The increasing use of wireless telephones and personal computers by the general population has led to a corresponding demand for advanced telecommunication services that were once thought to only be meant for use in specialized applications.
For example, in the late 1980's, wireless voice communication such as available with cellular telephony had been the exclusive province of the businessman because of expected high subscriber costs. The same was also true for access to remotely distributed computer networks, whereby until very recently, only business people and large institutions could afford the necessary computers and wireline access equipment.
However, the general population now increasingly wishes to not only have access to networks such as the Internet and private intranets, but also to access such networks in a wireless fashion as well. This is particularly of concern for the users of portable computers, laptop computers, hand-held personal digital assistants and the like who would prefer to access such networks without being tethered to a telephone line.
There still is no widely available satisfactory solution for providing low cost, high speed access to the Internet and other networks using existing wireless networks. This situation is most likely an artifact of several unfortunate circumstances. For example, the typical manner of providing high speed data service in the business environment over the wireline network is not readily adaptable to the voice grade service available in most homes or offices. In addition, such standard high speed data services do not lend themselves well to efficient transmission over standard cellular wireless handsets.
Furthermore, the existing cellular network was originally designed only to deliver voice services. At present, the wireless modulation schemes in use continue their focus on delivering voice information with maximum data rates only in the range of 9.6 kbps being readily available. This is because the cellular switching network in most countries, including the United States, uses analog voice channels having a bandwidth from about 300 to 3600 Hertz. Such a low frequency channel does not lend itself directly to transmitting data at rates of 28.8 kilobits per second (kbps) or even the 56.6 kbps that is now commonly available using inexpensive wire line modems, and which rates are now thought to be the minimum acceptable data rates for Internet access.
Switching networks with higher speed building blocks are just now coming into use in the United States. Although certain wireline networks, called Integrated Services Digital Networks (ISDN), capable of higher speed data access have been known for a number of years, their costs have only been recently reduced to the point where they are attractive to the residential customer, even for wireline service. Although such networks were known at the time that cellular systems were originally deployed, for the most part, there is no provision for providing ISDN-grade data services over cellular network topologies.
ISDN is an inherently circuit switched protocol, and was, therefore, designed to continuously send bits in order to maintain synchronization from end node to end node to maintain a connection. Unfortunately, in wireless environments, access to channels is expensive and there is competition for them; the nature of the medium is such that they are expected to be shared. This is dissimilar to the usual wireline ISDN environment in which channels are not intended to be shared by definition.
In view of the foregoing background, an object of the present invention is to provide high speed data and voice service over standard wireless connections via a unique integration of ISDN protocols and existing cellular signaling such as is available with Code Division Multiple Access (CDMA) type digital cellular systems.
This and other objects, advantages and features in accordance with the present invention are provided by a method for operating a CDMA user device comprising establishing a communication session with at least one base station, with the communication session comprising a plurality of layers including a physical layer. A service configuration may be negotiated with the at least one base station, with the user device receiving at least one assigned subchannel from the at least one base station.
A physical layer connection may be established with the at least one base station on the at least one assigned subchannel, with the physical layer connection corresponding to the physical layer. The method may further comprises releasing the at least one assigned subchannel so that the physical layer connection is terminated, and maintaining a state of at least one other layer during the communication session after termination of the physical layer.
The at least one assigned subchannel may comprise a plurality of assigned subchannels. The releasing may occur when the user device does not have any data to transmit. The method may further comprise releasing all assigned subchannels so that the user device is in a dormant state.
A second service configuration may be negotiated with the at least one base station so that the user device receives at least one second assigned subchannel. The second negotiation may be performed after the user device has been in the dormant state. Negotiating the second service configuration does not require reestablishment of the state of the at least one other layer being maintained during the communication session.
Negotiating the service configuration may also comprise communicating a requested bandwidth allocation to the base station. The assigned subchannel may be less than the requested bandwidth. The at least one assigned subchannel may comprise a first assigned subchannel having a first bandwidth, and a second assigned subchannel having a second bandwidth less than the first bandwidth. The user device transmits voice and data on the at least one assigned subchannel.
The method may further comprise monitoring a data buffer associated with the second service connection. In addition, the method may further comprise monitoring a data buffer associated with the physical layer connection. The plurality of layers may include a network layer, and the state of the at least one other layer being maintained during the communication session is the network layer. A bandwidth associated with the service connection may be different than a bandwidth associated with the second service configuration.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views.
Turning attention now to the drawings more particularly,
The system 100 consists of two different types of components, including subscriber units 101, 102 and base stations 170. Both types of these components 101 and 170 cooperate to provide the functions necessary in order to achieve the desired implementation of the invention. The subscriber unit 101 provides wireless data services to a portable computing device 110 such as a laptop computer, portable computer, personal digital assistant (PDA) or the like. The base station 170 cooperates with the subscriber unit 101 to permit the transmission of data between the portable computing device 110 and other devices such as those connected to the Public Switched Telephone Network (PSTN) 180.
More particularly, data and/or voice services are also provided by the subscriber unit 101 to the portable computer 110 as well as one or more other devices such as telephones 112-1, 112-2 (collectively referred to herein as telephones 112. (The telephones 112 themselves may in turn be connected to other modems and computers which are not shown in
The subscriber unit 101 itself consists of an ISDN modem 120, a device referred to herein as the protocol converter 130 that performs the various functions according to the invention including spoofing 132 and bandwidth management 134, a CDMA transceiver 140, and subscriber unit antenna 150. The various components of the subscriber unit 101 may be realized in discrete devices or as an integrated unit. For example, an existing conventional ISDN modem 120 such as is readily available from any number of manufacturers may be used together with existing CDMA transceivers 140. In this case, the unique functions are provided entirely by the protocol converter 130 which may be sold as a separate device. Alternatively, the ISDN modem 120, protocol converter 130, and CDMA transceiver 140 may be integrated as a complete unit and sold as a single subscriber unit device 101.
The ISDN modem 120 converts data and voice signals between the terminal equipment 110 and 112 to format required by the standard ISDN “U” interface. The U interface is a reference point in ISDN systems that designates a point of the connection between the network termination (NT) and the telephone company.
The protocol converter 130 performs spoofing 132 and basic bandwidth management 134 functions, which will be described in greater detail below. In general, spoofing 132 consists of insuring that the subscriber unit 101 appears to the terminal equipment 110, 112 that is connected to the public switched telephone network 180 on the other side of the base station 170 at all times.
The bandwidth management function 134 is responsible for allocating and deallocating CDMA radio channels 160 as required. Bandwidth management also includes the dynamic management of the bandwidth allocated to a given session by dynamically assigning sub-portions of the CDMA channels 160 in a manner which is more fully described below.
The CDMA transceiver 140 accepts the data from the protocol converter 130 and reformats this data in appropriate form for transmission through a subscriber unit antenna 150 over CDMA radio link 160-1. The CDMA transceiver 140 may operate over only a single 1.25 MHZ radio frequency channel or, alternatively, in a preferred embodiment, may be tunable over multiple allocatable radio frequency channels.
CDMA signal transmissions are then received at the base station and processed by the base station equipment 170. The base station equipment 170 typically consists of multichannel antennas 171, multiple CDMA transceivers 172, and a bandwidth management functionality 174. Bandwidth management controls the allocation of CDMA radio channels 160 and subchannels. The base station 170 then couples the demodulated radio signals to the Public Switch Telephone Network (PSTN) 180 in a manner which is well known in the art. For example, the base station 170 may communicate with the PSTN 180 over any number of different efficient communication protocols such as primary rate ISDN, or other LAPD based protocols such as IS-634 or V5.2.
It should also be understood that data signals travel bidirectionally across the CDMA radio channels 160, i.e., data signals originate at the portable computer 110 are coupled to the PSTN 180, and data signals received from the PSTN 180 are coupled to the portable computer 110.
Other types of subscriber units such as unit 102 may be used to provide higher speed data services. Such subscriber units 102 typically provide a service referred to as nB+D type service that may use a so-called Primary Rate Interface (PRI) type protocol to communicate with the terminal equipment 110, 112. These units provide a higher speed service such as 512 kbps across the U interface. Operation of the protocol converter 130 and CDMA transceiver 140 are similar for the nB+D type subscriber unit 102 as previously described for subscriber unit 101, with the understanding that the number of radio links 160 to support subscriber unit 102 are greater in number or each have a greater bandwidth.
Turning attention now to
The protocol stack 220 used by the ISDN modem 120 is conventional for ISDN communications and includes, on the terminal equipment side, the analog to digital conversion (and digital to analog conversion) 221 and digital data formatting 222 at layer one, and an applications layer 223 at layer two. On the U interface side, the protocol functions include Basic Rate Interface (BRI) such as according to standard 1.430 at layer one, a LAPD protocol stack at layer two, such as specified by standard Q.921, and higher level network layer protocols such as Q.931 or X.227 and high level end to end signaling 228 required to establish network level sessions between modes.
The lower layers of the protocol stack 220 aggregate two bearer (B) channels to achieve a single 128 kilobits per second (kbps) data rate in a manner which is well known in the art. Similar functionality can be provided in a primary rate interface, such as used by subscriber unit 102, to aggregate multiple B channels to achieve up to 512 kbps data rate over the U interface.
The protocol stack 230 associated with the protocol converter 130 consists of a layer one basic rate interface 231 and a layer two LAPD interface 232 on the U interface side, to match the corresponding layers of the ISDN modem stack 220.
At the next higher layer, usually referred to as the network layer, a bandwidth management functionality 235 spans both the U interface side and the CDMA radio link side of the protocol converter stack 230. On the CDMA radio link side 160, the protocol depends upon the type of CDMA radio communication in use. An efficient wireless protocol referred to herein as EW[x] 234, encapsulates the layer one 231 and layer two 232 ISDN protocol stacks in such a manner that the terminal equipment 110 may be disconnected from one or more CDMA radio channels without interrupting a higher network layer session.
The base station 170 contains the matching CDMA 241 and EW[x] 242 protocols as well as bandwidth management 243. On the PSTN side, the protocols may convert back to basic rate interface 244 and LAPD 245 or may also include higher level network layer protocols as Q.931 or V5.2 246.
Call processing functionality 247 allows the network layer to set up and tear down channels and provide other processing required to support end to end session connections between nodes as is known in the art.
The spoofing function 132 performed by the EW[x] protocol 234 includes the necessary functions to keep the U interface for the ISDN connection properly maintained, even in the absence of a CDMA radio link 160 being available. This is necessary because ISDN, being a protocol originally developed for wire line connections, expects to send a continuous stream of synchronous data bits regardless of whether the terminal equipment at either end actually has any data to transmit. Without the spoofing function 132, radio links 160 of sufficient bandwidth to support at least a 192 kbps data rate would be required throughout the duration of an end to end network layer session, whether or not data is actually presented.
EW[x] 234 therefore involves having the CDMA transceiver 140 loop back these synchronous data bits over the ISDN communication path to spoof the terminal equipment 110, 112 into believing that a sufficiently wide wireless communication link 160 is continuously available. However, only when there is actually data present from the terminal equipment to the wireless transceiver 140 is wireless bandwidth allocated. Therefore, unlike the prior art, the network layer need not allocate the assigned wireless bandwidth for the entirety of the communications session. That is, when data is not being presented upon the terminal equipment to the network equipment, the bandwidth management function 235 deallocates initially assigned radio channel bandwidth 160 and makes it available for another transceiver and another subscriber unit 101.
In order to better understand how bandwidth management 235 and 243 accomplish the dynamic allocation of radio bandwidth; turn attention now to
Each of the CDMA transceivers, such as transceiver 140 in the subscriber unit 101 and transceivers 172 in the base station 170, are capable of being tuned at any given point in time to a given 1.25 MHZ radio frequency channel. It is generally understood that such 1.25 MHZ radio frequency carrier provides, at best, a total equivalent of about 500 to 600 kbps maximum data rate transmission within acceptable bit error rate limitations.
In the prior art, it was thus generally understood that in order to support an ISDN type like connection which may contain information at a rate of 128 kbps that, at best, only about (500 kbps/128 kbps) or only 3 ISDN subscriber units could be supported at best.
In contrast to this, the present invention subdivides the available approximately 500 to 600 kbps bandwidth into a relatively large number of subchannels. In the illustrated example, the bandwidth is divided into 64 subchannels 300, each providing an 8 kbps data rate. A given subchannel 300 is physically implemented by encoding a transmission with one of a number of different assignable pseudorandom codes. For example, the 64 subchannels 300 may be defined within a single CDMA RF carrier by using a different orthogonal Walsh codes for each defined subchannel 300.
The basic idea behind the invention is to allocate the subchannels 300 only as needed. For example, multiple subchannels 300 are granted during times when a particular ISDN subscriber unit 101 is requesting that large amounts of data be transferred. These subchannels 300 are released during times when the subscriber unit 101 is relatively lightly loaded.
Before discussing how the subchannels are preferably allocated and deallocated, it will help to understand a typical subscriber unit 101 in greater detail. Turning attention now to
In operation, the reverse link 420 first accepts channel data from the ISDN modem 120 over the U interface and forwards it to the ISDN reverse spoofer 432. Any repeating, redundant “echo” bits are removed from data received and, once extracted, sent to the forward spoofer 432. The remaining layer three and higher level bits are thus information that needs to be send over a wireless link.
This extracted data is sent to the voice decoder 424 or data handler 426, depending upon the type of data being processed.
Any D channel data from the ISDN modem 120 is sent directly to voice data detection 423 for insertion on the D channel inputs to the channel multiplexer 428. The voice data detection circuit 423 determines the content of the D channels by analyzing commands received on the D channel.
D channel commands may also be interpreted to control a class of wireless services provided. For example, the controller 410 may store a customer parameter table that contains information about the customers desired class of service which may include parameters such as maximum data rate and the like. Appropriate commands are thus sent to the channel multiplexer 428 to request one or more required subchannels 300 over the radio links 160 for communication. Then, depending upon whether the information is voice or data, either the voice decoder 424 or data handler 426 begins feeding data inputs to the channel multiplexer 428.
The channel multiplexer 428 may make further use of control signals provided by the voice data detection circuits 423, depending upon whether the information is voice or data.
In addition, the CPU controller 410, operating in connection with the channel multiplexer 428, assists in providing the necessary implementation of the EW[x] protocol 234 between the subscriber unit 101 and the base station 170. For example, subchannel requests, channel setup, and channel tear down commands are sent via commands placed on the wireless control channel 440. These commands are intercepted by the equivalent functionality in the base station 170 to cause the proper allocation of subchannels 300 to particular network layer sessions.
The data handler 426 provides an estimate of the data rate required to the CPU controller 410 so that appropriate commands can be sent over the control channel. 440 to allocate an appropriate number of subchannels. The data handler 426 may also perform packet assembly and buffering of the layer three data into the appropriate format for transmission.
The forward link 430 operates in analogous fashion. In particular, signals are first received from the channels 160 by the channel multiplexer 438. In response to receiving information on the control channels 440, control information is routed to the voice data detection circuit 433. Upon a determination that the received information contains data, the received bits are routed to the data handler 436. Alternatively, the information is voice information, and routed to the voice decoder 434.
Voice and data information are then sent to the ISDN forward spoofer 432 for construction into proper ISDN protocol format. This assembly of information is coordinated with the receipt of echo bits from the ISDN reverse spoofer 422 to maintain the proper expected synchronization on the U interface with the ISDN modem 120.
It can now be seen how a network layer communication session may be maintained even though wireless bandwidth initially allocated for transmission is reassigned to other uses when there is no information to transmit. In particular, the reverse 422 and forward 432 spoofers cooperate to loop back non-information bearing signals, such as flag patterns, sync bits, and other necessary information, so as to spoof the data terminal equipment connected to the ISDN modem 120 into continuing to operate as though the allocated wireless path over the CDMA transceiver 150 is continuously available.
Therefore, unless there is an actual need to transmit information from the terminal equipment being presented to the channel multiplexers 428, or actual information being received from the channel multiplexers 438, the invention may deallocate initially assigned subchannel 300, thus making them available for another subscriber unit 101 of the wireless system 100.
The CPU controller 410 may also perform additional functions to implement the EW[x] protocol 234, including error correction, packet buffering, and bit error rate measurement.
The functions necessary to implement bandwidth management 235 in the subscriber unit 101 are carried out in connection with the EW[x] protocol typically by the CPU controller 410 operating in cooperation with the channel multiplexers 428, 438, and data handlers 420, 436. In general, bandwidth assignments are made for each network layer session based upon measured short term data rate needs. One or more subchannels 300 are then assigned based upon these measurements and other parameters such as amount of data in queue or priority of service as assigned by the service provider. In addition, when a given session is idle, a connection is preferably still maintained end to end, although with a minimum number of, such as a single subchannel being assigned. For example, this single subchannel may eventually be dropped after a predetermined minimum idle time is observed.
In state 504, a request is made, such as via a control channel 440 for the allocation of a subchannel to subscriber unit 101. If a subchannel is not immediately available, a pacing state 506 may be entered in which the subscriber unit simply waits and queues its request for a subchannel to be assigned.
Eventually, a subchannel 300 is granted by the base station and the process continues to state 508. In this state, data transfer may then begin using the single assigned subchannel. The process will continue in this state as long as the single subchannel 300 is sufficient for maintaining the required data transfer and/or is being utilized. However, if the input buffer should become empty, such as notified by the data handler 426, then the process will proceed to a state 510. In this state 510, the subchannel will remain assigned in the event that data traffic again resumes. In this case, such as when the input buffer begins to once again become full and data is again ready to transmit, then the process returns to state 508. However, from state 510 should a low traffic timer expire, then the process proceeds to state 512 in which the single subchannel 300 is released. The process then returns to the idle state 502. In state 512, if a queue request is pending from states 506 or 516, the subchannel is used to satisfy such request instead of releasing it.
Returning to state 508, if instead the contents of the input buffer are beginning to fill at a rate which exceeds a predetermined threshold indicating that the single subchannel 300 is insufficient to maintain the necessary data flow, then a state 514 is entered in which more subchannels 300 are requested. A subchannel request message is again sent over the control channel 440 or through a subchannel 300 already allocated. If additional subchannels 300 are not immediately available, then a pacing state 516 may be entered and the request may be retried by returning to state 514 and 516 as required. Eventually, an additional subchannel will be granted and processing can return to state 508.
With the additional subchannels being now available, the processing continues to state 518 where data transfer may be made on a multiple N of the subchannels. This may be done at the same time through a channel bonding function or other mechanism for allocating the incoming data among the N subchannels. As the input buffer contents reduced below an empty threshold, then a waiting state 520 may be entered.
If, however, a buffer filling rate is exceeded, then state 514 may be entered in which more subchannels 300 are again requested.
In state 520, if a high traffic timer has expired, then one or more of the additional subchannels are released in state 522 and the process returns to state 508.
The base station forward link 620 functions analogously to the reverse link 420 in the subscriber unit 100, including a subchannel inverse multiplexer 622, voice data detection 623, voice decoder 624, data handler 626, and ISDN spoofer 622, with the understanding that the data is traveling in the opposite direction in the base station 170. Similarly, the base station reverse link 630 includes components analogous to those in the subscriber forward link 430, including an ISDN spoofer 632, voice data detection 633, voice decoder 634, data handler 636, and subchannel multiplexer 638. The base station 170 also requires a CPU controller 610.
One difference between the operation of the base station 170 and the subscriber unit 101 is in the implementation of the bandwidth management functionality 243. This may be implemented in the CPU controller 610 or in another process in the base station 170.
A high level description of a software process performed by dynamic channel allocation portion 650 of the bandwidth management 243 is contained in
The processing of port requests is more particularly detailed in a code module 720. These include upon receiving a port request, and reserving a subchannel for the new connection, preferably chosen from the least utilized section of the radio frequency bandwidth. Once the reservation is made, an RF channel frequency and code assignment are returned to the subscriber unit 101 and a table of subchannel allocations is updated. Otherwise, if subchannels are not available, then the port request is added to a queue of port requests. An expected waiting time may be estimated upon the number of pending port requests and priorities, and an appropriate wait message can be returned to the requesting subscriber unit 101.
In a bandwidth release module 730, the channel bonding function executing in the multiplexer 622 in the forward link is notified of the need to release a subchannel. The frequency and code are then returned to an available pool of subchannels and a radio record is updated.
The following bandwidth request module 740 may include selecting the request having the highest priority with lowest bandwidth utilization. Next, a list of available subchannels is analyzed for determining the greatest available number. Finally, subchannels are assigned based upon need, priority, and availability. A channel bandwidth bonding function is notified within the subchannel multiplexer 622 and the radio record which maintains which subchannels are assigned to which connections is updated.
In the bandwidth on demand algorithm, probability theory may typically be employed to manage the number of connections or available ports, and the spectrum needed to maintain expected throughput size and frequency of subchannel assignments. There may also be provisions for priority service based upon subscribers who have paid a premium for their service.
It should be understood, for example, that in the case of a supporting 128 kbps ISDN subscriber unit 101 that even more than 16×8 kbps subchannels may be allocated at a given time. In particular, one may allow a larger number, such as 20 subchannels, to be allocated to compensate for delay and reaction in assigning subchannels. This also permits dealing with bursts of data in a more efficient fashion such as typically experienced during the downloading of Web pages.
In addition, voice traffic may be prioritized as against data traffic. For example, if a voice call is detected, at least one subchannel 300 may be active at all times and allocated exclusively to the voice transfer. In that way, voice calls blocking probability will be minimized.
Equivalents
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
For example, instead of ISDN, other wireline digital protocols may be encapsulated by the EW[x] protocol, such as xDSL, Ethernet, and X.25, and therefore may advantageously use the dynamic wireless subchannel assignment scheme described herein.
Those skilled in the art will recognize or be able to ascertain using no more than routine experimentation, many equivalents to the specific embodiments of the invention described specifically herein. Such equivalents are intended to be encompassed in the scope of the claims.
This application is a Continuation of U.S. application Ser. No. 10/345,791 filed Jan. 16, 2003 now abandoned entitled “Dynamic Bandwidth Allocation to Transmit a Wireless Protocol Across a Code Division Multiple Access (CDMA) Radio Link, which is a Continuation of U.S. application Ser. No. 09/596,425 filed Jun. 19, 2000 now U.S. Pat. No. 6,526,281 entitled “Dynamic Bandwidth Allocation to Transmit a Wireless Protocol Across a Code Division Multiple Access (CDMA) Radio Link,” which in turn is a Continuation of U.S. application Ser. No. 08/992,760 filed Dec. 17, 1997, now U.S. Pat. No. 6,081,536 entitled “Dynamic Bandwidth Allocation to Transmit a Wireless Protocol Across a Code Division Multiple Access (CDMA) Radio Link,” which itself claims the benefit of U.S. Provisional Application No. 60/050,338 filed Jun. 20, 1997 entitled “Dynamic Bandwidth Allocation to Transmit a Wireless Protocol Across a Code Division Multiple Access (COMA) Radio Link,” and U.S. Provisional Application No. 60/050,277 filed Jun. 20, 1997 entitled “Protocol Conversion and Bandwidth Reduction Technique Providing Multiple nB+D ISDN Basic Rate Interface Links Over a Wireless Code Division Multiple Access Communication System,” the entire teachings of all of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4107469 | Jenkins | Aug 1978 | A |
4577316 | Schiff | Mar 1986 | A |
4625308 | Kim et al. | Nov 1986 | A |
4675863 | Paneth et al. | Jun 1987 | A |
4817089 | Paneth et al. | Mar 1989 | A |
4841526 | Wilson et al. | Jun 1989 | A |
4862453 | West et al. | Aug 1989 | A |
4866709 | West et al. | Sep 1989 | A |
4912705 | Paneth et al. | Mar 1990 | A |
4949395 | Rydbeck | Aug 1990 | A |
5022024 | Paneth et al. | Jun 1991 | A |
5027348 | Curry | Jun 1991 | A |
5027400 | Baji et al. | Jun 1991 | A |
5114375 | Wellhausen et al. | May 1992 | A |
5115309 | Hang | May 1992 | A |
5226044 | Gupta et al. | Jul 1993 | A |
5268900 | Hluchyj et al. | Dec 1993 | A |
5282222 | Fattouche et al. | Jan 1994 | A |
5325419 | Connolly et al. | Jun 1994 | A |
5355374 | Hester et al. | Oct 1994 | A |
5373502 | Turban | Dec 1994 | A |
5375124 | D'Ambrogio et al. | Dec 1994 | A |
5388102 | Griffith et al. | Feb 1995 | A |
5394473 | Davidson | Feb 1995 | A |
5412429 | Glover | May 1995 | A |
5442625 | Gitlin et al. | Aug 1995 | A |
5463629 | Ko | Oct 1995 | A |
5471463 | Hulbert | Nov 1995 | A |
5585850 | Schwaller | Dec 1996 | A |
5592470 | Rudrapatna et al. | Jan 1997 | A |
5592471 | Briskman | Jan 1997 | A |
5594782 | Zicker et al. | Jan 1997 | A |
5603081 | Raith et al. | Feb 1997 | A |
5606580 | Mourot et al. | Feb 1997 | A |
5617423 | Li et al. | Apr 1997 | A |
5642348 | Barzegar et al. | Jun 1997 | A |
5655001 | Cline et al. | Aug 1997 | A |
5657358 | Panech et al. | Aug 1997 | A |
5663958 | Ward | Sep 1997 | A |
5663990 | Bolgiano et al. | Sep 1997 | A |
5673259 | Quick, Jr. | Sep 1997 | A |
5687194 | Paneth et al. | Nov 1997 | A |
5697059 | Carney | Dec 1997 | A |
5699364 | Sato et al. | Dec 1997 | A |
5734646 | I et al. | Mar 1998 | A |
5781542 | Tanaka et al. | Jul 1998 | A |
5784406 | DeJaco et al. | Jul 1998 | A |
5790551 | Chan | Aug 1998 | A |
5793744 | Kanerva et al. | Aug 1998 | A |
5802465 | Hamalainen et al. | Sep 1998 | A |
5825807 | Kumar | Oct 1998 | A |
5828659 | Teder et al. | Oct 1998 | A |
5828662 | Jalali et al. | Oct 1998 | A |
5844894 | Dent | Dec 1998 | A |
5845211 | Roach | Dec 1998 | A |
5854786 | Henderson et al. | Dec 1998 | A |
5856971 | Gitlin et al. | Jan 1999 | A |
5859840 | Tiedemann, Jr. et al. | Jan 1999 | A |
5859879 | Bolgiano et al. | Jan 1999 | A |
5872786 | Shobatake | Feb 1999 | A |
5881060 | Morrow et al. | Mar 1999 | A |
5896376 | Alperovich et al. | Apr 1999 | A |
5910945 | Garrison et al. | Jun 1999 | A |
5914950 | Tiedemann, Jr. et al. | Jun 1999 | A |
5923650 | Chen et al. | Jul 1999 | A |
5930230 | Odenwalder et al. | Jul 1999 | A |
5950131 | Vilmur | Sep 1999 | A |
5956332 | Rasanen et al. | Sep 1999 | A |
5966374 | Rasanen | Oct 1999 | A |
5991279 | Haugli et al. | Nov 1999 | A |
6001800 | Mehta et al. | Dec 1999 | A |
6002690 | Takayama et al. | Dec 1999 | A |
6005855 | Zehavi et al. | Dec 1999 | A |
6009106 | Rustad et al. | Dec 1999 | A |
6011800 | Nadgauda et al. | Jan 2000 | A |
6028853 | Haartsen | Feb 2000 | A |
6028868 | Yeung et al. | Feb 2000 | A |
6052385 | Kanerva et al. | Apr 2000 | A |
6064678 | Sindhushayana et al. | May 2000 | A |
6069883 | Ejzak et al. | May 2000 | A |
6078572 | Tanno et al. | Jun 2000 | A |
6081536 | Gorsuch et al. | Jun 2000 | A |
6088335 | I et al. | Jul 2000 | A |
6097733 | Basu et al. | Aug 2000 | A |
6111863 | Rostoker et al. | Aug 2000 | A |
6112092 | Benveniste | Aug 2000 | A |
6134233 | Kay | Oct 2000 | A |
6151332 | Gorsuch et al. | Nov 2000 | A |
6157619 | Ozluturk et al. | Dec 2000 | A |
6161013 | Anderson et al. | Dec 2000 | A |
6195362 | Darcie et al. | Feb 2001 | B1 |
6198723 | Parruck et al. | Mar 2001 | B1 |
6208871 | Hall et al. | Mar 2001 | B1 |
6215798 | Carneheim et al. | Apr 2001 | B1 |
6222828 | Ohlson et al. | Apr 2001 | B1 |
6236647 | Amalfitano | May 2001 | B1 |
6243372 | Petch et al. | Jun 2001 | B1 |
6259683 | Sekine et al. | Jul 2001 | B1 |
6262980 | Leung et al. | Jul 2001 | B1 |
6269088 | Masui et al. | Jul 2001 | B1 |
6272168 | Lomp et al. | Aug 2001 | B1 |
6285665 | Chuah | Sep 2001 | B1 |
6307840 | Wheatley, III et al. | Oct 2001 | B1 |
6310859 | Morita et al. | Oct 2001 | B1 |
6366570 | Bhagalia | Apr 2002 | B1 |
6370117 | Koraitim et al. | Apr 2002 | B1 |
6373830 | Ozluturk | Apr 2002 | B1 |
6373834 | Lundh et al. | Apr 2002 | B1 |
6377548 | Chuah | Apr 2002 | B1 |
6377809 | Rezaiifar et al. | Apr 2002 | B1 |
6388999 | Gorsuch et al. | May 2002 | B1 |
6389000 | Jou | May 2002 | B1 |
6396804 | Odenwalder | May 2002 | B2 |
6418148 | Kumar et al. | Jul 2002 | B1 |
6456608 | Lomp | Sep 2002 | B1 |
6469991 | Chuah | Oct 2002 | B1 |
6473623 | Benveniste | Oct 2002 | B1 |
6504830 | Östberg et al. | Jan 2003 | B1 |
6519651 | Dillon | Feb 2003 | B1 |
6526039 | Dahlman et al. | Feb 2003 | B1 |
6526064 | Bousquet | Feb 2003 | B1 |
6526281 | Gorsuch et al. | Feb 2003 | B1 |
6532365 | Anderson et al. | Mar 2003 | B1 |
6542481 | Foore et al. | Apr 2003 | B2 |
6545986 | Stellakis | Apr 2003 | B1 |
6567416 | Chuah | May 2003 | B1 |
6570865 | Masui et al. | May 2003 | B2 |
6571296 | Dillon | May 2003 | B1 |
6574211 | Padovani et al. | Jun 2003 | B2 |
6597913 | Natarajan | Jul 2003 | B2 |
6845104 | Johnson et al. | Jan 2005 | B2 |
6973140 | Hoffman et al. | Dec 2005 | B2 |
20040160910 | Gorsuch et al. | Aug 2004 | A1 |
20040180696 | Foore et al. | Sep 2004 | A1 |
Number | Date | Country |
---|---|---|
4426183 | Oct 1995 | DE |
443061 | Aug 1991 | EP |
526106 | Feb 1993 | EP |
0526106 | Feb 1993 | EP |
635949 | Jan 1995 | EP |
0682423 | Nov 1995 | EP |
682423 | Nov 1995 | EP |
682426 | Nov 1995 | EP |
0682426 | Nov 1995 | EP |
0719062 | Jun 1996 | EP |
719062 | Jun 1996 | EP |
2761557 | Jan 1998 | FR |
9-55764 | Feb 1997 | JP |
2000-236343 | Aug 2000 | JP |
2000-286851 | Oct 2000 | JP |
2002-51044 | Apr 2002 | JP |
1837403 | Aug 1993 | RU |
1401626 | Jun 1988 | SU |
9507578 | Mar 1995 | WO |
9508900 | Mar 1995 | WO |
9608934 | Mar 1996 | WO |
9637081 | Nov 1996 | WO |
9627994 | Dec 1996 | WO |
9732412 | Apr 1997 | WO |
9723073 | Jun 1997 | WO |
9746044 | Dec 1997 | WO |
9859447 | Dec 1998 | WO |
9859523 | Dec 1998 | WO |
9944341 | Sep 1999 | WO |
9963713 | Dec 1999 | WO |
Number | Date | Country | |
---|---|---|---|
20040160915 A1 | Aug 2004 | US |
Number | Date | Country | |
---|---|---|---|
60050338 | Jun 1997 | US | |
60050277 | Jun 1997 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10345791 | Jan 2003 | US |
Child | 10776424 | US | |
Parent | 09596425 | Jun 2000 | US |
Child | 10345791 | US | |
Parent | 08992760 | Dec 1997 | US |
Child | 09596425 | US |