1. Field of the Invention
This invention relates to systems and methods for sending messages between two or more nodes in a network.
2. Description of the Related Art
A node is a start point, end point or redistribution point of data transmitted through a network. Typically, a node is configured to recognize, process and forward messages to other nodes in the network. For example, a local node can send a remote procedure call (RPC) to one or more remote nodes to request a service or information from a program located in the remote nodes. Some messages are sent one-way from a sending node to one or more receiving nodes. Other messages expect one or more of the receiving nodes to return a response to the sending node. The response may be an indication, for example, that the message was received or executed successfully. Generally, messages are sent over the network between nodes using a reliable protocol such as TCP or the like.
Some operations comprise multiple messages that are sent between two or more nodes in a network. For example, an operation for writing data to a distributed file system may comprise messages to allocate space for the data blocks, messages to set the size of the file and data blocks, messages to set block addresses, messages to update metadata for the file, messages to execute a commit protocol, and the like. The selection and order of the messages are controlled to successfully carry out the desired network operation. Generally, a sending node can send a series of messages synchronously or asynchronously. In synchronous operation, the sending node typically sends a message to and waits for a response from one or more of the receiving nodes. In asynchronous operation, processes or threads that share the same address space allow multiple messages to be sent by the sending node and processed by one or more receiving nodes concurrently.
It would be advantageous to develop a technique and system for passing control of message dependencies and ordering to participant nodes. In one embodiment, checkpoints are set in the batch to define dependencies among messages. Some messages may also be marked with error-handling information that can be used by both the initiator node and the participant nodes. The initiator node sends fewer collect messages and less time is spent waiting for responses; thus the transaction's messages are executed more quickly.
According to the foregoing, in one embodiment, a distributed system is provided. The distributed system may include a first storage unit; a second storage unit in communication with the first storage unit; wherein the first storage unit is configured to send a first message and a second message to the second storage unit; wherein the second message includes a checkpoint flag; and wherein the second storage unit is configured to selectively execute the first message and the second message in parallel based at least in part on whether the checkpoint flag is set, wherein, if the checkpoint flag is set, the second storage unit executes the first message to completion before executing the second message.
In another embodiment, a method is provided for coordinating transactions performed by participating nodes in a network. The method may include sending a plurality of messages from a first node to a second node, wherein at least one message comprises message dependency data; executing at least a portion of the plurality of messages on the second node, wherein the second node determines when to execute the plurality of messages based at least in part on the message dependency data; and synchronizing the first node with the second node.
In an additional embodiment, a method is provided for sending messages between nodes in a communication medium. The method may include transmitting a plurality of messages to one or more nodes, wherein at least one of the messages comprises message ordering information; and handling the messages in an order based at least in part on the message ordering information.
In a further embodiment, a message initiation system is provided. The message initiation system may be configured to transmit a first message to a remote system; and transmit a second message to the remote system, wherein the second message includes a first flag that indicates that the first message should execute before the second message.
In an additional embodiment, a message participant system is provided. The message participant system may be configured to receive a first message from a message initiation system; receive a second message from the message initiation system, wherein the second message includes a first flag that indicates that the first message should execute before the second message; execute the first message; and after the first message has completed execution, execute the second message.
For purposes of summarizing the invention, certain aspects, advantages and novel features of the invention have been described herein. It is to be understood that not necessarily all such advantages may be achieved in accordance with any particular embodiment of the invention. Thus, the invention may be embodied or carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other advantages as may be taught or suggested herein.
A program can be configured to batch multiple messages of a network operation. Batching is used to group multiple messages together into a collection that may be operated on as a whole. For example, an API may be configured to wait on all responses of a group of messages or to return a coalesced result code for a group of messages. Thus, responses from multiple asynchronous messages from one or more receiving nodes can be collected at the end of the batch and synchronized with the sending node. As used herein, an “initiator” is a node that starts, ends, sends messages and collects responses to the messages in the batch. A “participant” is a node that receives and executes messages in the batch. An artisan will recognize that an initiator can also be a participant.
The initiator 102 may also send multiple asynchronous messages 114, 116, 118 (shown as “MSG_B,” “MSG_C” and “MSG_D,” respectively) to the participant 104. The participant 104 executes the asynchronous messages 114, 116, 118 in parallel during a time period 120. Then, the initiator 102 sends a COLLECT message 122 to the participant 104. In other embodiments, the initiator 102 expects the time period 120 to have ended after a certain time and then after such time, the initiator 102 sends a COLLECT message 122 to the participant 104. Upon receiving the COLLECT message 122, the participant returns a response 124 (shown as “RSP_BCD”) corresponding to results of processing the asynchronous messages 114, 116, 118. The initiator 102 then sends an END message 126 to the participant 104.
While batching in the example shown in
For example, suppose execution of the third asynchronous message 118 blocks continued execution of the transaction 100 unless the participant 104 successfully executes the first and second asynchronous messages 114, 116 sent by the initiator 102. To prevent such blocking, the first and second asynchronous messages 114, 116, could be changed to synchronous messages that would each return an individual response (not shown). The initiator could then send the third asynchronous message 118 after receiving each of the individual responses. However, this would add additional time to the transaction 100 since the synchronous messages 114, 116 would not run in parallel and would require extra time for the responses to be communicated from the participant 104 to the initiator 102.
In another example shown in
In one embodiment of the invention, a participant node passes control of message dependencies and ordering to one or more participant nodes in a transaction. In this way, messages can be sent in parallel to the participant nodes and the participant nodes can execute the messages according to their respective dependencies without first sending a response and waiting for the next message to arrive.
In one embodiment, the participant nodes control message dependencies and ordering by receiving messages that are flagged with checkpoints in the batch to indicate that messages received before the checkpoint are to be executed before messages received after the checkpoint. In one embodiment, messages can also include error-handling information. For example, a message can be marked as “critical” such that if the message fails on a particular participating node, the initiator node does not send any more messages to that node until the critical error is cleared. Further, the participant node that had the critical failure discards any messages that have not yet been executed.
When the initiator node wants to know the result of marked messages or wait until sent messages have been processed by the participant nodes, the initiator node can send a collect message to the participant nodes. Sending a collect message and receiving a response to the collect message guarantees all messages in the batch have been executed and responded to (if the message has a response), or discarded if a critical error was set. In one embodiment, collecting also clears the critical error condition.
In the following description, reference is made to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific embodiments or processes in which the invention may be practiced. Where possible, the same reference numbers are used throughout the drawings to refer to the same or like components. In some instances, numerous specific details are set forth in order to provide a thorough understanding of the present invention. The present invention, however, may be practiced without the specific details or with certain alternative equivalent components and methods to those described herein. In other instances, well-known components and methods have not been described in detail so as not to unnecessarily obscure aspects of the present invention.
I. System
The nodes 202, 204, 206 respectively comprise remote block manager modules 212, 214, 216. As used herein, the word module is a broad term that has its ordinary and customary meaning and also refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, C or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware.
The remote block manager modules 212, 214, 216 are configured to control communication between the nodes 202, 204, 206 including, for example, transmitting messages, receiving messages, redistributing messages, executing received messages, providing responses to messages, combinations of the forgoing, or the like. In one embodiment, the remote block manager modules 212, 214, 216 are configured to communicate, RPC messages between nodes 202, 204, 206 over the communication medium 208 using TCP. An artisan will recognize from the disclosure herein, however, that other message or transmission protocols can be used.
In one embodiment, at least one of the nodes 202, 204, 206 comprises a storage unit in a distributed file system as described in U.S. patent application Ser. No. 10/007,003, filed Nov. 9, 2001, which is herein incorporated by reference. In addition, or in other embodiments, at least one of the nodes 202, 204, 206 may comprise a conventional computer or any device capable of communicating with the network 200 including, for example, a computer workstation, a LAN, a kiosk, a point-of-sale device, a personal digital assistant, an interactive wireless communication device, an interactive television, a transponder, or the like.
In a transaction among the nodes 202, 204, 206, one of the nodes 202, 204, 206 is configured to act as an initiator and one or more of the nodes 202, 204, 206 are configured to act as participants. In some embodiments, any of the nodes 202, 204, 206 may be selected to act as the initiator. In other embodiments, the initiator may be selected based at least in part on a service provided by at least one participant node requested by the initiator in the transaction. In some embodiments, an initiator may also be a participant in a particular transaction. An artisan will recognize from the disclosure herein that the network 200 is not limited to the three nodes 202, 204, 206 shown in
A. Remote Block Manager in Initiator Mode
The remote block manager module 212 of the initiator node 202 is configured to group messages together into a batch that may be operated on as a whole. As discussed in more detail below, the remote block manager module 212 of the initiator node 202 is configured to start a batch, end the batch, send messages in the batch, and collect any responses to the messages.
1. Checkpoints
The remote block manager module 212 is also configured to set one or more checkpoints in the batch in order to pass control of message dependencies and ordering to the participant nodes 204, 206. For example, the initiator node 202 can set a checkpoint between asynchronous messages sent in parallel to the participant nodes 204, 206 to signal that messages sent before the checkpoint are to be executed before messages sent after the checkpoint. Thus, delay in the overall transaction can be reduced because the initiator node 202 does not have to collect responses before sending messages that depend on the execution of prior messages. In one example, a required input of message X in a batch could be an output of a previous message; such that message X depends upon the previous message.
Separate checkpoint messages can be sent to the participant nodes 204, 206. In a preferred embodiment, however, the initiator node 202 does not send separate checkpoint messages. Rather, the remote block manager module 212 is configured to flag the next message in the batch to be sent to the participant nodes 204, 206 to indicate that a checkpoint precedes its handling. Thus, avoiding the time required to transmit a separate checkpoint message across the communication medium 208 reduces the delay in the overall transaction. Further, multiple checkpoints set by the remote block manager module 212 without an intervening message can be treated as a single checkpoint without a performance penalty that may be caused by a separate checkpoint message being sent across the network 200 to the participant nodes 204, 206.
In some embodiments, a checkpoint can be set on messages sent to a portion of the participant nodes 204, 206. For example, the remote block manager module 212 may be configured to set a particular checkpoint on a message sent to the participant node 204 without setting the checkpoint on the message sent to the participant node 206.
2. Marking Messages
In one embodiment, the remote block manager module 212 of the initiator node 202 is also configured to handle message failures by marking one or more messages in the batch as “critical.” If a critical message fails on one or more of the participant nodes 204 (for example, the remote block manager module 212 receives a “failure message” from one or more of the participant nodes), 206, the remote block manager module 212 is configured to stop sending messages to the node that had the failure. In some embodiments, the remote block manager module 212 may continue to send non-critical messages to the node that had the failure while not sending critical messages.
The remote block manager 212 may also be configured to mark certain messages to ignore a critical failure. For example, a message may be flagged to be sent to the participant node 204 even if a critical failure has already been reported on that node 204. As another example, a message may be flagged to be run on the participant node 204 even after a critical failure has occurred. In one embodiment, the remote block manager 212 may mark messages by sending a particular code in the message, though other marking techniques may be used.
3. Collecting Responses
The remote block manager module 212 of the initiator node 202 is also configured to synchronize with the participant nodes 204, 206 by collecting any responses to messages previously sent in the batch. Thus, the batch can be collected to verify the result of critical messages in the batch or wait until all messages have been processed by the participant nodes. In one embodiment, the remote block manager module 212 is configured to collect the batch by sending collect messages to the participant nodes 204, 206. In addition, or in other embodiments, collecting the batch clears any critical error condition that may exist on the initiator node so the batch can be used for any failure cleanup functions or cancellation messages.
B. Remote Block Manager in Participant Mode
The remote block manager modules 214, 216 of the respective participant nodes 204, 206 are configured to receive and execute messages in the batch and to send responses to the initiator node 202. The remote block manager modules 214, 216 are configured to execute one or more received messages in parallel and to start executing the messages in the order the messages were sent from the initiator node 202. However, if a message is flagged with a checkpoint, the remote block manager modules 214, 216 will not execute the message or any subsequent messages until the messages sent up to the checkpoint have been executed to completion. Thus, the remote block manager modules 214, 216 in the participant nodes 204, 206 can handle message dependencies without sending responses to the initiator node 202 and then waiting for the dependent message to be received.
As discussed above, the remote block manager modules 214, 216 of the respective participant nodes 204, 206 may receive one or more messages marked as critical. If a critical message fails during execution, messages that have not yet been processed will be discarded on the node that had the failure. In one embodiment, messages already being processed when the critical failure occurs will continue to run to completion. However, new messages or messages received but not yet executed will be discarded by the node that had the critical failure. As also discussed above, the remote block manager modules 214, 216 may be configured to execute certain flagged messages even after a critical failure has occurred. In some embodiments, after a critical failure has occurred, the remote block manager module 212 may send a “failure message” to the initiator node 202. Furthermore, in some embodiments, the remote block manager module 212 sends a status message for each message marked critical.
Upon receiving a collect message from the initiator node 202, each of the remote block manager modules 214, 216 of the respective participant nodes 204, 206 are configured to return a response comprising the results of one or more messages received since a previous collect message, if any, was received. The results may include, for example, indication that a critical failure has occurred during the execution of a message.
If a critical failure has occurred on a node, the respective remote block manager module 214, 216 will not return a response to the collect message until queued messages on or in-transit to the node are discarded and currently executing messages have run to completion. For a node that did not have a critical failure, the respective remote block manager module 214, 216 will not return a response to the collect message until queued messages on, in-transit to, or already running have been executed to completion. In addition, or in other embodiments, the remote block manager modules 214, 216 are configured to clear any critical error condition that may exist on its respective participant node 204, 206.
II. Exemplary Timing Diagram
The initiator 302 begins the transaction 300 by sending START messages 306 to the participants 304, 305. The exemplary START messages 306 are one way messages and do not have responses. The initiator 302 also sends a synchronous message 308 (shown as “MSG_A”) to the participants 304, 305. In this example, the batch includes a first checkpoint 307 between the sending of the START message 306 and the synchronous message 308. Thus, the synchronous message 308 includes a flag to indicate the occurrence of the first checkpoint 307 in the batch. Therefore, the participants 304, 305 do not execute the synchronous message 308 until the START message 306 executes to completion.
The participants 304, 305 process the synchronous messages 308 for respective periods of time 310, 310′, after which they return responses 312 (shown as “RSP_A”) corresponding to respective results of processing the synchronous message 308. After receiving the responses 312, the initiator 302 sends first asynchronous messages 314 (shown as “MSG_B”), second asynchronous messages 316 (shown as “MSG_C”) and third asynchronous messages 318 (shown as “MSG_D”) to the participants 304, 305. An artisan will recognize that the periods of time 310, 310′ or other time periods depicted in transaction 300 can be of arbitrary length and may be of differing lengths, possibly resulting in responses 312 or other responses being returned in an arbitrary order.
In this example, the batch includes a second checkpoint 317 between the second asynchronous messages 316 and the third asynchronous messages 318. Thus, the third asynchronous messages 318 include a flag to indicate the occurrence of the second checkpoint 317 in the batch. Therefore, the participants 304, 305 each execute the first asynchronous messages 314 and the second asynchronous messages 316 in parallel during respective time periods 320, 320′. After the first asynchronous messages 314 and the second asynchronous messages 316 execute to completion, the participants 304, 305 each execute the third asynchronous message 318 during respective time periods 321, 321′.
The initiator 302 then sends COLLECT messages 322 to the participants 304, 304. In some embodiments, the initiator 302 waits an expected elapsed time corresponding, for example, to the time periods 320, 320′, 321, 321′ before sending the COLLECT messages 322 to the participants 304, 305. Upon receiving the COLLECT messages 322, the participants 304, 305 return respective responses 324 (shown as “RESP_BCD”) corresponding to results of processing the asynchronous messages 314, 316, 318. The initiator 302 then sends END messages 326 to the participants 302, 304. The exemplary END messages 326 are one way messages and do not have responses.
As the above example illustrates, the initiator 302 can push control of message dependencies onto the participants 304, 305 by including checkpoints 307, 317 in the batch. The initiator 302 is guaranteed that the START message 306 will execute to completion before the synchronous message 308 executes even though the initiator 302 does not receive a response to the START message 306. Similarly, the initiator 302 can send the three asynchronous messages 314, 316, 318 without waiting for responses and still be guaranteed that the first asynchronous message 314 and the second asynchronous message 316 will execute to completion before the third asynchronous message 318 is executed. Thus, the transaction 300 can include message dependencies without substantially increasing the overall time of the transaction 300.
III. Distributed File System Example
In one embodiment, the message batching system may be used in a distributed file system, such as the systems described in U.S. patent application Ser. No. 10/007,003, filed Nov. 9, 2001 which claims priority to Application No. 60/309,803 filed Aug. 3, 2001, and U.S. patent application Ser. No. 10/714,326, filed Nov. 14, 2003, which claims priority to Application No. 60/426,464, filed Nov. 14, 2002, all of which are hereby incorporated herein by reference in their entirety. For example, the message batching system may be used to determine if write commands to the distributed nodes have executed without any failures before the original copies of the write data are deleted from the system. As another example, the message batching system may be used to ensure that the location of error correction data related to the write data has been stored before allowing reads to that data.
The nodes in the distributed file system comprise smart storage units that each comprise a remote block manager (RBM) configured to send RPC messages over a network using a reliable protocol such as TCP. As used herein, an “update-RPC” message is sent one-way with no response and an “RPC” message is an asynchronous or synchronous message that expects a response. For a particular transaction, one node acts as an initiator to start, end and collect a message batch. There are also one or more participant nodes that receive and execute the messages in the batch using “dev_local” message handlers. The one or more participant nodes may also send responses back to the initiator. The initiator may also be a participant in the transaction.
A. Initiator Process
int rbm_batch_start(rbm_batch_id_t*bidp);
wherein the bidp parameter points to a unique identifier generated by the RBM and stored in a preallocated memory location. The bidp parameter, also referred to as the batch identifier or bid, is used in all further operations in the batch.
Once the batch has been created in the block 402, the initiator may then select whether to send a message in the batch in a block 410, lookup message responses in a block 430 or collect message responses in a block 450. An artisan will recognize from the disclosure herein that the initiator's RBM may be configured to select the sequence that these blocks 410, 430, 450 are executed according to the particular transaction being performed by the batch.
In the block 410, the initiator may select to send a message in the batch, wherein the process 400 proceeds to a block 412. In the block 412, the initiator queries whether a checkpoint precedes the message in the batch. If yes, the initiator sets a checkpoint by calling the following function:
int rbm_batch_checkpoint(rbm_batch_id_t bid);
wherein bid is the returned identifier from the rbm_batch_start function. In this example, setting a checkpoint flag in the message in a block 414 sets the checkpoint.
In a block 416, the initiator queries whether there are additional message modifiers (i.e., other than the checkpoint flag). As discussed above, the additional message modifiers may include, for example, flags to mark the message as critical, as a message that should always be run, as a message that should always be sent, or the like. In one embodiment, all messages are marked as critical by default. In a block 418, the initiator sets the modifier flags.
The initiator may also check to see if any prior critical errors have cleared before sending messages. This check may be performed in the process 400, for example, anytime before the send message block 420. If prior critical errors have cleared, the initiator may proceed to block 420 and send the message. If not, then the initiator may wait until the critical error has cleared before sending any more messages. In other embodiments, the initiator may continue to send non-critical messages, but wait until the critical error is cleared before sending any critical messages.
In a block 420, the initiator sends the message by calling the following:
wherein the bid is the returned identifier from the rbm_batch_start function, devid is a device identifier of the destination (i.e., participant node) where the message is to be sent, and in_args define the arguments for the FOO message being sent. As discussed below, the slot_id parameter points to a preallocated memory area where a unique identifier is stored that is later used to lookup data returned by the message. Since update-RPC messages do not return data that needs to be fetched later, they do not have slot_id parameters.
The opts parameter is used to set the additional message modifier flags discussed above and may be any combination of the following:
Since update_RPC messages do not have responses to communicate a success or failure back to the initiator, they cannot be marked as critical and the opts parameter is omitted. However, in one embodiment, an update_RPC message can be made critical by changing it to an RPC message and discarding the response portion of the RPC message on the participant. This saves a round trip for messages where the normal response is not needed to proceed but an indication of success or failure is desired.
In the block 430, the initiator may select the option of looking up responses to message in the batch by calling the function:
wherein this lookup function fills out_args with the message response slot identified by the <bid, slot_id> token and frees the batch's internal storage associated with the slot_id. Until the lookup function is called, the response messages are held in the batch as a chain of mbufs in the order they arrived over the network.
If the message response has not yet arrived when the lookup function is called, the RBM will stay in a block 432 until the response is received in a block 436, the initiator receives notification that the message was discarded (for example, due to a critical error) in a block 438 or the participant disconnects from the network in a block 440. In a block 442, the lookup function fetches the message response and in a block 444 queries whether the response indicates that a critical error has occurred. If a critical error has occurred, the RBM sets a critical error condition in the initiator and new calls to rbm_batch_FOO will fail immediately. As discussed above, in some embodiments, if a critical error has occurred, the initiator may continue to send non-critical messages, but wait for the critical error to clear before sending critical messages.
In the block 450, the initiator may select the option of collecting the batch, wherein the process 400 proceeds to a block 452. In the block 452, the initiator sends a collect message to the participants by calling the following function:
int rbm_batch_collect(rbm_batch_id_t bid);
wherein the bid parameter is the returned identifier from the rbm_batch_start function. The RBM will stay in a block 454 until the initiator has received all RPC message responses in a block 456 or the initiator has received notification that RPC messages where no responses have been received were canceled due to a critical failure in a block 458. In a block 460, the RBM clears the critical error condition in the initiator. In one embodiment, if an rbm_batch_FOO function is called before an in-progress rbm_batch_collect function returns, the rbm_batch_FOO function will not execute until the collect is complete.
In a block 462, the process 400 queries whether the batch is complete. If yes, the initiator executes the following function:
int rbm_batch_end(rbm_batch_id_t bid);
wherein the bid parameter is the returned identifier from the rbm_batch_start function. In one embodiment, this function will not execute until all messages on all participants are complete. The function then removes the associated data structures on all nodes so that the batch can no longer be operated on and invalidates the bid parameter.
B. Participant Process
If a current message has been received in the block 504, the process 500 queries in a block 510 whether current message includes a checkpoint flag. If yes, the process proceeds to a block 512 wherein it waits until the previously received messages, if any, have been processed. If the checkpoint flag was not set in the current message or the previous messages have been processed, the process proceeds to a block wherein it queries whether a critical error condition has been set in the participant. If yes, the process 500 discards unprocessed messages, if any, in a block 516.
If a critical error condition is not set in the participant, the participant processes the current message in a block 518. In a block 520, the participant queries whether the current message failed. If yes, in a block 522, the participant queries whether a critical error flag is set in the current message. If the critical error flag is set, process 500 sets the critical error condition in the participant.
If the collect message has been received in the block 506, the process 500 queries in a block 526 whether the critical error condition is set in the participant. If the critical error condition is set in the participant, the process 500 waits in a block 528 until queued messages, if any, on or in-transit to the participant have been discarded. In some embodiments, if the critical error condition is set in the participant, the process 500 allows non-critical messages to remain active (for example, to remain in the queue) and only discards critical messages. In a block 530, the process queries whether all remaining messages on the participant are complete. If yes, the process 500 sends all outstanding message responses to the initiator in a block 532 and clears the critical error condition, if one exists, in the block 534.
If an end message has been received in the block 508, the process proceeds to a block 536 wherein the participant removes data structures corresponding to the batch and invalidates the bid parameter.
While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions.
This Appendix forms a part of the patent application Ser. No. 11/262,314 entitled “MESSAGE BATCHING WITH CHECKPOINTS SYSTEMS AND METHODS”.
This Appendix includes exemplary pseudocode for a remote block manager module (rbm) configured to send messages over a network between an initiator node and one or more participant nodes. It should be recognized, however, that the exemplary pseudocode is not meant to limit the scope of the invention, but only to provide details for a specific embodiment. This Appendix includes the Appendices incorporated by reference above from U.S. Provisional Application No. 60/623,848, filed Oct. 29, 2004 entitled “Message Batching with Checkpoints Systems and Methods,” and U.S. Provisional Application No. 60/628,528, filed Nov. 15, 2004 entitled “Message Batching with Checkpoints Systems and Methods,” which are hereby incorporated by reference herein in their entirety.
The following is in the IDP (Isilon Device Protocol) header packet:
Where batch_flags may be:
The following is a pointer parameter to all efsidp_FOO, efsidp_FOO_resp and dev_local_FOO functions:
New RBM message for batch collection. Batch ID etc transmitted via efsid_header. Note this is *not* a batchable message, but can be treated like one when processed by the participant.
Generic resp (new type)—
The present application claims priority benefit under 35 U.S.C. §119(e) from U.S. Provisional Application No. 60/623,848, filed Oct. 29, 2004 entitled “Message Batching with Checkpoints Systems and Methods,” and U.S. Provisional Application No. 60/628,528, filed Nov. 15, 2004 entitled “Message Batching with Checkpoints Systems and Methods.” The present application also hereby incorporates by reference herein both of the foregoing applications in their entirety. The present application relates to U.S. application Ser. No. 11/262,306, titled “Non-Blocking Commit Protocol Systems and Methods,” filed on Oct. 28, 2005, which claims priority to U.S. Provisional Application No. 60/623,843, filed Oct. 29, 2004 entitled “Non-Blocking Commit Protocol Systems and Methods;” and U.S. application Ser. No. 11/262,308, titled “Distributed System with Asynchronous Execution Systems and Methods,” filed on Oct. 28, 2005, which claims priority to U.S. Provisional Application No. 60/623,846, filed Oct. 29, 2004 entitled “Distributed System with Asynchronous Execution Systems and Methods,” and U.S. Provisional Application No. 60/628,527, filed Nov. 15, 2004 entitled “Distributed System with Asynchronous Execution Systems and Methods.” The present application hereby incorporates by reference herein all of the foregoing applications in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4780796 | Fukuda et al. | Oct 1988 | A |
5163131 | Row et al. | Nov 1992 | A |
5181162 | Smith et al. | Jan 1993 | A |
5212784 | Sparks | May 1993 | A |
5230047 | Frey et al. | Jul 1993 | A |
5251206 | Calvignac et al. | Oct 1993 | A |
5258984 | Menon et al. | Nov 1993 | A |
5329626 | Klein et al. | Jul 1994 | A |
5359594 | Gould et al. | Oct 1994 | A |
5403639 | Belsan et al. | Apr 1995 | A |
5423046 | Nunnelley et al. | Jun 1995 | A |
5459871 | Van Den Berg | Oct 1995 | A |
5548724 | Akizawa et al. | Aug 1996 | A |
5548795 | Au | Aug 1996 | A |
5568629 | Gentry et al. | Oct 1996 | A |
5596709 | Bond et al. | Jan 1997 | A |
5606669 | Bertin et al. | Feb 1997 | A |
5612865 | Dasgupta | Mar 1997 | A |
5649200 | Leblang et al. | Jul 1997 | A |
5657439 | Jones et al. | Aug 1997 | A |
5668943 | Attanasio et al. | Sep 1997 | A |
5680621 | Korenshtein | Oct 1997 | A |
5694593 | Baclawski | Dec 1997 | A |
5696895 | Hemphill et al. | Dec 1997 | A |
5734826 | Olnowich et al. | Mar 1998 | A |
5754756 | Watanabe et al. | May 1998 | A |
5761659 | Bertoni | Jun 1998 | A |
5774643 | Lubbers et al. | Jun 1998 | A |
5799305 | Bortvedt et al. | Aug 1998 | A |
5805578 | Stirpe et al. | Sep 1998 | A |
5805900 | Fagen et al. | Sep 1998 | A |
5806065 | Lomet | Sep 1998 | A |
5822790 | Mehrotra | Oct 1998 | A |
5862312 | Mann | Jan 1999 | A |
5870563 | Roper et al. | Feb 1999 | A |
5878410 | Zbikowski et al. | Mar 1999 | A |
5878414 | Hsiao et al. | Mar 1999 | A |
5884046 | Antonov | Mar 1999 | A |
5884098 | Mason, Jr. | Mar 1999 | A |
5884303 | Brown et al. | Mar 1999 | A |
5890147 | Peltonen et al. | Mar 1999 | A |
5917998 | Cabrera et al. | Jun 1999 | A |
5933834 | Aichelen | Aug 1999 | A |
5943690 | Dorricott et al. | Aug 1999 | A |
5963963 | Schmuck et al. | Oct 1999 | A |
5966707 | Van Huben et al. | Oct 1999 | A |
5983232 | Zhang | Nov 1999 | A |
5996089 | Mann | Nov 1999 | A |
6000007 | Leung et al. | Dec 1999 | A |
6014669 | Slaughter et al. | Jan 2000 | A |
6021414 | Fuller | Feb 2000 | A |
6029168 | Frey | Feb 2000 | A |
6038570 | Hitz et al. | Mar 2000 | A |
6044367 | Wolff | Mar 2000 | A |
6052759 | Stallmo et al. | Apr 2000 | A |
6055543 | Christensen et al. | Apr 2000 | A |
6055564 | Phaal | Apr 2000 | A |
6070172 | Lowe | May 2000 | A |
6081833 | Okamato et al. | Jun 2000 | A |
6081883 | Popelka et al. | Jun 2000 | A |
6108759 | Orcutt et al. | Aug 2000 | A |
6117181 | Dearth et al. | Sep 2000 | A |
6122754 | Litwin et al. | Sep 2000 | A |
6136176 | Wheeler et al. | Oct 2000 | A |
6138126 | Hitz et al. | Oct 2000 | A |
6154854 | Stallmo | Nov 2000 | A |
6169972 | Kono et al. | Jan 2001 | B1 |
6173374 | Heil et al. | Jan 2001 | B1 |
6202085 | Benson et al. | Mar 2001 | B1 |
6209059 | Ofer et al. | Mar 2001 | B1 |
6219693 | Napolitano et al. | Apr 2001 | B1 |
6226377 | Donaghue, Jr. | May 2001 | B1 |
6247108 | Long | Jun 2001 | B1 |
6279007 | Uppala | Aug 2001 | B1 |
6321345 | Mann | Nov 2001 | B1 |
6334168 | Islam et al. | Dec 2001 | B1 |
6334966 | Hahn et al. | Jan 2002 | B1 |
6353823 | Kumar | Mar 2002 | B1 |
6384626 | Tsai et al. | May 2002 | B2 |
6385626 | Tamer et al. | May 2002 | B1 |
6393483 | Latif et al. | May 2002 | B1 |
6397311 | Capps | May 2002 | B1 |
6405219 | Saether et al. | Jun 2002 | B2 |
6408313 | Campbell et al. | Jun 2002 | B1 |
6415259 | Wolfinger et al. | Jul 2002 | B1 |
6421781 | Fox et al. | Jul 2002 | B1 |
6434574 | Day et al. | Aug 2002 | B1 |
6449730 | Mann | Sep 2002 | B2 |
6453389 | Weinberger et al. | Sep 2002 | B1 |
6457139 | D'Errico et al. | Sep 2002 | B1 |
6463442 | Bent et al. | Oct 2002 | B1 |
6496842 | Lyness | Dec 2002 | B1 |
6499091 | Bergsten | Dec 2002 | B1 |
6502172 | Chang | Dec 2002 | B2 |
6502174 | Beardsley et al. | Dec 2002 | B1 |
6523130 | Hickman et al. | Feb 2003 | B1 |
6526478 | Kirby | Feb 2003 | B1 |
6546443 | Kakivaya et al. | Apr 2003 | B1 |
6549513 | Chao et al. | Apr 2003 | B1 |
6557114 | Mann | Apr 2003 | B2 |
6567894 | Hsu et al. | May 2003 | B1 |
6567926 | Mann | May 2003 | B2 |
6571244 | Larson | May 2003 | B1 |
6571349 | Mann | May 2003 | B1 |
6574745 | Mann | Jun 2003 | B2 |
6594655 | Tal et al. | Jul 2003 | B2 |
6594660 | Berkowitz et al. | Jul 2003 | B1 |
6594744 | Humlicek et al. | Jul 2003 | B1 |
6598174 | Parks et al. | Jul 2003 | B1 |
6618798 | Burton et al. | Sep 2003 | B1 |
6631411 | Welter et al. | Oct 2003 | B1 |
6658554 | Moshovos et al. | Dec 2003 | B1 |
6662184 | Friedberg | Dec 2003 | B1 |
6668304 | Satran et al. | Dec 2003 | B1 |
6671686 | Pardon et al. | Dec 2003 | B2 |
6671704 | Gondi et al. | Dec 2003 | B1 |
6671772 | Cousins | Dec 2003 | B1 |
6687805 | Cochran | Feb 2004 | B1 |
6725392 | Frey et al. | Apr 2004 | B1 |
6732125 | Autrey et al. | May 2004 | B1 |
6742020 | Dimitroff et al. | May 2004 | B1 |
6748429 | Talluri et al. | Jun 2004 | B1 |
6801949 | Bruck et al. | Oct 2004 | B1 |
6848029 | Coldewey | Jan 2005 | B2 |
6856591 | Ma et al. | Feb 2005 | B1 |
6871295 | Ulrich et al. | Mar 2005 | B2 |
6889231 | Souder et al. | May 2005 | B1 |
6895482 | Blackmon et al. | May 2005 | B1 |
6895534 | Wong et al. | May 2005 | B2 |
6907011 | Miller et al. | Jun 2005 | B1 |
6907520 | Parady | Jun 2005 | B2 |
6917942 | Burns et al. | Jul 2005 | B1 |
6920494 | Heitman et al. | Jul 2005 | B2 |
6922696 | Lincoln et al. | Jul 2005 | B1 |
6922708 | Sedlar | Jul 2005 | B1 |
6934878 | Massa et al. | Aug 2005 | B2 |
6940966 | Lee | Sep 2005 | B2 |
6954435 | Billhartz et al. | Oct 2005 | B2 |
6990604 | Binger | Jan 2006 | B2 |
6990611 | Busser | Jan 2006 | B2 |
7007044 | Rafert et al. | Feb 2006 | B1 |
7007097 | Huffman et al. | Feb 2006 | B1 |
7010622 | Bauer et al. | Mar 2006 | B1 |
7017003 | Murotani et al. | Mar 2006 | B2 |
7043485 | Manley et al. | May 2006 | B2 |
7043567 | Trantham | May 2006 | B2 |
7058639 | Chatterjee et al. | Jun 2006 | B1 |
7069320 | Chang et al. | Jun 2006 | B1 |
7103597 | McGoveran | Sep 2006 | B2 |
7111305 | Solter et al. | Sep 2006 | B2 |
7113938 | Highleyman et al. | Sep 2006 | B2 |
7124264 | Yamashita | Oct 2006 | B2 |
7146524 | Patel et al. | Dec 2006 | B2 |
7152182 | Ji et al. | Dec 2006 | B2 |
7165192 | Cadieux et al. | Jan 2007 | B1 |
7177295 | Sholander et al. | Feb 2007 | B1 |
7181746 | Perycz et al. | Feb 2007 | B2 |
7184421 | Liu et al. | Feb 2007 | B1 |
7194487 | Kekre et al. | Mar 2007 | B1 |
7206805 | McLaughlin, Jr. | Apr 2007 | B1 |
7225204 | Manley et al. | May 2007 | B2 |
7228299 | Harmer et al. | Jun 2007 | B1 |
7240235 | Lewalski-Brechter | Jul 2007 | B2 |
7249118 | Sandler et al. | Jul 2007 | B2 |
7257257 | Anderson et al. | Aug 2007 | B2 |
7290056 | McLaughlin, Jr. | Oct 2007 | B1 |
7313614 | Considine et al. | Dec 2007 | B2 |
7318134 | Oliverira et al. | Jan 2008 | B1 |
7346720 | Fachan | Mar 2008 | B2 |
7370064 | Yousefi'zadeh | May 2008 | B2 |
7373426 | Jinmei et al. | May 2008 | B2 |
7386675 | Fachan | Jun 2008 | B2 |
7386697 | Case et al. | Jun 2008 | B1 |
7389379 | Goel et al. | Jun 2008 | B1 |
7440966 | Adkins et al. | Oct 2008 | B2 |
7451341 | Okaki et al. | Nov 2008 | B2 |
7502801 | Sawdon et al. | Mar 2009 | B2 |
7509448 | Fachan et al. | Mar 2009 | B2 |
7509524 | Patel et al. | Mar 2009 | B2 |
7533298 | Smith et al. | May 2009 | B2 |
7546354 | Fan et al. | Jun 2009 | B1 |
7546412 | Ahmad et al. | Jun 2009 | B2 |
7551572 | Passey et al. | Jun 2009 | B2 |
7558910 | Alverson et al. | Jul 2009 | B2 |
7571348 | Deguchi et al. | Aug 2009 | B2 |
7577258 | Wiseman et al. | Aug 2009 | B2 |
7577667 | Hinshaw et al. | Aug 2009 | B2 |
7590652 | Passey et al. | Sep 2009 | B2 |
7593938 | Lemar et al. | Sep 2009 | B2 |
7596713 | Mani-Meitav et al. | Sep 2009 | B2 |
7617289 | Srinivasan et al. | Nov 2009 | B2 |
7631066 | Schatz et al. | Dec 2009 | B1 |
7639818 | Fujimoto et al. | Dec 2009 | B2 |
7665123 | Szor et al. | Feb 2010 | B1 |
7676691 | Fachan et al. | Mar 2010 | B2 |
7680836 | Anderson et al. | Mar 2010 | B2 |
7680842 | Anderson et al. | Mar 2010 | B2 |
7685126 | Patel et al. | Mar 2010 | B2 |
7685162 | Heider et al. | Mar 2010 | B2 |
7689597 | Bingham et al. | Mar 2010 | B1 |
7707193 | Zayas et al. | Apr 2010 | B2 |
7716262 | Pallapotu | May 2010 | B2 |
7734603 | McManis | Jun 2010 | B1 |
7739288 | Lemar et al. | Jun 2010 | B2 |
7743033 | Patel et al. | Jun 2010 | B2 |
7752226 | Harmer et al. | Jul 2010 | B1 |
7752402 | Fachan et al. | Jul 2010 | B2 |
7756898 | Passey et al. | Jul 2010 | B2 |
7779048 | Fachan et al. | Aug 2010 | B2 |
7783666 | Zhuge et al. | Aug 2010 | B1 |
7788303 | Mikesell et al. | Aug 2010 | B2 |
7797283 | Fachan et al. | Sep 2010 | B2 |
7797323 | Eshghi et al. | Sep 2010 | B1 |
7822932 | Fachan et al. | Oct 2010 | B2 |
7840536 | Ahal et al. | Nov 2010 | B1 |
7844617 | Lemar et al. | Nov 2010 | B2 |
7848261 | Fachan | Dec 2010 | B2 |
7870345 | Daud et al. | Jan 2011 | B2 |
7882068 | Schack et al. | Feb 2011 | B2 |
7882071 | Fachan et al. | Feb 2011 | B2 |
7899800 | Fachan et al. | Mar 2011 | B2 |
7900015 | Fachan et al. | Mar 2011 | B2 |
7917474 | Passey et al. | Mar 2011 | B2 |
7937421 | Mikesell et al. | May 2011 | B2 |
7949636 | Akidau et al. | May 2011 | B2 |
7949692 | Lemar et al. | May 2011 | B2 |
7953704 | Anderson et al. | May 2011 | B2 |
7953709 | Akidau et al. | May 2011 | B2 |
7962779 | Patel et al. | Jun 2011 | B2 |
7966289 | Lu et al. | Jun 2011 | B2 |
7971021 | Daud et al. | Jun 2011 | B2 |
7984324 | Daud et al. | Jul 2011 | B2 |
8005865 | Passey et al. | Aug 2011 | B2 |
8010493 | Anderson et al. | Aug 2011 | B2 |
8015156 | Anderson et al. | Sep 2011 | B2 |
8015216 | Fachan et al. | Sep 2011 | B2 |
8027984 | Passey et al. | Sep 2011 | B2 |
8051425 | Godman et al. | Nov 2011 | B2 |
8054765 | Passey et al. | Nov 2011 | B2 |
8055711 | Fachan et al. | Nov 2011 | B2 |
8060521 | Lemar et al. | Nov 2011 | B2 |
8082379 | Fachan et al. | Dec 2011 | B2 |
8112395 | Patel et al. | Feb 2012 | B2 |
20010042224 | Stanfill et al. | Nov 2001 | A1 |
20010047451 | Noble et al. | Nov 2001 | A1 |
20010056492 | Bressoud et al. | Dec 2001 | A1 |
20020010696 | Izumi | Jan 2002 | A1 |
20020029200 | Dulin et al. | Mar 2002 | A1 |
20020035668 | Nakano et al. | Mar 2002 | A1 |
20020038436 | Suzuki | Mar 2002 | A1 |
20020049778 | Bell et al. | Apr 2002 | A1 |
20020055940 | Elkan | May 2002 | A1 |
20020072974 | Pugliese et al. | Jun 2002 | A1 |
20020075870 | de Azevedo et al. | Jun 2002 | A1 |
20020078161 | Cheng | Jun 2002 | A1 |
20020078180 | Miyazawa | Jun 2002 | A1 |
20020083078 | Pardon et al. | Jun 2002 | A1 |
20020083118 | Sim | Jun 2002 | A1 |
20020087366 | Collier et al. | Jul 2002 | A1 |
20020095438 | Rising et al. | Jul 2002 | A1 |
20020107877 | Whiting et al. | Aug 2002 | A1 |
20020124137 | Ulrich et al. | Sep 2002 | A1 |
20020138559 | Ulrich et al. | Sep 2002 | A1 |
20020156840 | Ulrich et al. | Oct 2002 | A1 |
20020156891 | Ulrich et al. | Oct 2002 | A1 |
20020156973 | Ulrich et al. | Oct 2002 | A1 |
20020156974 | Ulrich et al. | Oct 2002 | A1 |
20020156975 | Staub et al. | Oct 2002 | A1 |
20020158900 | Hsieh et al. | Oct 2002 | A1 |
20020161846 | Ulrich et al. | Oct 2002 | A1 |
20020161850 | Ulrich et al. | Oct 2002 | A1 |
20020161973 | Ulrich et al. | Oct 2002 | A1 |
20020163889 | Yemini et al. | Nov 2002 | A1 |
20020165942 | Ulrich et al. | Nov 2002 | A1 |
20020166026 | Ulrich et al. | Nov 2002 | A1 |
20020166079 | Ulrich et al. | Nov 2002 | A1 |
20020169827 | Ulrich et al. | Nov 2002 | A1 |
20020170036 | Cobb et al. | Nov 2002 | A1 |
20020174295 | Ulrich et al. | Nov 2002 | A1 |
20020174296 | Ulrich et al. | Nov 2002 | A1 |
20020178162 | Ulrich et al. | Nov 2002 | A1 |
20020191311 | Ulrich et al. | Dec 2002 | A1 |
20020194523 | Ulrich et al. | Dec 2002 | A1 |
20020194526 | Ulrich et al. | Dec 2002 | A1 |
20020198864 | Ostermann et al. | Dec 2002 | A1 |
20030005159 | Kumhyr | Jan 2003 | A1 |
20030009511 | Giotta et al. | Jan 2003 | A1 |
20030014391 | Evans et al. | Jan 2003 | A1 |
20030033308 | Patel et al. | Feb 2003 | A1 |
20030061491 | Jaskiewicz et al. | Mar 2003 | A1 |
20030109253 | Fenton et al. | Jun 2003 | A1 |
20030120863 | Lee et al. | Jun 2003 | A1 |
20030125852 | Schade et al. | Jul 2003 | A1 |
20030126522 | English et al. | Jul 2003 | A1 |
20030135514 | Patel et al. | Jul 2003 | A1 |
20030149750 | Franzenburg | Aug 2003 | A1 |
20030158861 | Sawdon et al. | Aug 2003 | A1 |
20030158873 | Sawdon et al. | Aug 2003 | A1 |
20030161302 | Zimmermann et al. | Aug 2003 | A1 |
20030163726 | Kidd | Aug 2003 | A1 |
20030172149 | Edsall et al. | Sep 2003 | A1 |
20030177308 | Lewalski-Brechter | Sep 2003 | A1 |
20030182312 | Chen et al. | Sep 2003 | A1 |
20030182325 | Manely et al. | Sep 2003 | A1 |
20030233385 | Srinivasa et al. | Dec 2003 | A1 |
20030237019 | Kleiman et al. | Dec 2003 | A1 |
20040003053 | Williams | Jan 2004 | A1 |
20040024731 | Cabrera et al. | Feb 2004 | A1 |
20040024963 | Talagala et al. | Feb 2004 | A1 |
20040078680 | Hu et al. | Apr 2004 | A1 |
20040078812 | Calvert | Apr 2004 | A1 |
20040117802 | Green | Jun 2004 | A1 |
20040133670 | Kaminksky et al. | Jul 2004 | A1 |
20040143647 | Cherkasova | Jul 2004 | A1 |
20040153479 | Mikesell et al. | Aug 2004 | A1 |
20040158549 | Matena et al. | Aug 2004 | A1 |
20040174798 | Riguidel et al. | Sep 2004 | A1 |
20040189682 | Troyansky et al. | Sep 2004 | A1 |
20040199734 | Rajamani et al. | Oct 2004 | A1 |
20040199812 | Earl et al. | Oct 2004 | A1 |
20040205141 | Goland | Oct 2004 | A1 |
20040230748 | Ohba | Nov 2004 | A1 |
20040240444 | Matthews et al. | Dec 2004 | A1 |
20040260673 | Hitz et al. | Dec 2004 | A1 |
20040267747 | Choi et al. | Dec 2004 | A1 |
20050010592 | Guthrie | Jan 2005 | A1 |
20050033778 | Price | Feb 2005 | A1 |
20050044197 | Lai | Feb 2005 | A1 |
20050066095 | Mullick et al. | Mar 2005 | A1 |
20050114402 | Guthrie | May 2005 | A1 |
20050114609 | Shorb | May 2005 | A1 |
20050125456 | Hara et al. | Jun 2005 | A1 |
20050131860 | Livshits | Jun 2005 | A1 |
20050131990 | Jewell | Jun 2005 | A1 |
20050138195 | Bono | Jun 2005 | A1 |
20050138252 | Gwilt | Jun 2005 | A1 |
20050171960 | Lomet | Aug 2005 | A1 |
20050171962 | Martin et al. | Aug 2005 | A1 |
20050187889 | Yasoshima | Aug 2005 | A1 |
20050188052 | Ewanchuk et al. | Aug 2005 | A1 |
20050192993 | Messinger | Sep 2005 | A1 |
20050193389 | Murphy et al. | Sep 2005 | A1 |
20050289169 | Adya et al. | Dec 2005 | A1 |
20050289188 | Nettleton et al. | Dec 2005 | A1 |
20060004760 | Clift et al. | Jan 2006 | A1 |
20060041894 | Cheng et al. | Feb 2006 | A1 |
20060047713 | Gornshtein et al. | Mar 2006 | A1 |
20060047925 | Perry | Mar 2006 | A1 |
20060053263 | Prahlad et al. | Mar 2006 | A1 |
20060059467 | Wong | Mar 2006 | A1 |
20060074922 | Nishimura | Apr 2006 | A1 |
20060083177 | Iyer et al. | Apr 2006 | A1 |
20060095438 | Fachan et al. | May 2006 | A1 |
20060101062 | Godman et al. | May 2006 | A1 |
20060129584 | Hoang et al. | Jun 2006 | A1 |
20060129631 | Na et al. | Jun 2006 | A1 |
20060129983 | Feng | Jun 2006 | A1 |
20060155831 | Chandrasekaran | Jul 2006 | A1 |
20060206536 | Sawdon et al. | Sep 2006 | A1 |
20060230411 | Richter et al. | Oct 2006 | A1 |
20060277432 | Patel | Dec 2006 | A1 |
20060288161 | Cavallo | Dec 2006 | A1 |
20060294589 | Achanta et al. | Dec 2006 | A1 |
20070038887 | Witte et al. | Feb 2007 | A1 |
20070091790 | Passey et al. | Apr 2007 | A1 |
20070094269 | Mikesell et al. | Apr 2007 | A1 |
20070094277 | Fachan et al. | Apr 2007 | A1 |
20070094310 | Passey et al. | Apr 2007 | A1 |
20070094431 | Fachan | Apr 2007 | A1 |
20070094449 | Allison et al. | Apr 2007 | A1 |
20070094452 | Fachan | Apr 2007 | A1 |
20070124337 | Flam | May 2007 | A1 |
20070168351 | Fachan | Jul 2007 | A1 |
20070192254 | Hinkle | Aug 2007 | A1 |
20070195810 | Fachan | Aug 2007 | A1 |
20070198518 | Luchangco et al. | Aug 2007 | A1 |
20070233684 | Verma et al. | Oct 2007 | A1 |
20070233710 | Passey et al. | Oct 2007 | A1 |
20070244877 | Kempka | Oct 2007 | A1 |
20070255765 | Robinson | Nov 2007 | A1 |
20070255921 | Gole et al. | Nov 2007 | A1 |
20070288490 | Longshaw | Dec 2007 | A1 |
20080005145 | Worrall | Jan 2008 | A1 |
20080010507 | Vingralek | Jan 2008 | A1 |
20080021907 | Patel et al. | Jan 2008 | A1 |
20080031238 | Harmelin et al. | Feb 2008 | A1 |
20080034004 | Cisler et al. | Feb 2008 | A1 |
20080044016 | Henzinger | Feb 2008 | A1 |
20080046432 | Anderson et al. | Feb 2008 | A1 |
20080046443 | Fachan et al. | Feb 2008 | A1 |
20080046444 | Fachan et al. | Feb 2008 | A1 |
20080046445 | Passey et al. | Feb 2008 | A1 |
20080046475 | Anderson et al. | Feb 2008 | A1 |
20080046476 | Anderson et al. | Feb 2008 | A1 |
20080046667 | Fachan et al. | Feb 2008 | A1 |
20080059541 | Fachan et al. | Mar 2008 | A1 |
20080059734 | Mizuno | Mar 2008 | A1 |
20080126365 | Fachan et al. | May 2008 | A1 |
20080151724 | Anderson et al. | Jun 2008 | A1 |
20080154978 | Lemar et al. | Jun 2008 | A1 |
20080155191 | Anderson et al. | Jun 2008 | A1 |
20080168209 | Davison | Jul 2008 | A1 |
20080168304 | Flynn et al. | Jul 2008 | A1 |
20080168458 | Fachan et al. | Jul 2008 | A1 |
20080243773 | Patel et al. | Oct 2008 | A1 |
20080256103 | Fachan et al. | Oct 2008 | A1 |
20080256545 | Fachan et al. | Oct 2008 | A1 |
20080263549 | Walker | Oct 2008 | A1 |
20080294611 | Anglin et al. | Nov 2008 | A1 |
20090125563 | Wong et al. | May 2009 | A1 |
20090248975 | Daud et al. | Oct 2009 | A1 |
20100122057 | Strumpen et al. | May 2010 | A1 |
20100185592 | Kryger | Jul 2010 | A1 |
20100223235 | Fachan | Sep 2010 | A1 |
20100306786 | Passey | Dec 2010 | A1 |
20110016353 | Mikesell et al. | Jan 2011 | A1 |
20110022790 | Fachan | Jan 2011 | A1 |
20110035412 | Fachan | Feb 2011 | A1 |
20110044209 | Fachan | Feb 2011 | A1 |
20110087635 | Fachan | Apr 2011 | A1 |
20110113211 | Fachan et al. | May 2011 | A1 |
20110119234 | Schack et al. | May 2011 | A1 |
20110145195 | Passey et al. | Jun 2011 | A1 |
20110153569 | Fachan et al. | Jun 2011 | A1 |
Number | Date | Country |
---|---|---|
0774723 | May 1997 | EP |
1421520 | May 2004 | EP |
1563411 | Aug 2005 | EP |
2284735 | Feb 2011 | EP |
2299375 | Mar 2011 | EP |
04096841 | Mar 1992 | JP |
2006-506741 | Jun 2004 | JP |
4464279 | May 2010 | JP |
4504677 | Jul 2010 | JP |
WO 9429796 | Dec 1994 | WO |
WO 0057315 | Sep 2000 | WO |
WO 0114991 | Mar 2001 | WO |
WO 0133829 | May 2001 | WO |
WO 02061737 | Aug 2002 | WO |
WO 03012699 | Feb 2003 | WO |
WO 2004046971 | Jun 2004 | WO |
WO 2008021527 | Feb 2008 | WO |
WO 2008021528 | Feb 2008 | WO |
WO 2008127947 | Oct 2008 | WO |
Number | Date | Country | |
---|---|---|---|
20070171919 A1 | Jul 2007 | US |
Number | Date | Country | |
---|---|---|---|
60623848 | Oct 2004 | US | |
60628528 | Nov 2004 | US |