1. Field of the Invention
This invention relates to the field of networking. In particular, the invention relates to prioritizing and queuing updated routing information.
2. Description of the Related Art
Internetworks such as the Internet currently comprise Autonomous Systems, which exchange routing information via exterior gateway protocols. Amongst the most important of these protocols is the Border Gateway Protocol, or BGP. BGPv4 constructs a directed graph of the Autonomous Systems, based on the information exchanged between BGP routers. Each Autonomous System in identified by a unique 16 bit AS number, and, by use of the directed graphs, BGP ensures loop-free routing amongst the Autonomous Systems; BGP also enables the exchange of additional routing information between Autonomous Systems. BGP is further described in several RFCs, which are compiled in The Big Book of Border Gateway Protocol RFCs, by Pete Loshin, which is hereby incorporated by reference.
The Border Gateway Protocol provides network administrators some measure of control over outbound traffic control from their respective organizations. For instance, the protocol includes a LOCAL_PREF attribute, which allows BGP speakers to inform other BGP speakers within the Autonomous System of the speaker's preference for an advertised route. The local preference attribute includes a degree of preference for the advertised route, which enables comparison against other routes for the same destination. As the LOCAL_PREF attribute is shared with other routers within an Autonomous System via IBGP, it determines outbound routes used by routers within the Autonomous System.
A WEIGHT parameter may also be used to indicate route preferences; higher preferences are assigned to routes with higher values of WEIGHT. The WEIGHT parameter is a proprietary addition to the BGPv4 supported by Cisco Systems, Inc. of San Jose, Calif. In typical implementations, the WEIGHT parameter is given higher precedence than other BGP attributes.
The performance knobs described above are, however, rather simple, as they do not offer system administrators with sufficiently sophisticated means for enabling routers to discriminate amongst routes. There is a need for technology that enables greater control over outbound routing policy. In particular, there is a need to allow performance data about routes to be exchanged between routers. Additionally, system administrators should be able to fine tune routing policy based upon sophisticated, up-to-date measurements of route performance and pricing analysis of various routes.
The invention includes routing intelligence for evaluating routing paths based on performance measurements. In some embodiments of the invention, the routing intelligence may include processes executed in a self-contained device. This device may control one or more edge routers, based on performance data from end users. In other embodiments of the invention, the routing intelligence device may be used solely to monitor one or more edge routers, producing reports but not effecting any changes to routing. Routing decisions may be injected to the edge routers via BGP updates. The devices may be stationed at the premises of a multihomed organization, such as an enterprise, ISP, government organization, university, or other organization supporting a sub-network coupled to an internetwork. In other embodiments, the routing intelligence comprises processes executed on a router.
In some embodiments, the routing intelligence unit may be a self-contained device controlling a single edge router. In other embodiments, a single routing intelligence unit controls multiple edge routers. Though the collection of routers is coupled to one or more Internet Service Provider (ISP) links, the individual routers may be coupled to one or more ISP links, or to no ISP links.
In some embodiments of the invention, the routing intelligence unit includes a main memory database for storing information on network prefixes. In some embodiments, a plurality of geographically dispersed routing intelligence devices are coupled to a Routing Intelligence Exchange (RIX), which transmits performance data for network prefixes between the routing intelligence devices. These and other embodiments are described further herein.
In some embodiments of the invention, one or more routing intelligence units are stationed at the premises of a multi-homed organization, each of which controls one or more edge routers. These devices inject BGP updates to the Edge Routers they control, based on performance data from measurements obtained locally, or from a Routing Intelligence Exchange—Routing Intelligence Exchanges are further described in U.S. applications 60/241,450, 60/275,206, Ser. Nos. 09/903,441, and 09/903,423 which are hereby incorporated by reference in their entirety. Different configurations of these routing intelligence units and edge routers are illustrated in
The routing intelligence units include a Decision Maker resource. At a high level, the objective of the Decision Maker is to improve the end-user, application level performance of prefixes whenever the differential in performance between the best route and the default BGP route is significant. This general objective has two aspects:
In such occurrences, the routing intelligence unit should detect the deterioration/failure, and quickly take action to alleviate its effect on the end-user.
In order to optimize application performance, the routing intelligence unit converts measurements on the performance of routes traversing the edge-routers into scores that rate the quality of the end-to-end user experience. This score depends on the application of interest, namely voice, video and HTTP web traffic. In some embodiments of the invention, by default, the routing intelligence unit attempts to optimize the performance of web applications, so its decisions are based on a score model for HTTP. However, in such embodiments, the customer has the choice between all of voice, video, and HTTP.
In order to avoid swamping routers with BGP updates, in some embodiments of the invention, the maximum rate of update permitted by the prefix scheduler is offered as, for example, a control, such as a knob that is set by the customer. The faster the rate of updates, the faster the system can react in the event of specific performance deteriorations or link failures.
However, the rate of updates should be low enough not to overwhelm the router. In some embodiments, the selected rate will depend on the customer's setting (e.g., the traffic pattern, link bandwidth, etc.); for example, faster rates are reserved to large enterprises where the number of covered prefixes is large. Even when the rate of updates is slow, in some embodiments of the invention, the most urgent updates are still scheduled first: this is performed by sorting the prefix update requests in a priority queue as a function of their urgency. The priority queue is then maintained in priority order. The most urgent events (such as loss of coverage, or link failure) bypass this queue and are dealt with immediately.
In case interface statistics are available, the Decision Maker may directly use the corresponding information to function in an optimized way. For example, in some embodiments of the invention, the Decision Maker can use bandwidth information to make sure that a link of lower bandwidth is not swamped by too much traffic; in a similar manner, link utilization can be used to affect the rate of BGP updates sent to the router. Finally, the prefix scheduler may use per-link cost information, as provided by the user to tailor its operation. For example, assume that the router is connected to the Internet through two links: Link 1 is a full T3, while Link 2 is a burstable T3, limited to 3 Mbit/sec. That is, whenever load exceeds the 3 Mbit/sec mark on Link 2, the user incurs a penalty cost. Combining information pertaining to per-link cost and utilization, the Decision Maker can attempt to minimize the instances in which load exceeds 3 Mbit/sec on Link 2, thus resulting in reduced costs to the user.
In some implementations, the Decision Maker may also use configurable preference weights to adjust link selection. The cost of carrying traffic may vary between links, or a user may for other reasons prefer the use of certain links. The Decision Maker can attempt to direct traffic away from some links and towards others by penalizing the measurements obtained on the less preferred links; this encourages use of the preferred links, but still allows the less preferred links to carry any traffic which receives great benefit.
Even though information about SPALs (e.g., the bandwidth and utilization of each of the access links) and prefixes (e.g., the load profile of a particular prefix) is valuable and can be used effectively (as described above) to achieve a more optimal results (according to the algorithm's objective), the Decision Maker is designed to work well even if the only available information is provided by edge stats measurements.
In case the routing intelligence unit fails, the design is such that the edge router falls back to the routing that is specified in the BGP feed. The same behavior occurs in case performance routes fail. Finally, in some embodiments of the invention, a flapping control algorithm is included in the design, avoiding the occurrence of undesirable excessive flapping of a prefix among the different access links.
A diagram showing the high-level architecture of Routing Intelligence Unit, and focused on its BGP settings is shown in
A diagram showing the high level mechanics of the decision maker prefix scheduler is shown in
In the following, we describe each thread separately. In the description, we will refer to tables in the database, and to fields within these tables. The contents of this database are also explicated in U.S. applications 60/241,450, 60/275,206, Ser. Nos. 09/903,441, 09/903,423 which are hereby incorporated by reference in their entirety.
Thread 1
This first thread 600 polls the database for changes in terms of per-SPAL performance, load, or coverage, and decides on which prefix updates to insert in a Priority Queue that holds prefix update requests.
In some embodiments of the invention, such changes are checked for in 2 passes. The first pass looks for group level changes, wherein a group comprises an arbitrary collection of prefixes. Groups are also described in U.S. applications 60/241,450, 60/275,206, Ser. Nos. 09/903,441, 09/903,423 which are hereby incorporated by reference in their entirety. In case a significant change in performance for a group is noticed, the group is unpacked into its individual prefixes; the corresponding prefixes are checked and considered for insertion in the priority queue. The second pass captures prefixes for which there are no group-level performance changes.
The circumstances under which an update request for a prefix is made may include any one or more of the following:
Note that measurements reside at the group level; hence, Check 1 can be done in the first pass. On the other hand, all of Checks 2, 3, and 4 are prefix-specific and may be performed in Pass 2: indeed, foreign performance updates are transferred through the back channel in BGP messages, and hence correspond to particular prefixes. Also, SPALs may become invalid for some, and not necessary all prefixes in a group. Finally, updates from the router relate to the change of winner SPALs for some prefixes, or to the withdrawal of other prefixes. (In fact, any information that is transferred by BGP relates to prefixes.)
Pass 1:
In some embodiments of the invention, in the first pass, an asynchronous thread goes through all groups in the GROUP_SPAL table, checking whether the NEW_DATA bit is set. This bit is set by the measurement listener in case a new measurement from a/32 resulted in an update of delay, jitter, and loss in the database. Delay, jitter, and loss, also denoted as d, v, and p, are used to compute an application-specific score, denoted by m. The scalar m is used to rate application-specific performance; MOS stands for “Mean Opinion Score”, and represents the synthetic application-specific performance. In embodiments of the invention, MOS may be multiplied by a degradation factor that is a function of link utilization, resulting in m. (That is, the larger the utilization of a given SPAL, the larger the degradation factor, and the lower the resulting m.)
In embodiments of the invention, users of the device may also configure penalty factors per SPAL. Non-limiting examples of the uses of such penalty features include handicapping some links relative to others, to achieving cost control, or accomplishing other policy objectives. As a non-limiting example, Provider X may charge substantially more per unit of bandwidth than Provider Y. In such a situation, the penalty feature allows the user to apply an m penalty to SPAL X. This will cause Provider Y to receive more traffic, except for those prefixes in which the performance of Provider X is substantially better. One implementation of this embodiment is to subtract the penalty for the appropriate SPAL after m is computed. Other implementations of the penalty feature will be apparent to those skilled in the art.
Even when NEW_DATA is set, the variation in d, v, and p can be small enough so that the change in the resulting scalar m is insignificant. Hence, in some embodiments of the invention, the prefix is only considered for insertion in the queue in case the change in m is significant enough. The corresponding pseudo-code is shown below.
In some embodiments of the invention, rolling averages are used to update measurements of delay, jitter, and loss, i.e.,
d=alpha*d+(1−alpha)*dnew
v=beta*v+(1−beta)*vnew
p=gamma*p+(1−gamma)*pnew,
where dnew, vnew, pnew represent the new delay, jitter, and loss measurements. Algorithms for calculating MOS for HTTP (1.0 and 1.1) and for voice and video are also presented in U.S. Provisional Application 60/241,450, filed Oct. 17, 2000 and 60/275,206 filed Mar. 12, 2001. Values used for the models employed by these algorithms in embodiments of the invention are presented in an XML format below. Note that since MOS is computed per group, a selection from the sets of the following parameters may be made to allow different optimization goals for each group.
The values presented above are given as examples only. Many different models for deriving MOS scores for different applications will be apparent to those skilled in the art.
Pass 2
In the second pass, an asynchronous thread goes through all prefixes in the PREFIX table. For each prefix, Checks 2, 3, and 4 are made: NEW_INCOMING_BID in the PREFIX table indicates that a new bid was received from the coordination back channel; NEW_INVALID in the PREFIX_SPAL table indicates, for a particular (Prefix P, SPAL x) pair a loss of coverage for Prefix P over SPAL x. NEW_NATURAL_DATA indicates the receipt by Routing Intelligence Unit of an update message from a router, notifying it of a change in its natural BGP winner. In fact, the Decision Maker only asserts a performance route in case it is not the same as the natural BGP route; hence, it can potentially receive updates concerning the natural BGP winners of given prefixes from routers to which it has asserted no performance route for those prefixes. (If Routing Intelligence Unit were to assert performance routes regarding a given prefix P to all routers irrespectively of the current BGP winner for that prefix, it will never receive an update from the router pertaining to changes in the natural BGP winner for Prefix P. Indeed, the performance route would always be the winner, so the router would assume there is nothing to talk about.)
The following example illustrates the usefulness of the NEW_NATURAL_DATA flag: Assume that the Decision Maker controls 3 routers, each of which controls its individual SPAL. Assume that the Decision Maker has just determined that Prefix P will move to SPAL 1. Assume that Prefix P believes that the natural BGP route for Prefix P as saved by Router 1 is SPAL 1, the same as its current performance assertion. The Decision Maker's logical operation is to withdraw Prefix P's last performance route (say SPAL 3). However, it turned out that this BGP natural route has, in fact changed to SPAL 2; indeed, this could have happened during the previous assertion of a performance route for Prefix P (since, in this case, as mentioned above, the Decision Maker receives no updates for Prefix P from the router, despite potential changes in Prefix P's natural BGP winner). As a result of this discrepancy, all traffic pertaining to Prefix P will be routed through SPAL 2, the current natural BGP winner for Prefix P, which is not the desired behavior.
This is the primary reason for NEW_NATURAL_DATA: as such an event occurs, the router sends an update back to the Decision Maker, communicating to it the change in natural route. The Peer Manager sees the change in natural BGP route and sets the NEW_NATURAL_DATA flag to 1; consequently, the prefix is considered for rescheduling during this pass, in Thread 1, as described above. Note that in case of changes in the natural BGP route for a given prefix, the Decision Maker will need two passes through the Priority Queue before the prefix is routed through its appropriate performance route.
Finally, the ACCEPTING_DATA bit in the prefix table is checked. ACCEPTING_DATA is set to 0 by the peer manager to notify the decision maker not to assert performance routes for this prefix. This would primarily occur in case the prefix is withdrawn from the BGP tables in all local routers. In this case, in the ROUTER_PREFIX_SPAL table, the ANNOUNCED bit would be set to 0 on all routers and all SPALs for that prefix. Clearly, a prefix is only considered for insertion in the queue in case ACCEPTING_DATA is set to 1.
Note that asserting a performance route about a prefix that does not exist in any of the routers' BGP tables could be problematic, depending on the surrounding network environment. If the set of controlled routers do not emit routes to any other BGP routers, then it is acceptable to generate new prefixes. But if any propagation is possible, there is a danger of generating an attractor for some traffic.
Specifically, if the new route is the most specific route known for some addresses, then any traffic to those addresses will tend to forward from uncontrolled routers towards the controlled routers. This can be very disruptive, since such routing decisions could be very far from optimal.
The mechanism can cope with this in a number of ways:
Deciding to Insert a Prefix Update Request in the Priority Queue: the Schedule_Prefix Function
Once a prefix P makes it through the checks imposed in either Pass 1 or Pass 2, it is considered for insertion into the prefix update priority queue. schedule_prefix includes the related functionality, described below:
At the outset, a winner set of SPALs is re-computed for P; this set includes SPALs for which the performance is close to maximal. In some embodiments of the invention, invalid SPALs are excluded from the winner set computation. Bids from remote SPALs under the control of coordinated Routing Intelligence Units may, in embodiments, be included in the winner set computation. Since the bids corresponding to such remote routes are filtered through BGP, they are in units which are compatible with iBGP's LOCAL_PREF, which in some implementations is limited to 0-255. Therefore, one possible implementation is to multiply m by 255. The converted quantity is referred to as MSLP. For consistency, the m values computed for local SPALs are also are also converted to LOCAL_PREF units. The new winner is then determined to be the set of all SPALs for which MSLP is larger than MSLPmax—winner-set-threshold, where MSPLmax represents the maximum MSLP for that prefix across all available SPALs, and winner-set-threshold represents a customer-tunable threshold specified in LOCAL_PREF units. The related pseudo-code is shown below.
After the winner set W is computed for P, the decision maker determines whether the current route for P is included in W. Indeed, in such a case, the performance of that prefix can't be improved much further, so no prefix update request needs to be inserted in the queue.
Even though an update request for a given prefix is ignored, the Decision Maker may still send an update to the back channel in certain embodiments. For example, even though the current route for Prefix P is still part of the winner set, performance degradation could have affected all SPALs at once, in which case the bid that was previously sent to the back channel for Prefix P is probably inaccurate. In some embodiments, one may solve this problem by implementing the following: the last bid for a given prefix is saved as MY_BID in the PREFIX table; a low and high threshold are then computed using two user-configurable parameters, bid-threshold-low and bid-threshold-high. In case of a significant difference between the MSLP score on the current route and the last score sent to the back channel for that prefix (i.e., MY_BID) is witnessed (that is, if the new score falls below (1−bid-threshold-low)*100% or jumps to a value that is larger than (1+bid-threshold-high)*100% of MY_BID), a BGP message is sent to the back channel, carrying the new bid for Prefix P to remote coordinated Routing Intelligence Units. Pseudo-code illustrating the functionality described here is shown below.
At this point, it is clear that Prefix P is not routed optimally. In some embodiments of the invention, before proceeding with sending the update request to the edge router, the Routing Intelligence Unit performs a check of the flapping history for Prefix P. An algorithm whose operation is very close to the flapping detection algorithm in BGP monitors the flapping history of a prefix. The algorithm can be controlled by, in one embodiment, three user-controlled parameters flap_weight, flap_low, and flap_high and works as follows: the tendency of a prefix to flap is monitored by a variable denoted FORGIVING_MODE that resides in the PREFIX table. FORGIVING_MODE and other flapping parameters are updated in Thread 2 right before a performance route pertaining to Prefix P is asserted to the local routers. In case FORGIVING_MODE is set to 1, the tendency for Prefix P to flap is considered excessive, and the prefix update request is ignored. Conversely, in case FORGIVING_MODE is set to 0, Prefix P has no abnormal tendency to flap, so it is safe to consider its update request.
If a prefix survives to this point in Thread 1, it will deterministically be inserted in the queue. Hence, all bits that were checked should be reset at this point so that some other pass on the prefixes does not reconsider and reschedule the prefix update request. For example, in case the prefix belongs to a group for which there was a significant change in m, the prefix will be considered for insertion in the queue in Pass 1, and should not be reconsidered in Pass2.
In some embodiments of the invention, before the prefix is inserted in the queue, a SPAL is chosen at random from the winner set. This way, traffic is spread across more than one SPAL, hence achieving some level of load balancing. In order to achieve some set of desirable policies, randomness can be tweaked in order to favor some SPALs and disregard others. For example, in case the winner set includes a remote SPAL controlled by a coordinated Routing Intelligence Unit as well as a local SPAL, the local SPAL is always preferred. In other words, a remote SPAL is only the winner in case it is the only available SPAL in the winner set. Also, depending on the weight of a prefix and the observed load on different links, one can tweak the probabilities in such a way that the prefix is routed through a SPAL that fits it best. (This feature corresponds to the “Saturation Avoidance Factor”—SAF, described later in this document) After a winner is selected, PENDING_WINNER in PREFIX_SPAL is updated to reflect the new potential winner. Finally, the element is inserted in the Priority Queue. The rank of the prefix update in the priority queue is determined by computing the percent improvement; that is, the percent improvement obtained from moving the prefix from its current route to the pending winner route. That is, percent-improvement=[score(pending_winner)−Score(current_route)]/Score(current_route). The special-spal-flag is part of the data structure for the update, as it will be used in the determination of which messages to send to the local routers.
Thread 2
In this thread 602, elements are taken out of the queue in a rate-controlled manner. In some embodiments of the invention, this rate is specified by the customer. The update rate is often referred to as the token rate. Tokens are given at regular intervals, according to the update rate. Each time a token appears, the head of the queue is taken out of the queue, and considered for potential update. In case the database shows that more recent passes in Thread 1 have canceled the update request, it is dropped without losing the corresponding token; the next update request is then taken out from the head of the queue; this procedure is performed until either the queue empties, or a valid request is obtained. In some embodiments of the invention, when an update request that corresponds to Prefix P is determined to be current (thus, valid), one or more of the following tasks are performed:
In this thread 602, elements are just taken out from the queue in a rate-controlled manner, according to an update rate that may be set by the customer. The update rate is often referred to as the token rate: indeed, tokens are given at regular intervals, according to the update rate. Each time a token appears, the head of the queue is taken out, and considered for potential update.
Assume that the update request concerns Prefix P. The PREFIX_SPAL table is checked to obtain the PENDING_WINNER and CURRENT_WINNER for Prefix P. In case PENDING_WINNER and CURRENT_WINNER correspond to the same SPAL, this is an indication that a more recent pass in Thread 1 has canceled the update request; in this case, the update request is dropped, without losing the corresponding token; the next token request is then polled from the head of the queue; this procedure is performed until either the queue empties, or a valid request, for which PENDING_WINNER and CURRENT_WINNER are different, is obtained.
Having different pending and current winners reflects a valid update request. In this case, the Decision Maker should assert the winning route for Prefix P; correspondingly, a series of tasks are performed. First, the flapping state is updated for Prefix P. In some embodiments of the invention, the tendency of a prefix to flap is monitored by a variable denoted INTERCHANGE_RATE that resides in the PREFIX table. The flap_weight parameter dictates the dynamics of INTERCHANGE_RATE; more specifically, at this point in the algorithm thread, INTERCHANGE_RATE is updated using the last value of INTERCHANGE_RATE, as stored in the table, LAST_ICR_TIME, also stored in the PREFIX table, and flap_weight. In case the new computed INTERCHANGE_RATE is below flap_low, Routing Intelligence Unit considers the tendency for that prefix to flap to be low. On the other hand, when INTERCHANGE_RATE exceeds flap_high, the Routing Intelligence Unit considers the tendency for that prefix to flap to be high. That is, the algorithm functions in the following fashion:
Note that the method presented above is only one technique for controlling flapping; others will be apparent to those skilled in the art.
In some embodiments of the invention, the two parameters flap_low, and flap_high are separated by an amount to avoid hysterisis between the two values. Then, the Decision Maker updates the PREFIX_SPAL table to reflect this change; more specifically, CURRENT_WINNER is moved to PENDING_WINNER in the table. At this time, the ROUTER_PREFIX_SPAL table is queried to capture the current state of each router in regards to Prefix P. Accordingly, different NLRIs are formed and sent to each of the routers.
In some embodiments of the invention, the Decision Maker only asserts a performance route in case it is not the same as the natural BGP route; indeed, if Routing intelligence Unit were to assert performance routes regarding a given prefix P to all routers irrespectively of the current BGP winner for that prefix, it will never receive an update from the router pertaining to changes in the natural BGP winner for Prefix P. (Indeed, the performance route would always be the winner, so the router would assume there is nothing to talk about.)
Also, an NLRI is sent to the back channel, describing to other Routing Intelligence Units in a coordinated system the new local winner. Finally, the database is updated to keep track of the messages that were sent to each of the routers, as well as the expected resulting state of these routers.
Prior to forming the NLRIs, the database is updated to include the new flap parameters and prefix-SPAL information (i.e., the new current SPAL for that prefix). The BGP update sent to an edge router may be filtered out by the policy on the router. However, assuming the update is permissible, it may be made to win in the router's BGP comparison process. One implementation is to have the edge router apply a high Weight value to the incoming update. (Weight is a common BGP knob, supported in most major implementations of the protocol, but it is not in the original protocol specification.) This technique constrains the update so that it gains an advantage only on the router or routers to which the update is directly sent; this is desirable if some other routers are not controlled by a device such as the one described here. It is also possible to send the update with normal BGP attributes which make the route attractive, such as a high LOCAL_PREF value.
Queue Size
In some embodiments of the invention, a maximum queue size is to be chosen by the customer. In some embodiments, a small queue size may be chosen, so the maximum delay involved between the time instant a prefix update request is queued and the time instant it is considered by the second thread as a potential BGP update is small. For example, in case the token rate corresponding to a given link is 10 tokens per second, and we choose not to exceed a 2 second queuing delay, the queue should be able to accommodate 20 prefix update requests. Note that this method is simple, and only requires the knowledge of the token rate and the maximum acceptable delay.
Maximum Rate of Prefix Updates
It is desirable for the Routing Intelligence Unit to remain conservative in the rate of updates it communicates to the edge-router. This is the function of the token rate, which acts as a brake to the whole system. In some embodiments of the invention, the responsibility for setting the token rate is transferred to the customer, who selects a token rate that best fits her bandwidth and traffic pattern.
The feedback from the listener BGP is valuable as it describes the actual current state of the local edge routers. Accordingly, in some embodiments of the invention, a separate routing intelligence unit thread modifies the content of the database according to the state it gets from the router(s). The Routing Intelligence Unit can operate more subtly in case it is a perfect listener; we consider the Routing Intelligence Unit to be a perfect listener if it has knowledge of the individual BGP feeds from each individual SPAL. That is, in case the Routing Intelligence Unit is connected to three access links, each connecting to a separate provider, the Routing Intelligence Unit is a perfect listener if it has access to each of the three feeds handed by each of these providers.
Configuring Routing Intelligence Unit as a Perfect Listener is desirable, as it allows the support of private peerings. For example, unless Routing Intelligence Unit is configured as a Perfect Listener, when Routing Intelligence Unit hears about a prefix, it can't assume that coverage exists for that prefix across all SPALs. Considering the scenario described above, a prefix that the Routing Intelligence Units learns about could be covered by any of the three SPALs the router is connected to. For example, assume that only SPAL 1 has coverage for a given prefix P; in case the Routing Intelligence Unit asserts a performance route for that prefix across SPAL 2, there is no guarantee that the traffic pertaining to that prefix will be transited by the Service Provider to which SPAL 2 is connected (which we denote Provider 2). In case Provider 2 actually has a private peering with Provider X that obeys some pre-specified contract, Provider X could well monitor the traffic from Provider 2, and filter all packets that do not conform to that contract. In case this contract namely specifies that Provider X will only provide transit to customers residing on Provider X's network, then the traffic pertaining to Prefix P will be dropped. If Routing Intelligence Unit were a Perfect Listener, it would only assert performance routes for prefixes across SPALs that are determined to have coverage for these prefixes. This behavior may be referred to as “extremely polite.”
In some embodiments, the Routing Intelligence Unit is capable of avoiding the “Rocking the boat” problem, which stems from unwanted propagation of prefixes which did not already exist in BGP. The Routing Intelligence Unit can operate in “impolite” mode, where any prefixes may be used, or in “polite” mode, where only those prefixes which were previously present in BGP can be used. An ANNOUNCED bit resides in the ROUTER PREFIX SPAL table, and is set by the Peer Manager in case the Routing Intelligence Unit hears about a prefix from any of the Routers. This bit allows use of “polite” mode by the following procedure: in case the ANNOUNCED bit is set to 0 for all (router, SPAL) combinations in the ROUTER_PREFIX_SPAL table, then ACCEPTING_DATA is set to 0 in the PREFIX table.
In case a catastrophic event occurs, such as a link going down, some embodiments of the invention send urgent BGP updates to the router. These urgent updates have priority over the entire algorithm described above. For example, in case a SPAL has lost coverage for a prefix, an urgent BGP message should be sent to the router, requesting to move the prefix to other SPALs. A list of urgent events upon which such actions may be taken, and a description of the algorithms pertaining to these actions, are described below.
Algorithm for the Detection of an Invalid SPAL
In some embodiments of the invention, a specific (Prefix P, SPAL x) pair is invalidated in case there are reasons to believe that SPAL x no longer provides coverage to Prefix P. One possible implementation is described as follows. Measurements corresponding to a (Prefix, SPAL) pair are assumed to arrive to the Decision Maker at something close to a predictable rate. A background thread that is independent from Threads 1 and 2 computes this update rate, and stores a time of last update, the LAST_UPDATE_TIME. Another background thread verifies that LAST_ICR_TIME is reasonable given UPDATE_RATE. For example, assuming that measurements come in following a Poisson distribution, it is easy to verify whether LAST_ICR_TIME exceeds a fixed percentile of the inter-arrival interval. As LAST_UPDATE_TIME increases, the Decision Maker becomes more and more worried about the validity of the path. In the current design, there are two thresholds: at the first threshold, the NEW_INVALID and INVALID flags are set in the PREFIX_SPAL table. As described in Thread 1 above, setting the NEW_INVALID flag for a (Prefix P, SPAL x) pair will prevent any new update requests for Prefix P to be routed through SPAL x. At this stage, no other action is taken. At the second threshold, the Decision Maker becomes “very concerned” about routing Prefix P through SPAL x; hence, an urgent check is made to see whether Prefix P is currently routed through SPAL x, in which case an urgent NLRI is created (that is, an NLRI that bypasses the entire queue system) in order to route Prefix through a different SPAL.
Some embodiments of the invention support a Saturation Avoidance Factor, which measures the effect of a prefix on other prefixes. In some embodiments of the invention, the “Saturation Avoidance Factor” (SAF) pertaining to a given prefix may be taken into account when prefixes are sorted in the Priority Queue. This SAF measures the effect of a prefix on other prefixes. That is, if, upon scheduling a prefix on a given link, its effect on the other prefixes already scheduled on that link is high (i.e., this effectively means that the aggregate load for this prefix is large), its SAF should be low. The lower the SAF of a prefix, the lower its place in the Priority Queue. This way, the algorithm will always favor low load prefixes rather than high load prefixes. Note that in some embodiments, the SAF is not directly proportional to load. For example, a prefix that has a load equal to 0.75 C has a different SAF whether it is considered to be scheduled on an empty link or on a link which utilization has already reached 75%. In the later case, the SAF should be as low as possible, since scheduling the prefix on the link would result in a link overflow.
At times, the token rate may be slower than the responded feedback. In case link utilization information is obtained through interface-stats, the token rate may be slower than the rate at which utilization information comes in. Also, the token rate may be slower than the rate at which edge-stats measurements come in.
Additionally, in some embodiments, each prefix is considered at a time. That is, PQServiceRate is small enough so that no more than one token is handed at a time. For example, denoting by T the token rate obtained from the above considerations, PQServiceRate is equal to 1/T. If more than one token were handed at one time, two large prefixes could be scheduled on the same link, just as in the example above, potentially leading to bad performance.
In some embodiments of the invention, the SAF is a per-prefix, per-SPAL quantity. For example, assume that a prefix carries with it a load of 75% the capacity of all SPALs. If we have a choice between two SPALs, SPAL 1 and SPAL 2, SPAL 1 already carrying a load of 50%, the other having a load of 0%. In this case, moving Prefix p to SPAL 1 will result in bad performance not only for itself, but also for all other prefixes already routed through SPAL 1. In this case, the SAF is close to 0, even if performance data across SPAL 1 seems to indicate otherwise. On the other hand, the SAF of moving Prefix p to SPAL 2 is, by contrast, very good, since the total load on the link will remain around 75% of total capacity, so delays will remain low. If, instead of carrying a load of 75% capacity, Prefix p carried a load of 10% capacity, the results would have been different, and the SAF of Prefix p across SPALs 1 and 2 would have been close. In some embodiments of the invention, without knowing the load of a link, we can still measure the effect of moving a given prefix to a given SPAL through RTT measurements. That is, instead of measuring the load directly, we measure the end result, that is the amount by which performance of prefixes across a link worsens as a result of moving a prefix to it.
Modifying the Schema for the Support of SAF
In order to support SAF, the schema may be include a load field in the SPAL table, and an SAF field in the PREFIX_SPAL table. In some embodiments, the SAF field is a per-prefix, per-SPAL information.
Edge-stats measurements may include measurements of delay, jitter, and loss; using these measurements, an application-specific performance score may be obtained based on which a decision is made on whether to send an update request for this prefix. Available bandwidth is a valuable quantity that is measured and included in the computation of the performance score in some embodiments of the invention.
In some embodiments of the invention, token rates may differ on a per-link basis (which dictates the use of different queues for each link).
In some embodiments, the token rate may be tailored to total utilization. Lowly utilized links can afford relatively higher token rates without fear of overflow, whereas links close to saturation should be handled more carefully. Some embodiments of the invention provide one or more of the following modes of operation:
Even though the priority queue is sized in such a way that the delay spent in the queue is minimized, there is still an order of magnitude between the time scale of the BGP world, at which level decisions are taken, and the physical world, in which edge stats and interface stats are measured. That is, even though the queuing delay is comparable to other delays involved in the process of changing a route, prefix performance across a given link or the utilization of a given link can change much more quickly. For example, a 2 second queuing delay could be appropriate in the BGP world, while 2 seconds can be enough for congestion to occur across a given link, or for the link utilization to go from 25% to 75%. For this reason, in some embodiments of the invention, the winner set is re-evaluated at the output of the priority queue.
The foregoing description of various embodiments of the invention has been presented for purposes of illustration and description. It is not intended to limit the invention to the precise forms disclosed. Many modifications and equivalent arrangements will be apparent.
This application is a divisional of U.S. patent application Ser. No. 09/923,924 filed Aug. 6, 2001, now U.S. Pat. No. 7,406,539, which claims the benefit of U.S. Provisional Applications No. 60/241,450, filed Oct. 17, 2000 and 60/275,206 filed Mar. 12, 2001, and is a continuation-in-part of U.S. application Ser. No. 09/903,441, filed Jul. 10, 2001, now U.S. Pat. No. 7,080,161, and is a CIP of Ser. No. 09/903,423, filed Jul. 10, 2001, now U.S. Pat. No. 7,363,367 which are all hereby incorporated by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4284852 | Szybicki et al. | Aug 1981 | A |
4293419 | Sekino et al. | Oct 1981 | A |
4345116 | Ash et al. | Aug 1982 | A |
4495570 | Kitajima et al. | Jan 1985 | A |
4594704 | Ollivier | Jun 1986 | A |
4669113 | Ash et al. | May 1987 | A |
4704724 | Krishnan et al. | Nov 1987 | A |
4726017 | Krum et al. | Feb 1988 | A |
4748658 | Gopal et al. | May 1988 | A |
4788721 | Krishnan et al. | Nov 1988 | A |
4839798 | Eguchi et al. | Jun 1989 | A |
4901244 | Szeto | Feb 1990 | A |
4920432 | Eggers et al. | Apr 1990 | A |
4931941 | Krishnan | Jun 1990 | A |
4939726 | Flammer et al. | Jul 1990 | A |
4949187 | Cohen | Aug 1990 | A |
4949248 | Caro | Aug 1990 | A |
5142570 | Chaudhary et al. | Aug 1992 | A |
5172413 | Bradley et al. | Dec 1992 | A |
5253341 | Rozmanith et al. | Oct 1993 | A |
5271000 | Engbersen et al. | Dec 1993 | A |
5287537 | Newmark et al. | Feb 1994 | A |
5291554 | Morales | Mar 1994 | A |
5341477 | Pitkin et al. | Aug 1994 | A |
5343463 | van Tetering et al. | Aug 1994 | A |
5361256 | Doeringer et al. | Nov 1994 | A |
5371532 | Gelman et al. | Dec 1994 | A |
5375070 | Hershey et al. | Dec 1994 | A |
5406502 | Haramaty et al. | Apr 1995 | A |
5410343 | Coddington et al. | Apr 1995 | A |
5414455 | Hooper et al. | May 1995 | A |
5442389 | Blahut et al. | Aug 1995 | A |
5442390 | Hooper et al. | Aug 1995 | A |
5442749 | Northcutt et al. | Aug 1995 | A |
5452294 | Natarajan | Sep 1995 | A |
5467345 | Cutler, Jr. et al. | Nov 1995 | A |
5471622 | Eadline | Nov 1995 | A |
5471623 | Napolitano, Jr. | Nov 1995 | A |
5475615 | Lin | Dec 1995 | A |
5477536 | Picard | Dec 1995 | A |
5508732 | Bottomley et al. | Apr 1996 | A |
5514938 | Zaaijer et al. | May 1996 | A |
5515511 | Nguyen et al. | May 1996 | A |
5519435 | Anderson | May 1996 | A |
5521591 | Arora et al. | May 1996 | A |
5528281 | Grady et al. | Jun 1996 | A |
5535195 | Lee | Jul 1996 | A |
5537394 | Abe et al. | Jul 1996 | A |
5563875 | Hefel et al. | Oct 1996 | A |
5574938 | Bartow et al. | Nov 1996 | A |
5590126 | Mishra et al. | Dec 1996 | A |
5629930 | Beshai et al. | May 1997 | A |
5631897 | Pacheco et al. | May 1997 | A |
5636216 | Fox et al. | Jun 1997 | A |
5652841 | Nemirovsky et al. | Jul 1997 | A |
5654958 | Natarajan | Aug 1997 | A |
5659196 | Honda | Aug 1997 | A |
5659796 | Thorson et al. | Aug 1997 | A |
5668800 | Stevenson | Sep 1997 | A |
5675741 | Aggarwal et al. | Oct 1997 | A |
5729528 | Salingre et al. | Mar 1998 | A |
5754547 | Nakazawa | May 1998 | A |
5754639 | Flockhart et al. | May 1998 | A |
5787253 | McCreery et al. | Jul 1998 | A |
5793976 | Chen et al. | Aug 1998 | A |
5802106 | Packer | Sep 1998 | A |
5805594 | Kotchey et al. | Sep 1998 | A |
5812528 | VanDervort | Sep 1998 | A |
5826253 | Bredenberg | Oct 1998 | A |
5835710 | Nagami et al. | Nov 1998 | A |
5841775 | Huang | Nov 1998 | A |
5845091 | Dunne et al. | Dec 1998 | A |
5872930 | Masters et al. | Feb 1999 | A |
5884047 | Aikawa et al. | Mar 1999 | A |
5892754 | Kompella et al. | Apr 1999 | A |
5935216 | Benner et al. | Aug 1999 | A |
5940478 | Vaudreuil et al. | Aug 1999 | A |
5944779 | Blum | Aug 1999 | A |
5974457 | Waclawsky et al. | Oct 1999 | A |
6006264 | Colby et al. | Dec 1999 | A |
6009081 | Wheeler et al. | Dec 1999 | A |
6012088 | Li et al. | Jan 2000 | A |
6026441 | Ronen | Feb 2000 | A |
6034946 | Roginsky et al. | Mar 2000 | A |
6052718 | Gifford | Apr 2000 | A |
6064946 | Beerends | May 2000 | A |
6069889 | Feldman et al. | May 2000 | A |
6078953 | Vaid et al. | Jun 2000 | A |
6078963 | Civanlar et al. | Jun 2000 | A |
6085238 | Yuasa et al. | Jul 2000 | A |
6108703 | Leighton et al. | Aug 2000 | A |
6111881 | Soncodi | Aug 2000 | A |
6130890 | Leinwand et al. | Oct 2000 | A |
6134589 | Hultgren | Oct 2000 | A |
6167052 | McNeill et al. | Dec 2000 | A |
6167444 | Boden et al. | Dec 2000 | A |
6173324 | D'Souza | Jan 2001 | B1 |
6178448 | Gray et al. | Jan 2001 | B1 |
6185598 | Farber et al. | Feb 2001 | B1 |
6185601 | Wolff | Feb 2001 | B1 |
6189044 | Thomson et al. | Feb 2001 | B1 |
6226226 | Lill et al. | May 2001 | B1 |
6226266 | Galand et al. | May 2001 | B1 |
6275470 | Ricciulli | Aug 2001 | B1 |
6282562 | Sidi et al. | Aug 2001 | B1 |
6286045 | Griffiths et al. | Sep 2001 | B1 |
6292832 | Shah et al. | Sep 2001 | B1 |
6311144 | Abu El Ata | Oct 2001 | B1 |
6920134 | Hameleers et al. | Oct 2001 | B2 |
6317118 | Yoneno | Nov 2001 | B1 |
6317778 | Dias et al. | Nov 2001 | B1 |
6317792 | Mundy et al. | Nov 2001 | B1 |
6339595 | Rekhter et al. | Jan 2002 | B1 |
6341309 | Vaid et al. | Jan 2002 | B1 |
6363332 | Rangarajan | Mar 2002 | B1 |
6385198 | Ofek et al. | May 2002 | B1 |
6385643 | Jacobs et al. | May 2002 | B1 |
6393486 | Pelavin et al. | May 2002 | B1 |
6415323 | McCanne et al. | Jul 2002 | B1 |
6426955 | Gossett et al. | Jul 2002 | B1 |
6430160 | Smith et al. | Aug 2002 | B1 |
6434606 | Borella et al. | Aug 2002 | B1 |
6438592 | Killian | Aug 2002 | B1 |
6446028 | Wang | Sep 2002 | B1 |
6452950 | Ohlsson et al. | Sep 2002 | B1 |
6453356 | Sheard et al. | Sep 2002 | B1 |
6463454 | Lumelsky et al. | Oct 2002 | B1 |
6493353 | Kelly et al. | Dec 2002 | B2 |
6522627 | Mauger | Feb 2003 | B1 |
6526056 | Rekhter et al. | Feb 2003 | B1 |
6538416 | Hahne et al. | Mar 2003 | B1 |
6549954 | Lambrecht et al. | Apr 2003 | B1 |
6553423 | Chen | Apr 2003 | B1 |
6556582 | Redi | Apr 2003 | B1 |
6560204 | Rayes | May 2003 | B1 |
6584093 | Salama et al. | Jun 2003 | B1 |
6594268 | Aukia et al. | Jul 2003 | B1 |
6594307 | Beerends | Jul 2003 | B1 |
6594692 | Reisman | Jul 2003 | B1 |
6601098 | Case et al. | Jul 2003 | B1 |
6601101 | Lee et al. | Jul 2003 | B1 |
6608841 | Koodli | Aug 2003 | B1 |
6611872 | McCanne | Aug 2003 | B1 |
6614789 | Yazdani et al. | Sep 2003 | B1 |
6625648 | Schwaller et al. | Sep 2003 | B1 |
6631419 | Greene | Oct 2003 | B1 |
6633640 | Cohen et al. | Oct 2003 | B1 |
6633878 | Underwood | Oct 2003 | B1 |
6658000 | Raciborski et al. | Dec 2003 | B1 |
6661797 | Goel et al. | Dec 2003 | B1 |
6665271 | Thomas et al. | Dec 2003 | B1 |
6665725 | Dietz et al. | Dec 2003 | B1 |
6687229 | Kataria et al. | Feb 2004 | B1 |
6704768 | Zombek et al. | Mar 2004 | B1 |
6704795 | Fernando et al. | Mar 2004 | B1 |
6707824 | Achilles et al. | Mar 2004 | B1 |
6711137 | Klassen et al. | Mar 2004 | B1 |
6711152 | Kalmanek, Jr. et al. | Mar 2004 | B1 |
6714549 | Phaltankar | Mar 2004 | B1 |
6714896 | Barrett | Mar 2004 | B1 |
6728484 | Ghani | Apr 2004 | B1 |
6728777 | Lee et al. | Apr 2004 | B1 |
6728779 | Griffin et al. | Apr 2004 | B1 |
6735177 | Suzuki | May 2004 | B1 |
6748426 | Shaffer et al. | Jun 2004 | B1 |
6751562 | Blackett et al. | Jun 2004 | B1 |
6751661 | Geddes | Jun 2004 | B1 |
6751664 | Kogan et al. | Jun 2004 | B1 |
6757255 | Aoki et al. | Jun 2004 | B1 |
6760775 | Anerousis et al. | Jul 2004 | B1 |
6760777 | Agarwal et al. | Jul 2004 | B1 |
6766381 | Barker et al. | Jul 2004 | B1 |
6771646 | Sarkissian et al. | Aug 2004 | B1 |
6785704 | McCanne | Aug 2004 | B1 |
6795399 | Benmohamed et al. | Sep 2004 | B1 |
6795860 | Shah | Sep 2004 | B1 |
6801502 | Rexford et al. | Oct 2004 | B1 |
6810417 | Lee | Oct 2004 | B2 |
6819662 | Grover et al. | Nov 2004 | B1 |
6820133 | Grove et al. | Nov 2004 | B1 |
6826613 | Wang et al. | Nov 2004 | B1 |
6829221 | Winckles et al. | Dec 2004 | B1 |
6829654 | Jungck | Dec 2004 | B1 |
6836463 | Garcia-Luna-Aceves et al. | Dec 2004 | B2 |
6839745 | Dingari et al. | Jan 2005 | B1 |
6839751 | Dietz et al. | Jan 2005 | B1 |
6862618 | Gray et al. | Mar 2005 | B1 |
6873600 | Duffield et al. | Mar 2005 | B1 |
6885641 | Chan et al. | Apr 2005 | B1 |
6894991 | Ayyagari et al. | May 2005 | B2 |
6897684 | Oi et al. | May 2005 | B2 |
6909700 | Benmohamed et al. | Jun 2005 | B1 |
6912203 | Jain et al. | Jun 2005 | B1 |
6912222 | Wheeler et al. | Jun 2005 | B1 |
6956858 | Hariguchi et al. | Oct 2005 | B2 |
6963575 | Sistanizadeh et al. | Nov 2005 | B1 |
6963914 | Breitbart et al. | Nov 2005 | B1 |
6973490 | Robertson et al. | Dec 2005 | B1 |
6981055 | Ahuja et al. | Dec 2005 | B1 |
6984991 | Bond et al. | Jan 2006 | B2 |
6993584 | Border et al. | Jan 2006 | B2 |
6999432 | Zhang et al. | Feb 2006 | B2 |
7002917 | Saleh | Feb 2006 | B1 |
7020086 | Juttner et al. | Mar 2006 | B2 |
7024475 | Abaye et al. | Apr 2006 | B1 |
7027448 | Feldmann et al. | Apr 2006 | B2 |
7043541 | Bechtolsheim et al. | May 2006 | B1 |
7043562 | Dally et al. | May 2006 | B2 |
7046653 | Nigrin et al. | May 2006 | B2 |
7065584 | Shavitt et al. | Jun 2006 | B1 |
7080161 | Leddy et al. | Jul 2006 | B2 |
7085230 | Hardy | Aug 2006 | B2 |
7099282 | Hardy | Aug 2006 | B1 |
7107326 | Fijolek et al. | Sep 2006 | B1 |
7110393 | Tripathi et al. | Sep 2006 | B1 |
7111073 | Jain et al. | Sep 2006 | B1 |
7123620 | Ma | Oct 2006 | B1 |
7124173 | Moriarty | Oct 2006 | B2 |
7139242 | Bays | Nov 2006 | B2 |
7155436 | Hegde et al. | Dec 2006 | B2 |
7162539 | Garcie-Luna-Aceves | Jan 2007 | B2 |
7222190 | Klinker et al. | May 2007 | B2 |
7222268 | Zaifman et al. | May 2007 | B2 |
7269157 | Klinker et al. | Sep 2007 | B2 |
7343422 | Garcia-Luna-Aceves et al. | Mar 2008 | B2 |
7349994 | Balonado et al. | Mar 2008 | B2 |
7359955 | Menon et al. | Apr 2008 | B2 |
7363367 | Lloyd et al. | Apr 2008 | B2 |
7401160 | Johnson et al. | Jul 2008 | B2 |
7406539 | Baldonado et al. | Jul 2008 | B2 |
7472192 | DeFerranti et al. | Dec 2008 | B2 |
7487237 | Lloyd et al. | Feb 2009 | B2 |
7675868 | Balonado et al. | Mar 2010 | B2 |
20010010059 | Burman et al. | Jul 2001 | A1 |
20010026537 | Massey | Oct 2001 | A1 |
20010037311 | McCoy et al. | Nov 2001 | A1 |
20020038331 | Flavin | Mar 2002 | A1 |
20020062388 | Ogier et al. | May 2002 | A1 |
20020124100 | Adams | Sep 2002 | A1 |
20020184527 | Chun et al. | Dec 2002 | A1 |
20030016770 | Trans et al. | Jan 2003 | A1 |
20030039212 | Lloyd et al. | Feb 2003 | A1 |
20030112788 | Erhart et al. | Jun 2003 | A1 |
20030161321 | Karam et al. | Aug 2003 | A1 |
20030163555 | Battou et al. | Aug 2003 | A1 |
20030202468 | Cain et al. | Oct 2003 | A1 |
20040030776 | Cantrell et al. | Feb 2004 | A1 |
20040062267 | Minami et al. | Apr 2004 | A1 |
20040218546 | Clark | Nov 2004 | A1 |
20050044270 | Grove et al. | Feb 2005 | A1 |
20050083912 | Afshar et al. | Apr 2005 | A1 |
20050132060 | Mo et al. | Jun 2005 | A1 |
20050185654 | Zadikian et al. | Aug 2005 | A1 |
20050201302 | Gaddis et al. | Sep 2005 | A1 |
20050243726 | Narendran | Nov 2005 | A1 |
20060026682 | Zakas | Feb 2006 | A1 |
20060072543 | Lloyd et al. | Apr 2006 | A1 |
20060291446 | Caldwell et al. | Dec 2006 | A1 |
20070064715 | Lloyd et al. | Mar 2007 | A1 |
20070115840 | Feick et al. | May 2007 | A1 |
20070271066 | Nikitin et al. | Nov 2007 | A1 |
20080089241 | Lloyd et al. | Apr 2008 | A1 |
20080101793 | Koch et al. | May 2008 | A1 |
20090031025 | Lloyd et al. | Jan 2009 | A1 |
Number | Date | Country |
---|---|---|
0504537 | Sep 1992 | EP |
0528075 | Feb 1993 | EP |
0598969 | Jun 1994 | EP |
0788267 | Aug 1997 | EP |
0942560 | Sep 1999 | EP |
0977456 | Feb 2000 | EP |
0982901 | Mar 2000 | EP |
0999674 | May 2000 | EP |
2806862 | Sep 2001 | FR |
2000312226 | Nov 2000 | JP |
2003-258867 | Sep 2003 | JP |
2004-56787 | Feb 2004 | JP |
WO 9408415 | Apr 1994 | WO |
WO 9906913 | Feb 1999 | WO |
WO 9914907 | Mar 1999 | WO |
WO 9914931 | Mar 1999 | WO |
WO 9914932 | Mar 1999 | WO |
WO 9918751 | Apr 1999 | WO |
WO 9930460 | Jun 1999 | WO |
WO 9939481 | Aug 1999 | WO |
WO 0004458 | Jan 2000 | WO |
WO 0025224 | May 2000 | WO |
WO 0038381 | Jun 2000 | WO |
WO 0045560 | Aug 2000 | WO |
WO 0052906 | Sep 2000 | WO |
WO 0062489 | Oct 2000 | WO |
WO 0072528 | Nov 2000 | WO |
WO 0079362 | Dec 2000 | WO |
WO 0079730 | Dec 2000 | WO |
WO 0106717 | Jan 2001 | WO |
WO 0113585 | Feb 2001 | WO |
WO 0223807 | Mar 2002 | WO |
WO 0233892 | Apr 2002 | WO |
WO 0233893 | Apr 2002 | WO |
WO 0233894 | Apr 2002 | WO |
WO 0233896 | Apr 2002 | WO |
WO 0233915 | Apr 2002 | WO |
WO 0233916 | Apr 2002 | WO |
WO 03084134 | Oct 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20090006647 A1 | Jan 2009 | US |
Number | Date | Country | |
---|---|---|---|
60241450 | Oct 2000 | US | |
60275206 | Mar 2001 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09923924 | Aug 2001 | US |
Child | 12157688 | US | |
Parent | 12157688 | US | |
Child | 12157688 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09903441 | Jul 2001 | US |
Child | 12157688 | US | |
Parent | 09903423 | Jul 2001 | US |
Child | 09903441 | US |