applying the alternative path, packets received at port 0 of S2 and destined to DST node are forwarded to port 1 of S2 (and not to port 2 as in the initial path).
Note that unlike the alternative path applied when Link1 fails, a detour path applied when Link2 fails includes a detour link from a leaf to a spine. In the example of
In the description that follows and in the claims the term “detour path” refers to a path established within a local group of spines and leaves, the detour path includes a spine-to-leaf detour link and a leaf-to-spine detour link.
The alternative path and the detour path described in the examples above are not unique, and other alternative and detour paths can also be used. For example, a different detour path given by SRC node→L1(5-1)→S2(0-1)→L2(1-2)→S3(1-2)→L3(2-6)→DST node, can also be used.
Similarly to computing system 20 of
In computing system 50 network nodes 24 communicate with one another over network 26. Some of network nodes 24 such as a network node denoted “LCL node” are local nodes coupled to the leaves of network 26. Other network nodes 24 such as a network node denoted “RMT node” are remote nodes that are indirectly coupled to the spines of network 26. As will be described further below, a remote network node may comprise, for example, a local network node in another group of spines and leaves.
In
In response to detecting by S1 that Link1 has failed, the spines and leaves in network 26 are configured to apply a detour path including a partial path from the S1 to the L3 via another leaf and another spine. In the example of
Network 26 in
Computing systems 20 and 50 may be used in various applications such as in High Performance Computing (HPC) and in datacenters.
Consider first a 2-level Fat-Tree (FT) topology in which a single link fails. The failing link may be any link connecting between the spines and leaves of the 2-level FT topology and that can be bypassed using a detour path. It can be shown that in a 2-level FT topology, a detour path that includes a single leaf-to-spine detour link is deadlock-free. This means that any link failure in a 2-level FT can be resolved using a detour path without causing deadlock. This argument is based on a necessary condition according to which preventing deadlock requires preventing cyclic paths having a length larger than two. In the 2-level FT case, it can be shown that a three-link cyclic path does not exist, and that cyclic paths having four or more links contain at least two leaf-to-spine detour paths.
Based on the above argument, in an embodiment, a method for recovery from a single link failure in a 2-level FT includes the following steps:
Next consider an embodiment comprising a 2-level FT in which a spine and a leaf are preselected to serve as a default detour link in the leaf-to-spine direction. These selected spine and leaf are also respectively referred to as a “detour spine” and a “detour leaf.” In
Using a default detour link allows resolving multiple link failures as described herein. Let Ns and Nl denote respective numbers of spines and leaves in the 2-level FT. Using detour paths that share the default detour link as described above, up to (N−1) simultaneous link failures within the 2-level FT can be resolved without credit loops, wherein N is the smallest number between Ns and Nl. This can be shown by showing that a corresponding connectivity graph has no cycles. Note that resolving (N−1) simultaneous link failures is achievable when the bipartite topology is fully connected. Otherwise, the number of link failures that can be resolved simultaneously is smaller than (N−1).
The default detour link may be included in a detour path only when both the preselected detour spine and detour leaf are accessible. For example, when a link from a leaf to the detour spine fails, the default detour link should be modified by replacing the given spine.
In some embodiments, in response to detecting, by a leaf connected via a given link to the detour spine, that the given link has failed, the leaf is configured to connect to an alternative spine for serving as a detour link with the leaf instead of the detour spine. The leaf also notifies the other leaves in the 2-level FT to connect to the alternative spine. For example, in
In some embodiments, in response to detecting, by a spine connected via a given link to the detour leaf that the given link has failed, the spine is configured to connect to another leaf for serving as a detour link with the leaf instead of the detour leaf. The spine also notifies the other spines in the 2-level FT to connect to the other leaf. For example, in
The method of
The method of
At a communication step 104, the spines and leaves forward received packets in accordance with the current forwarding tables used respectively by the spines and leaves. The method then splits into two branches depending on whether a link towards S1 or towards L1 fails.
In the left branch, at a leaf detection step 112, a leaf Li detects that the link between Li and the current detour spine S1 has failed. Li may comprise any of the bipartite leaves including L1. At a leaf notification step 116, Li notifies the other leaves of the link failure. At a spine replacement step 120, each of the leaves reconnects to a spine other than the current default spine. In an embodiment, to support an alternative detour link, each leaf reconnects to a spine connected to the subsequent port—(current port of Li)+1. Increasing the port number by one is carried out modulo the number of leaves.
In the right branch, at a spine detection step 124, a spine S1 detects that the link between Si and the current detour leaf L1 has failed. Si may comprise any of the bipartite spines including Si. At a spine notification step 128, spine Si notifies all the other spines of the link failure. At a leaf replacement step 132, each of the spines reconnects to a leaf other than the current detour leaf. In an embodiment, to support an alternative detour link, each of the spines reconnects to a leaf connected to the subsequent port—(current port of Si)+1. Increasing the port number by one is carried out modulo the number of spines.
Following step 120 or 132, the method loops back to step 104 to forward subsequent packets.
Computing system 150 may be used in various applications such as in High Performance Computing (HPC) and in datacenters.
In computing system 150, network nodes 154 are coupled to respective subnetworks (or groups) 158, each having a bipartite topology, e.g., such as network 26 of
In
Groups 158 may be interconnected (using spines) in various ways. For example, the groups may be interconnected in a Dragonfly Plus (DF+) topology, which is described, for example, in “Dragonfly+: Low Cost Topology for Scaling Datacenters,” Conference: HiPINEB 2017 The 3rd IEEE International Workshop on High-Performance Interconnection Networks in the Exascale and Big-Data Era, At Austin, Tex., USA, February, 2017. In small-size topologies, every spine in a group may be connected to every other group using multiple parallel global links. In medium-size topologies, every spine in a group may be connected to every other group using a single global link. In large-size topologies, each pair of groups may be interconnected using a single global link.
In the topology of
The topology of
The topology in
When all the topology links are operative, to prevent a deadlock condition, the 4-hop and 6-hop paths require modifying the VL value VL0 in the second link to VL1 in the third link. A local link failure within a group is resolved using a detour path as described above. A global link failure is resolved using the alternative link to another spine in the destination group, as described above.
Table 1 depicts a method assignment, for selecting using an Alternative Path (AP) method or a Detour path method for each link failure along the path.
As shown in Table 1, a non-final link along the path can be recovered using an alternative path. For example, when in a 3-hop path the first link G1(L1-S3) fails, it can be recovered by L1 connecting to G1(S2) that connects to G4(S3). A detour path is applied when a link fails within a destination group to which DST node connects.
Note that in the 3-hop path, the detour path modifies VL0 to VL1 in entering the leaf-to-spine detour link in the destination group. In contrast, in the 4-hop and 6-hop paths, the packets arrive the detour path in the destination group with a VL already modified from VL0 to VL1.
A detour path contains a spine-to-leaf link and a leaf-to-spine link, which would typically require to increase the VL value in packets traversing the from the spine-to-leaf link to the leaf-to-spine link to avoid a deadlock condition. In the example of
As will be shown herein, two VL values (e.g., VL0 and VL1) are sufficient for recovering from any single link failure in the entire topology of
Consider now a scenario in the topology of
Another mode of operation in the topology of
The configurations of computers systems 20 in
Some elements of network element 28, such as packet processor 34 and switch controller 40 may be implemented in hardware, e.g., in one or more Application-Specific Integrated Circuits (ASICs) or Field-Programmable Gate Arrays (FPGAs). Additionally or alternatively, some elements of the network element can be implemented using software, or using a combination of hardware and software elements.
Elements that are not necessary for understanding the principles of the present application, such as various interfaces, addressing circuits, timing and sequencing circuits and debugging circuits, have been omitted from
Memory 36 may comprise any suitable storage device using any suitable storage technology, such as, for example, a Random Access Memory (RAM).
In some embodiments, some of the functions of network elements 28 and 162 (e.g., functions of switch controller 40) may be carried out by a general-purpose processor, which is programmed in software to carry out the functions described herein. The software may be downloaded to the processor in electronic form, over a network, for example, or it may, alternatively or additionally, be provided and/or stored on non-transitory tangible media, such as magnetic, optical, or electronic memory.
The embodiments described above are given by way of example and other suitable embodiments can also be used. For example, although in some of the embodiments above the groups of spines and leaves are described as interconnected in a fully connected bipartite topology, this is not mandatory. The disclosed embodiments are applicable even when the bipartite groups of spines and leaves are not fully connected. In such embodiments, a detour path may be applicable only to a partial subset of the links that fail in the group.
The underlying network 26 in
Although the embodiments described herein mainly address Fat-Tree and Dragonfly+ topologies, the methods and systems described herein can also be used in other applications, such as in any other suitable topology containing groups based on the bipartite graph.
It will be appreciated that the embodiments described above are cited by way of example, and that the following claims are not limited to what has been particularly shown and described hereinabove. Rather, the scope includes both combinations and sub-combinations of the various features described hereinabove, as well as variations and modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not disclosed in the prior art. Documents incorporated by reference in the present patent application are to be considered an integral part of the application except that to the extent any terms are defined in these incorporated documents in a manner that conflicts with the definitions made explicitly or implicitly in the present specification, only the definitions in the present specification should be considered.
Number | Name | Date | Kind |
---|---|---|---|
4312064 | Bench et al. | Jan 1982 | A |
6115385 | Vig | Sep 2000 | A |
6169741 | Lemaire et al. | Jan 2001 | B1 |
6480500 | Erimli et al. | Nov 2002 | B1 |
6532211 | Rathonyi et al. | Mar 2003 | B1 |
6553028 | Tang et al. | Apr 2003 | B1 |
6614758 | Wong | Sep 2003 | B2 |
6665297 | Harigochi et al. | Dec 2003 | B1 |
6775268 | Wang et al. | Aug 2004 | B1 |
6795886 | Nguyen | Sep 2004 | B1 |
6804532 | Moon et al. | Oct 2004 | B1 |
6807175 | Jennings et al. | Oct 2004 | B1 |
6831918 | Kavak | Dec 2004 | B1 |
6912589 | Jain et al. | Jun 2005 | B1 |
6912604 | Tzeng et al. | Jun 2005 | B1 |
6950428 | Horst et al. | Sep 2005 | B1 |
7010607 | Bunton | Mar 2006 | B1 |
7076569 | Bailey et al. | Jul 2006 | B1 |
7221676 | Green et al. | May 2007 | B2 |
7234001 | Simpson et al. | Jun 2007 | B2 |
7274869 | Pan et al. | Sep 2007 | B1 |
7286535 | Ishikawa et al. | Oct 2007 | B2 |
7401157 | Costantino et al. | Jul 2008 | B2 |
7676597 | Kagan et al. | Mar 2010 | B2 |
7746854 | Ambe et al. | Jun 2010 | B2 |
7899930 | Turner et al. | Mar 2011 | B1 |
7924837 | Shabtay et al. | Apr 2011 | B1 |
7936770 | Frattura et al. | May 2011 | B1 |
7969980 | Florit et al. | Jun 2011 | B1 |
8094569 | Gunukula et al. | Jan 2012 | B2 |
8175094 | Bauchot et al. | May 2012 | B2 |
8195989 | Lu et al. | Jun 2012 | B1 |
8213315 | Crupnicoff et al. | Jul 2012 | B2 |
8401012 | Underwood et al. | Mar 2013 | B2 |
8489718 | Brar et al. | Jul 2013 | B1 |
8495194 | Brar et al. | Jul 2013 | B1 |
8570865 | Goldenberg et al. | Oct 2013 | B2 |
8576715 | Bloch et al. | Nov 2013 | B2 |
8605575 | Gunukula et al. | Dec 2013 | B2 |
8621111 | Marr et al. | Dec 2013 | B2 |
8625427 | Terry et al. | Jan 2014 | B1 |
8681641 | Sajassi et al. | Mar 2014 | B1 |
8755389 | Poutievski et al. | Jun 2014 | B1 |
8774063 | Beecroft | Jul 2014 | B2 |
8867356 | Bloch et al. | Oct 2014 | B2 |
8873567 | Mandal et al. | Oct 2014 | B1 |
8908704 | Koren et al. | Dec 2014 | B2 |
9014006 | Haramaty et al. | Apr 2015 | B2 |
9042234 | Liljenstolpe et al. | May 2015 | B1 |
9137143 | Parker et al. | Sep 2015 | B2 |
9231888 | Bogdanski et al. | Jan 2016 | B2 |
9264382 | Bogdanski et al. | Feb 2016 | B2 |
9385949 | Vershkov et al. | Jul 2016 | B2 |
9544185 | Yadav | Jan 2017 | B1 |
9548960 | Haramaty et al. | Jan 2017 | B2 |
9571400 | Mandal et al. | Feb 2017 | B1 |
9729473 | Haramaty et al. | Aug 2017 | B2 |
10200294 | Shpiner et al. | Feb 2019 | B2 |
10644995 | Levy et al. | May 2020 | B2 |
20010043564 | Bloch et al. | Nov 2001 | A1 |
20010043614 | Viswanadham et al. | Nov 2001 | A1 |
20020009073 | Furukawa et al. | Jan 2002 | A1 |
20020013844 | Garrett et al. | Jan 2002 | A1 |
20020026525 | Armitage | Feb 2002 | A1 |
20020039357 | Lipasti et al. | Apr 2002 | A1 |
20020071439 | Reeves et al. | Jun 2002 | A1 |
20020085586 | Tzeng | Jul 2002 | A1 |
20020136163 | Kawakami et al. | Sep 2002 | A1 |
20020138645 | Shinomiya et al. | Sep 2002 | A1 |
20020141412 | Wong | Oct 2002 | A1 |
20020165897 | Kagan et al. | Nov 2002 | A1 |
20020176363 | Durinovic-Johri et al. | Nov 2002 | A1 |
20030016624 | Bare | Jan 2003 | A1 |
20030039260 | Fujisawa | Feb 2003 | A1 |
20030065856 | Kagan et al. | Apr 2003 | A1 |
20030079005 | Myers et al. | Apr 2003 | A1 |
20030097438 | Bearden et al. | May 2003 | A1 |
20030223453 | Stoler et al. | Dec 2003 | A1 |
20040024903 | Costatino et al. | Feb 2004 | A1 |
20040062242 | Wadia et al. | Apr 2004 | A1 |
20040111651 | Mukherjee et al. | Jun 2004 | A1 |
20040202473 | Nakamura et al. | Oct 2004 | A1 |
20050013245 | Sreemanthula et al. | Jan 2005 | A1 |
20050154790 | Nagata et al. | Jul 2005 | A1 |
20050157641 | Roy | Jul 2005 | A1 |
20050259588 | Preguica | Nov 2005 | A1 |
20060126627 | Diouf | Jun 2006 | A1 |
20060143300 | See et al. | Jun 2006 | A1 |
20060182034 | Klinker et al. | Aug 2006 | A1 |
20060215645 | Kangyu | Sep 2006 | A1 |
20060291480 | Cho et al. | Dec 2006 | A1 |
20070030817 | Arunachalam et al. | Feb 2007 | A1 |
20070058536 | Vaananen et al. | Mar 2007 | A1 |
20070058646 | Hermoni | Mar 2007 | A1 |
20070070998 | Sethuram et al. | Mar 2007 | A1 |
20070091911 | Watanabe et al. | Apr 2007 | A1 |
20070104192 | Yoon et al. | May 2007 | A1 |
20070183418 | Riddoch et al. | Aug 2007 | A1 |
20070223470 | Stahl | Sep 2007 | A1 |
20070237083 | Oh et al. | Oct 2007 | A9 |
20080002690 | Ver Steeg et al. | Jan 2008 | A1 |
20080101378 | Krueger | May 2008 | A1 |
20080112413 | Pong | May 2008 | A1 |
20080165797 | Aceves | Jul 2008 | A1 |
20080186981 | Seto et al. | Aug 2008 | A1 |
20080189432 | Abali et al. | Aug 2008 | A1 |
20080267078 | Farinacci et al. | Oct 2008 | A1 |
20080298248 | Roeck et al. | Dec 2008 | A1 |
20090010159 | Brownell et al. | Jan 2009 | A1 |
20090022154 | Kiribe et al. | Jan 2009 | A1 |
20090097496 | Nakamura et al. | Apr 2009 | A1 |
20090103534 | Malledant et al. | Apr 2009 | A1 |
20090119565 | Park et al. | May 2009 | A1 |
20090262741 | Jungck et al. | Oct 2009 | A1 |
20100020796 | Park et al. | Jan 2010 | A1 |
20100039959 | Gilmartin | Feb 2010 | A1 |
20100049942 | Kim et al. | Feb 2010 | A1 |
20100111529 | Zeng et al. | May 2010 | A1 |
20100141428 | Mildenberger et al. | Jun 2010 | A1 |
20100216444 | Mariniello et al. | Aug 2010 | A1 |
20100284404 | Gopinath et al. | Nov 2010 | A1 |
20100290385 | Ankaiah et al. | Nov 2010 | A1 |
20100290458 | Assarpour et al. | Nov 2010 | A1 |
20100315958 | Luo et al. | Dec 2010 | A1 |
20110019673 | Fernandez | Jan 2011 | A1 |
20110080913 | Liu et al. | Apr 2011 | A1 |
20110085440 | Owens et al. | Apr 2011 | A1 |
20110085449 | Jeyachandran et al. | Apr 2011 | A1 |
20110090784 | Gan | Apr 2011 | A1 |
20110164496 | Loh et al. | Jul 2011 | A1 |
20110164518 | Daraiseh et al. | Jul 2011 | A1 |
20110225391 | Burroughs et al. | Sep 2011 | A1 |
20110249679 | Lin et al. | Oct 2011 | A1 |
20110255410 | Yamen et al. | Oct 2011 | A1 |
20110265006 | Morimura et al. | Oct 2011 | A1 |
20110299529 | Olsson et al. | Dec 2011 | A1 |
20120020207 | Corti et al. | Jan 2012 | A1 |
20120075999 | Ko et al. | Mar 2012 | A1 |
20120082057 | Welin et al. | Apr 2012 | A1 |
20120144065 | Parker et al. | Jun 2012 | A1 |
20120147752 | Ashwood-Smith et al. | Jun 2012 | A1 |
20120163797 | Wang | Jun 2012 | A1 |
20120170582 | Abts et al. | Jul 2012 | A1 |
20120207175 | Raman et al. | Aug 2012 | A1 |
20120287791 | Xi et al. | Nov 2012 | A1 |
20120300669 | Zahavi | Nov 2012 | A1 |
20120314706 | Liss | Dec 2012 | A1 |
20130044636 | Koponen et al. | Feb 2013 | A1 |
20130071116 | Ong | Mar 2013 | A1 |
20130083701 | Tomic et al. | Apr 2013 | A1 |
20130114599 | Arad | May 2013 | A1 |
20130114619 | Wakumoto | May 2013 | A1 |
20130159548 | Vasseur et al. | Jun 2013 | A1 |
20130170451 | Krause et al. | Jul 2013 | A1 |
20130182604 | Moreno et al. | Jul 2013 | A1 |
20130204933 | Cardona et al. | Aug 2013 | A1 |
20130208720 | Ellis et al. | Aug 2013 | A1 |
20130242745 | Umezuki | Sep 2013 | A1 |
20130259033 | Hefty | Oct 2013 | A1 |
20130297757 | Han et al. | Nov 2013 | A1 |
20130315237 | Kagan et al. | Nov 2013 | A1 |
20130322256 | Bader et al. | Dec 2013 | A1 |
20130329727 | Rajagopalan et al. | Dec 2013 | A1 |
20130336116 | Vasseur et al. | Dec 2013 | A1 |
20130336164 | Yang et al. | Dec 2013 | A1 |
20140016457 | Enyedi et al. | Jan 2014 | A1 |
20140022942 | Han et al. | Jan 2014 | A1 |
20140043959 | Owens et al. | Feb 2014 | A1 |
20140059440 | Sasaki et al. | Feb 2014 | A1 |
20140105034 | Sun | Apr 2014 | A1 |
20140140341 | Bataineh et al. | May 2014 | A1 |
20140169173 | Naouri et al. | Jun 2014 | A1 |
20140192646 | Mir et al. | Jul 2014 | A1 |
20140198636 | Thayalan et al. | Jul 2014 | A1 |
20140211808 | Koren et al. | Jul 2014 | A1 |
20140269305 | Nguyen | Sep 2014 | A1 |
20140313880 | Lu et al. | Oct 2014 | A1 |
20140328180 | Kim et al. | Nov 2014 | A1 |
20140343967 | Baker | Nov 2014 | A1 |
20150030033 | Vasseur et al. | Jan 2015 | A1 |
20150052252 | Gilde et al. | Feb 2015 | A1 |
20150092539 | Sivabalan et al. | Apr 2015 | A1 |
20150124815 | Beliveau et al. | May 2015 | A1 |
20150127797 | Attar et al. | May 2015 | A1 |
20150131663 | Brar et al. | May 2015 | A1 |
20150163144 | Koponen et al. | Jun 2015 | A1 |
20150172070 | Csaszar | Jun 2015 | A1 |
20150194215 | Douglas et al. | Jul 2015 | A1 |
20150195204 | Haramaty et al. | Jul 2015 | A1 |
20150249590 | Gusat et al. | Sep 2015 | A1 |
20150295858 | Chrysos et al. | Oct 2015 | A1 |
20150372916 | Haramaty et al. | Dec 2015 | A1 |
20160012004 | Arimilli et al. | Jan 2016 | A1 |
20160014636 | Bahr et al. | Jan 2016 | A1 |
20160028613 | Haramaty et al. | Jan 2016 | A1 |
20160043933 | Gopalarathnam | Feb 2016 | A1 |
20160080120 | Unger et al. | Mar 2016 | A1 |
20160080321 | Pan et al. | Mar 2016 | A1 |
20160182378 | Basavaraja et al. | Jun 2016 | A1 |
20160294715 | Raindel et al. | Oct 2016 | A1 |
20160380893 | Chopra et al. | Dec 2016 | A1 |
20170054445 | Wang | Feb 2017 | A1 |
20170054591 | Hyoudou et al. | Feb 2017 | A1 |
20170068669 | Levy et al. | Mar 2017 | A1 |
20170070474 | Haramaty et al. | Mar 2017 | A1 |
20170180243 | Haramaty et al. | Jun 2017 | A1 |
20170187614 | Haramaty et al. | Jun 2017 | A1 |
20170244630 | Levy et al. | Aug 2017 | A1 |
20170270119 | Kfir et al. | Sep 2017 | A1 |
20170286292 | Levy et al. | Oct 2017 | A1 |
20170331740 | Levy et al. | Nov 2017 | A1 |
20170358111 | Madsen | Dec 2017 | A1 |
20180026878 | Zahavi et al. | Jan 2018 | A1 |
20180062990 | Kumar | Mar 2018 | A1 |
20180089127 | Flajslik | Mar 2018 | A1 |
20180139132 | Edsall et al. | May 2018 | A1 |
20180302288 | Schmatz | Oct 2018 | A1 |
20200042667 | Swaminathan et al. | Feb 2020 | A1 |
20200067822 | Malhotra | Feb 2020 | A1 |
20200136956 | Neshat | Apr 2020 | A1 |
Number | Date | Country |
---|---|---|
2012037494 | Mar 2012 | WO |
2016105446 | Jun 2016 | WO |
Entry |
---|
Cisco, “Cisco ACI Remote Leaf Architecture White Paper”, Aug. 2019 (Year: 2019). |
K. Thulasiraman, M. Javed, T. Lin and G. Xue, “Logical topology augmentation for guaranteed survivability under multiple failures in IP-over-WDM optical network,” 2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS), 2009, pp. 1-3 (Year: 2009). |
Astiti, A., Rakhmatsyah, A., & Nugroho, M. A. (2018). Link failure emulation with dijkstra and bellman-ford algorithm in software defined network architecture (case study: Telkom university topology) doi:http://dx.doi.org/10.1109/ICoICT.2018.8528809 (Year: 2018). |
N. Kamiyama, R. Kawahara and H. Yoshino, “Network topology design considering detour traffic caused by link failure,” Networks 2008—The 13th International Telecommunications Network Strategy and Planning Symposium, 2008, pp. 1-8 (Year: 2008). |
Valadarsky et al., “Xpander: Towards Optimal-Performance Datacenters,” Proceedings of CoNEXT '16, pp. 205-219, Dec. 2016. |
Bilu et al., “Lifts, Discrepancy and Nearly Optimal Spectral Gap*,” Combinatorica, vol. 26, No. 5, Bolyai Society—Springer-Verlag, pp. 495-519, year 2006. |
Leiserson, C E., “Fat-Trees: Universal Networks for Hardware Efficient Supercomputing”, IEEE Transactions on Computers, vol. C-34, No. 10, pp. 892-901, Oct. 1985. |
Ohring et al., “On Generalized Fat Trees”, Proceedings of the 9th International Symposium on Parallel Processing, pp. 37-44, Santa Barbara, USA, Apr. 25-28, 1995. |
Zahavi, E., “D-Mod-K Routing Providing Non-Blocking Traffic for Shift Permutations on Real Life Fat Trees”, CCIT Technical Report #776, Technion—Israel Institute of Technology, Haifa, Israel, Aug. 2010. |
Yuan et al., “Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands”, Proceedings of ACM SIGMETRICS—the International Conference on Measurement and Modeling of Computer Systems, pp. 337-348, San Diego, USA, Jun. 12-16, 2007. |
Matsuoka S., “You Don't Really Need Big Fat Switches Anymore—Almost”, IPSJ SIG Technical Reports, vol. 2003, No. 83, pp. 157-162, year 2003. |
Kim et al., “Technology-Driven, Highly-Scalable Dragonfly Topology”, 35th International Symposium on Computer Architecture, pp. 77-78, Beijing, China, Jun. 21-25, 2008. |
Jiang et al., “Indirect Adaptive Routing on Large Scale Interconnection Networks”, 36th International Symposium on Computer Architecture, pp. 220-231, Austin, USA, Jun. 20-24, 2009. |
Minkenberg et al., “Adaptive Routing in Data Center Bridges”, Proceedings of 17th IEEE Symposium on High Performance Interconnects, New York, USA, pp. 33-41, Aug. 25-27, 2009. |
Kim et al., “Adaptive Routing in High-Radix Clos Network”, Proceedings of the 2006 ACM/IEEE Conference on Supercomputing (SC2006), Tampa, USA, Nov. 2006. |
Infiniband Trade Association, “InfiniBandTM Architecture Specification vol. 1”, Release 1.2.1, Nov. 2007. |
Culley et al., “Marker PDU Aligned Framing for TCP Specification”, IETF Network Working Group, RFC 5044, Oct. 2007. |
Shah et al., “Direct Data Placement over Reliable Transports”, IETF Network Working Group, RFC 5041, Oct. 2007. |
Martinez et al., “Supporting fully adaptive routing in Infiniband networks”, Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS'03),Apr. 22-26, 2003. |
Joseph, S., “Adaptive routing in distributed decentralized systems: NeuroGrid, Gnutella & Freenet”, Proceedings of Workshop on Infrastructure for Agents, MAS and Scalable MAS, Montreal, Canada, 11 pages, year 2001. |
Gusat et al., “R3C2: Reactive Route & Rate Control for CEE”, Proceedings of 18th IEEE Symposium on High Performance Interconnects, New York, USA, pp. 50-57, Aug. 10-27, 2010. |
Wu et al., “DARD: Distributed adaptive routing datacenter networks”, Proceedings of IEEE 32nd International Conference Distributed Computing Systems, pp. 32-41, Jun. 18-21, 2012. |
Ding et al., “Level-wise scheduling algorithm for fat tree interconnection networks”, Proceedings of the 2006 ACM/IEEE Conference on Supercomputing (SC 2006), 9 pages, Nov. 2006. |
Prisacari et al., “Performance implications of remote-only load balancing under adversarial traffic in Dragonflies”, Proceedings of the 8th International Workshop on Interconnection Network Architecture: On-Chip, Multi-Chip, 4 pages, Jan. 22, 2014. |
Li et al., “Multicast Replication Using Dual Lookups in Large Packet-Based Switches”, 2006 IET International Conference on Wireless, Mobile and Multimedia Networks, , pp. 1-3, Nov. 6-9, 2006. |
Nichols et al., “Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers”, Network Working Group, RFC 2474,20 pages, Dec. 1998. |
Microsoft., “How IPv4 Multicasting Works”, 22 pages, Mar. 28, 2003. |
Suchara et al., “Network Architecture for Joint Failure Recovery and Traffic Engineering”, Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, pp. 97-108, Jun. 7-11, 2011. |
IEEE 802.1Q, “IEEE Standard for Local and metropolitan area networks Virtual Bridged Local Area Networks”, IEEE Computer Society, 303 pages, May 19, 2006. |
Plummer, D., “An Ethernet Address Resolution Protocol,” Network Working Group ,Request for Comments (RFC) 826, 10 pages, Nov. 1982. |
Hinden et al., “IP Version 6 Addressing Architecture,” Network Working Group ,Request for Comments (RFC) 2373, 26 pages, Jul. 1998. |
Garcia et al., “On-the-Fly 10 Adaptive Routing in High-Radix Hierarchical Networks,” Proceedings of the 2012 International Conference on Parallel Processing (ICPP), pp. 279-288, Sep. 10-13, 2012. |
Dally et al., “Deadlock-Free Message Routing in Multiprocessor Interconnection Networks”, IEEE Transactions on Computers, vol. C-36, No. 5, May 1987, pp. 547-553. |
Nkposong et al., “Experiences with BGP in Large Scale Data Centers:Teaching an old protocol new tricks”, 44 pages, Jan. 31, 3014. |
“Equal-cost multi-path routing”, Wikipedia, 2 pages, Oct. 13, 2014. |
Thaler et al., “Multipath Issues in Unicast and Multicast Next-Hop Selection”, Network Working Group, RFC 2991, 9 pages, Nov. 2000. |
Glass et al., “The turn model for adaptive routing”, Journal of the ACM, vol. 41, No. 5, pp. 874-903, Sep. 1994. |
Mahalingam et al., “VXLAN: A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks”, Internet Draft, 20 pages, Aug. 22, 2012. |
Sinha et al., “Harnessing TCP's Burstiness with Flowlet Switching”, 3rd ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets), 6 pages, Nov. 11, 2004. |
Vishnu et al., “Hot-Spot Avoidance With Multi-Pathing Over InfiniBand: An MPI Perspective”, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid'07), 8 pages, year 2007. |
NOWLAB—Network Based Computing Lab, 2 pages, years 2002-2015 http://nowlab.cse.ohio-state.edu/publications/conf-presentations/2007/vishnu-ccgrid07.pdf. |
Alizadeh et al.,“CONGA: Distributed Congestion-Aware Load Balancing for Datacenters”, Cisco Systems, 12 pages, Aug. 9, 2014. |
Geoffray et al., “Adaptive Routing Strategies for Modern High Performance Networks”, 16th IEEE Symposium on High Performance Interconnects (HOTI '08), pp. 165-172, Aug. 26-28, 2008. |
Anderson et al., “On the Stability of Adaptive Routing in the Presence of Congestion Control”, IEEE Infocom, 11 pages, 2003. |
Perry et al., “Fastpass: A Centralized “Zero-Queue” Datacenter Network”, M.I.T. Computer Science & Artificial Intelligence Lab, 12 pages, year 2014. |
Afek et al., “Sampling and Large Flow Detection in SDN”, SIGCOMM '15, pp. 345-346, Aug. 17-21, 2015, London, UK. |
Amante et al., “IPv6 Flow Label Specification”, Request for Comments: 6437, 15 pages, Nov. 2011. |
Shpigelman et al, U.S. Appl. No. 16/240,749, filed Jan. 6, 2019. |
Shpiner et al., “Dragonfly+: Low Cost Topology for Scaling Datacenters”, IEEE 3rd International Workshop on High-Performance Interconnection Networks in the Exascale and Big-Data Era (HiPINEB), pp. 1-9, Feb. 2017. |
Zahavi et al., “Distributed Adaptive Routing for Big-Data Applications Running on Data Center Networks,” Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communication Systems, New York, USA, pp. 99-110, Oct. 29-30, 2012. |
MELLANOX White Paper, “The SHIELD: Self-Healing Interconnect,” pp. 1-2, year 2019. |
Cao et al., “Implementation Method for High-radix Fat-tree Deterministic Source-routing Interconnection Network”, Computer Science ,vol. 39. Issue 12, pp. 33-37, 2012. |
U.S. Appl. No. 17/079,543 Office Action dated Mar. 16, 2022. |
EP Application #21204582.7 Search Report dated Mar. 18, 2022. |
Number | Date | Country | |
---|---|---|---|
20220078104 A1 | Mar 2022 | US |