The field of invention relates to networking, generally; and, more specifically, to a method and apparatus for true priority based connection establishment within a PNNI ATM network.
An exemplary Private Network Node Interface (PNNI) Asynchronous Transfer Mode (ATM) network 101 is shown in
The term “connection” or “circuit” is often used to describe a pre-defined path through a network. Typically, when a body of information is to be transported over a network, a connection is setup beforehand that establishes (in some manner and to some extent) the path that the cells will take. Various types of connections may be used within an ATM network 101. These include: 1) permanent virtual circuits (PVCs); 2) switched virtual circuits (SVCs); and 3) soft permanent virtual circuits (SPVCs).
In the case of PVCs, a quasi-permanent connection is established (e.g., a connection that lasts for days, weeks, months, etc.). PVCs are often used in situations where a large corporate user desires to permanently clear a guaranteed pipe through the network 101 from one large office to another large office. For example, if node 1051 corresponds to the Customer Premise Equipment (CPE) of a first corporate office and node 1052 corresponds to the CPE of a second corporate office, a PVC may be established that couples nodes 1021, 1024, 1027 and network lines 1033, 10311 together (in order to form an end-to-end path through the network 100 between CPEs 1051 and 1052).
Generally, the amount of traffic (e.g., as between two large corporate offices) and the extent of the usage (e.g., every business day for the foreseeable future) justifies the costs associated with dedicating, in a quasi-permanent fashion, a fixed amount of the network's resources to one particular pathway. Typically, a PVC is manually configured by a network manager from a network management control station 104. As such, commands are issued from the network control station 104 to the various nodes in the network 101 that “make up” the PVC (so that the lookup tables, etc. within these nodes can be properly updated).
Another characteristic of a PVC is that a PVC user simply directs traffic into the network 101 (e.g., from node 1051) with little or no formal request for transportation services from the network 101. For example, typically, a PVC user at node 1051 will send ATM cells having the PVC's VPI/VCI across the ATM User Network Interface (UNI) at link 1031. Based upon the VPI/VCI information, node 1021 (e.g., as well as subsequent nodes along the PVC path) will be able to properly switch the cells onto a link that corresponds to the PVC path. Thus, because the connection is quasi-permanent and has already been established, there is little or no procedural overhead associated with connection setup (such as a SETUP request message and the like). The user is provided an appropriate VPI/VCI well beforehand (e.g., shortly after PVC setup) which is invoked each time thereafter by the user when the services of the PVC are desired.
SVCs, on the other hand, are established on a temporary basis rather than a quasi-permanent basis. SVCs efficiently utilize the resources of a network if the network has to support a large number of different connection paths over a fairly brief period of time (e.g., seconds, minutes, hours). In contrast to PVCs, SVCs are usually established on a “call-by-call” basis and therefore have: 1) some form of formal user request to the network 101 for transportation services; and, 2) a connection “setup” procedure that follows the request for transportation services and a connection “tear down” procedure that follows the successful performance of the requested transportation services.
The connection setup/tear down procedures may be viewed as the “automatic” configuration of a connection within the network rather than manual configuration from a network management control station 104. PNNI is a routing and signaling protocol that determines and establishes connection paths. The PNNI routing protocol is executed on the source endpoint (e.g., source endpoint 1021 for connections initiated from originating node 1051), and is often referred to as a “source” routing protocol. An example of PNNI's routing and signaling techniques are provided immediately below.
If node 1051 (the “originating” node) desires to send information to node 1052 (the “target” node), the originating node 1051 will effectively request the network 101 for a connection to be established between nodes 1051 and node 1052. Typically, this request takes the form of a SETUP message that is passed over the ATM UNI at link 1031. The access node 1021 (which may be referred to as the source endpoint node) receives the SETUP message and determines an appropriate path for the connection through the network via the PNNI routing protocol.
The SETUP message then traverses the network 101 to the destination endpoint node 1027. When the SETUP message is received at the destination endpoint node 1027, a CONNECT message is issued from the destination endpoint node 1027 to the source endpoint node 1021. The CONNECT message “bounces”, node-by-node, along the connection path to the source endpoint node 1021. Each node that receives the CONNECT message updates its lookup table (or other routing/switching platform) with an appropriate reference to the connection being established. When the source endpoint node 1021 receives the CONNECT message, the VPI/VCI for the connection is passed to the user at the ATM UNI (along link 1031), the connection is established, and transportation services may commence. After the transportation services are complete, the connection is torndown in a manner similar to that in which it was established.
An SPVC is often viewed as a blending of an SVC and a PVC. SPVCs are often used to provide guaranteed bandwidth to a particular user (such that the user enjoys service as if a permanent pipe has been established through the network 101) while, simultaneously, the network 101 is allowed to flexibly adapt to different connection paths over brief periods of time (by establishing each SPVC communication with connection setup and tear down procedures). In order to implement an SPVC service, the endpoint nodes of the ATM network 101 (e.g., source node 1021 and destination node 1027) are configured to behave like PVC nodes with respect to the user (e.g., along the ATM UNI at link 1031) while behaving like SVC nodes within the ATM network 101 itself.
With an SPVC, the source and destination endpoint nodes 1021 and 1027 are usually manually configured by the network management station 104 to provide a PVC interface to the users at node 1051 (and at node 1052). That is, for example, a quasi permanent VPI/VCI is provided to the user that is to be invoked each time the services of the SPVC are desired. Upon the receipt of ATM cells having this VPI/VCI information, however, the endpoint source node 1021 triggers the release of a SETUP message which traverses the network 101 to destination endpoint node 1027. A CONNECT message is returned to the endpoint source node 1021, and the SPVC is established.
The present invention is illustrated by way of example, and not limitation, in the Figures of the accompanying drawings in which.
A problem with both SVC and SPVC type connections is that the connection establishment process does not execute a “true” Quality of Service (QoS) priority bumping scheme with respect to the network 101 as a whole. QoS relates to the notion that the various connections supported by the network 101 are to be prioritized in some manner with respect to one another. For example, the network 101 may be configured to give cells associated with higher priority connections lower end-to-end delay across the network 101 than cells associated with lower priority connections.
Another QoS parameter concerns the connection establishment process. Specifically, under a process that may be referred to as “priority bumping”, higher priority connections are established at the expense of lower priority connections. For example, if the network 101 is supporting a large number of low priority connections at the same moment it happens to receive a request for a high priority connection, one or more of the low priority connections can be “dropped” so that the high priority connection can be established.
The PNNI routing and signaling scheme is often said to be a “source routing” scheme because the appropriate path for a network connection is determined at the node that acts as its source endpoint (e.g., node 1021 for connections initiated by node 1051). Currently, only a limited form of priority bumping is possible. Specifically, only those lower priority connections that actually pass through the source endpoint can be dropped.
Consequently, a remote node that supports many low priority connections cannot drop these connections in order to support a higher priority connection; unless, these connections also happen to flow through the same endpoint node that seeks to establish the high priority connection. Thus, in a sense, the power to drop one or more lower priority connections in favor of a higher priority connection is localized to the realm of the source endpoint node that seeks to establish the higher priority connection (rather than being distributed over the network 101 as a whole).
The power to drop connections is limited in the manner described above because the source endpoint node that is responsible for establishing a connection has little or no perspective as to the manner in which bandwidth resources elsewhere in the network have been allocated with respect to connection priority. As such, in order to expand the scope of those lower priority connections that may be dropped in order to support a higher priority connection, a source endpoint should be made aware of the connections being supported on other nodes in terms of their priority and they bandwidth the consume.
Thus, as seen in the methodology of
After the SIG information has been received 201, the prospective source endpoint node will update 202 its present understanding of the network. In various embodiments, the understanding of the network corresponds to the collection of the latest SIG information received from each node within the network. As such, a network wide status is crafted from which those bandwidth resources (e.g., a remote node; and/or, a link or portion of a link that is coupled to a remote node) that can be used to support a connection having a specific priority is identified.
When a new connection is requested 203 (e.g., formally in the case of an SVC or informally in the case of an SPVC), the prospective source node attempts to determine 204 a possible path through the network. For example, in various “path-recursive” approaches, the prospective source endpoint node is configured to determine a “first pass” path (e.g., according to a PNNI compliant source routing algorithm) through the network. Then, once the “first pass” path has been determined, the bandwidth resources that would be used along the path are looked into (as understood via the network understanding that has been developed 202) to see if the path can be entertained.
If the path can be entertained, the connection path is established (which may involve the dropping of lower priority connections) via the issuance 205 of a SETUP message from the source endpoint node. If not, an alternative “second pass” path is determined and analyzed in a similar fashion. The process continues in a recursive fashion until a workable path is identified (in which case the connection is ultimately established); or, alternatively, is not identified (in which case the connection is not ultimately established).
In other approaches, unlike the approach just described above where different paths are analyzed recursively, a routing algorithm may be used that automatically determines the appropriate path. For example, a weighted routing algorithm may be used that assigns weights to the bandwidth resources of the network that are available for the priority level of the requested connection. The mathematics of the algorithm then automatically finds the path having the heaviest (or lightest) weight as it progresses systematically from the source endpoint node to the destination endpoint node. Other routing approaches may be possible as well.
Specifically,
With regard to the discussion of
Referring to
That is, the SIG information unit for link 1033 indicates that 311 Mb/s of that link's bandwidth has been allocated for connections having a priority level of 1 or a priority level of 2 (i.e., 155.5 Mb/s of priority level 1 traffic+155.5 Mb/s of priority level 2 traffic=311 Mb/s of priority level 1 and 2 traffic). Because the requested connection has a priority level of 3 (and because higher priority connections have lower priority level numbers), the 311 Mb/s worth of allocated bandwidth will not be dropped from link 1033 (because this bandwidth has been dedicated to higher priority connections) and may be said to be “unavailable”.
Nevertheless, 155.5 Mb/s of the link's bandwidth is freely available (i.e., 466.5 Mb/s of total bandwidth−311 Mb/s of unavailable bandwidth=155.5 Mb/s of available bandwidth). As such, link 1033 can be used to support the requested connection. Link 10311, however, has no bandwidth available for links of priority level 3 or lower. To first order, all 466.5 Mb/s of the link's bandwidth has been consumed; and, none of the priority levels for which bandwidth has been allocated is lower than the priority level of the requested connection. As such, there are no lower priority connections that can be “bumped” in order to make room for the requested connection. Link 1033 is therefore deemed unavailable for the connection and the “first pass” path through the network 101 can not be established.
If the routing protocol identifies a 1032-1022-1035-1025-10312-1027 path through the network as the “second pass” path, this second pass path can be entertained. Specifically, each of links 1032, 1035, and 10312 are only carrying traffic having a lower priority (priority levels 4, 5 and 6) than the requested connection (priority). As such, in an embodiment, any or all of the connections on these links may be dropped to support connections having a priority level of 3 or higher.
In a further embodiment, connections are dropped according to reverse priority. That is, the lowest priority connection(s) beneath the priority level of the requested connection are dropped first, followed by the next lowest, etc.
That is, the 155.5 Mb/s worth of bandwidth that was originally allocated to the priority level 6 connection(s) has been re-allocated to the newly established priority level 3 connection. As a result, the priority level 4 and priority level 5 connection(s) have been unaffected by the establishment of the new, priority level 3 connection. Note that the newly established priority level 3 connection has also dropped all of the previous traffic that existed on access link 10314.
If the bandwidth available for the newly requested connection is greater than the bandwidth to be consumed by the newly requested connection, the requested connection may be entertained at the bandwidth resource being analyzed. Furthermore, if the freely available bandwidth is greater than or equal to the bandwidth to be consumed by the requested connection, then the connection may be established 506 without any priority bumping.
If, however, the freely available bandwidth is not greater than or equal to the bandwidth to be consumed by the requested connection, the connection is established 506 with priority bumping (e.g., at the expense of the lowest priority connection(s). When a connection is being established, the source endpoint node issues a SETUP message that traverses the network to the destination endpoint node. In an embodiment, the SETUP message is configured to include the priority level and the bandwidth of the connection being established so that the nodes that carry the new connection can determine which connections are to be dropped.
Referring back to
For example, referring to
Thus, in a sense, the occurrence of the event ripples through the network so that its constituent nodes can cohesively route information around the downed link 10310 in response. In other cases, typically, the network's nodes 1021 through 1027 are also configured to broadcast current status information as well as special events. Thus, on a broader scale, the nodes of the network may be said to communicate procedural (e.g., “control”) information with one another as well as the substantive information associated with user traffic.
This control information is often organized into one or more PNNI Topology State Elements (hereinafter, referred to as PTSEs) that are embedded into a PNNI Topology State Packet (hereinafter, referred to as a PTSP). A PTSP is a packet that acts as the broadcast mechanism while a PTSE acts as a component of the PTSP's payload. Thus, for example, if a node has information to broadcast it issues a PTSP that carries one or more PTSEs that each have the information to be communicated. An embodiment 600 of a PTSP is shown in
Referring to
The PTSE field 601 includes one or more PTSEs 6011 through 601x. An embodiment 701 of a PTSE is shown in
The PTSE header field 702 also includes a identifier field 710 that identifies the type of PSTE that PTSE 701 corresponds to. That is, PNNI employs a characterization scheme so that specific types of information can be binned together or recognized within a common PTSE format. The various PTSE types include (among possible others): 1) Horizontal Link; 2) Uplink; 3) External Address; 4) Internal Address; 5) Nodal Parameters (complex node); and 6) Nodal. Those of ordinary skill can identify the purpose and/or use of each PTSE type.
Referring to the PTSE embodiment 701 of
Through the use of the SIG field 705, two nodes from the same manufacturer can communicate information with one other that is not specifically provided for by the PNNI standard; while, at the same time, operate in compliance with the PNNI standard. That is, those nodes that can understand and use the contents of the SIG field 705 may do so while those that do not understand the SIG field 705 contents may simply ignore its information (as well as forward the PTSE having the SIG field to another node via a rebroadcast effort).
The Horizontal Link PTSE type is commonly used to transport information that pertains to a link, or a portion of a link. That is, finer granularities than the whole of a link's resources may be specified or described with a Horizontal Link PTSE. These finer granularities may be used to develop a deeper understanding of the network's bandwidth allocations. For example, the industry standard field 704 of a Horizontal Link PTSE can specify a particular type of service such as a Constant Bit Rate (CBR) service, a real time or non-real time Variable Bit Rate (VBR) service, an Available Bit Rate (ABR) service and an Unspecified Bit Rate (UBR) service.
As such, the priority levels of a particular link may be further specified so as to define specific priority levels for each of the service types that exist on the link. As such, the network can be configured to bump lower priority connections of a specific type in response to a request for a connection of the same service type. Further still, the industry standard field 704 of a Horizontal Link PTSE can specify particular QoS parameters (e.g., average cell rate, max cell rate, cell transfer delay, cell delay variation, and cell loss ratio).
As such, the priority levels of a particular link may be further specified so as to define specific priority levels not only for each service type, but also for each common combination of QoS parameters that exist on the link. Thus, in various embodiments, the industry standard field 704 of a Horizontal Link PTSE is used to specify the service type or the service type and specific QoS settings for which the bandwidth allocations are detailed according to different priority levels. In various embodiments, the bandwidth allocations for the various priority levels of each of these finer granularities of a link may be specified within the SIG field 705.
The header field component 801 includes various header information such as a type field 806 (that indicates the data structure 805 is a SIG field), a length field 807 that describes its length and an Organization Unique Identifier (OUI) field 808 that is typically used to recognize the manufacturer of the node that issued the SIG information (i.e., is a “vendor-specific” label). As a SIG field is typically used by the nodes of a common manufacturer to support functional improvements (beyond the PNNI standard) that are unique to the products of the manufacturer, the OUI field 808 is often used by a node to decide whether or not to ignore a received SIG field. That is, if the vendor specific label of the OUI field 808 “matches” the vendor of the node that receives the SIG information, the SIG information will be “looked into”; otherwise, the SIG information will be discarded.
Within the payload 802 of the SIG field 805, the ID # field 803 identifies the particular type of information being delivered by the SIG 805. This allows a node that supports vendor-specific functionality to understand the specific type of information enclosed in the payload 802. As such, in an embodiment, a specific binary number is used to identify that the SIG field 805 includes information related to the priority levels of the particular service type (and perhaps QoS parameter combination) that are specified in the industry standard portion of the PTSE that carries the SIG field 805. In the particular embodiment of
The rate at which PTSE information (having priority level bandwidth distributions embedded within its SIG field) is broadcast from a particular node may vary from embodiment to embodiment. For example, in one embodiment, PTSE information may be broadcast for each new connection that reflects a change in the distribution of bandwidth resources to the various priority levels. In various networking environments, however, issuing new PTSE information from each node that undergoes a mere change in distribution may congest the network with PTSP packets; or, may make an already congested network even further congested.
As a network gets congested, the delay experienced by its cells increases. Thus, the network understandings that are developed by the network's endpoint nodes may become in danger of being unacceptably inaccurate. That is, the SIG information embedded within the most recently received PTSP packets (which have experienced significant delay) is stale with respect to the actual state of the bandwidth resources they are describing.
As such, in alternate embodiments, the conditions that trigger the release of PTSE information having priority related SIG information may be scaled back. For example, rather than release PTSE information with each change in the distribution of bandwidth resources, in an alternate embodiment PTSE information is released with each “significant” change in the distribution of bandwidth resources. As just one approach, if any priority level experiences a looked-for percentage change (within a finite time period) of allocated bandwidth in either direction (e.g., a 50% increase in bandwidth resources or a 50% decrease in bandwidth resources), PTSE information reflecting the change is broadcast.
In this case, the degree of “significance” is defined by the looked for percentage. As such, other embodiments can configure other degrees of significance such as 25%, 33%, or 66% to name just a few. Note that the degree of significance can adapt to network conditions. For example, under light congestion conditions, the network can reliably handle more PTSP packets. As such, the degree of significance may be lowered (e.g., from X % to Y % where X>Y) so that more PTSE information is issued per unit time (which increases the accuracy of the network understandings made at the endpoint nodes). As network congestion increases, the degree of significance may be increased (e.g., from Y % to X %, where X>Y) so that the PTSE information does not significantly add to the network's congestion.
In other embodiments, rather than trigger the release of PTSE information having priority related SIG information only on an event (such as a change in bandwidth allocation or a significant change in bandwidth allocation), it may alternatively (or in combination) be released periodically. Again, the rate at which the PTSE information is released may vary with network congestion levels. For example, by issuing PTSE information less frequently as congestion rises; or, more frequently as congestion falls.
Note that, to the extent that the understandings of the network that are being maintained by the endpoint nodes become inaccurate, the “crankback” mechanism associated with PNNI signaling may be employed to recover from such an inaccuracy. Specifically, an inaccurate network understanding may result in the release of a SETUP message from a source endpoint node for a connection path that cannot be entertained because higher priority connections have already been established between the time the source endpoint node's latest PTSE information was issued and the time the connection request was received.
Upon the receipt of such a SETUP message by a node that is intended to carry the new connection yet cannot support it (because its bandwidth resources are already consumed by higher or equal priority level connections), the node may return a “crankback” message back to the source endpoint node that issued the SETUP message. The crankback message can be configured to contain information that effectively explains the problem to the source endpoint node. In response, the source endpoint node can update its network understanding and re-determine another path through the network.
As routing and signaling protocols are often implemented with software, it is to be understood that embodiments of this invention may be used as or to support a software program executed upon some form of processing core (such as the CPU of a computer) or otherwise implemented or realized upon or within a machine readable medium. A machine readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine readable medium includes read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
Furthermore, it is noteworthy to point out that a network node (which may also be referred to as a networking node, a node, a networking system and the like) is a system designed to act as a switch or a router or other device that relays information from a first networking line to a second networking line. A depiction of a networking node 900 is observed in
The node 900 is mostly responsible for collecting a traffic unit (e.g., a packet, a cell or a Time Division Multiplexed (TDM) time slot) from a first networking line (e.g., networking line 9011) and re-transmitting at least a portion of it (e.g., its payload and various sections of its header) onto a second networking line (e.g., networking line 9016). As such, the node 900 effectively relays information so that it may be carried over various geographic distances. Some degree of intelligence is involved in the relaying process so that the traffic units being collected are forwarded onto an appropriate networking line (e.g., in light of their source address and destination address).
As such, the node 900 of
The switching/routing layer 903 is responsible for effectively deciding which networking line is an appropriate networking line upon which a particular traffic unit should be transmitted upon. The switching/routing layer 903 often performs this activity based upon header information or other control information (such as SS7 based TDM connection information) associated with each traffic unit. Connection establishment and tear-down procedures (as well as network topology broadcasts or other networking overhead information) can often be viewed as being integrated into (or coupled to so as to communicate with) the switching/routing layer 903.
Note that the architecture of a networking system having a routing/switching layer 903 and an ingress/egress layer 902 may vary from embodiment to embodiment. For example, in some cases the switching/routing layer 903 may be designed onto a single card; or, in other cases, the switching/routing layer 903 may be designed across a plurality of cards. Also, in some cases the switching/routing layer 903 (or a portion thereof) may be integrated onto a Line Interface Card (LIC) that also acts as part of the ingress/egress layer 902.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Number | Name | Date | Kind |
---|---|---|---|
4703475 | Dretzka et al. | Oct 1987 | A |
4845710 | Nakamura et al. | Jul 1989 | A |
4953157 | Franklin et al. | Aug 1990 | A |
5121383 | Golestani | Jun 1992 | A |
5128932 | Li | Jul 1992 | A |
5140584 | Suzuki | Aug 1992 | A |
5153877 | Esaki et al. | Oct 1992 | A |
5193090 | Filipiak et al. | Mar 1993 | A |
5197064 | Chao | Mar 1993 | A |
5208805 | Ochiai | May 1993 | A |
5222085 | Newman | Jun 1993 | A |
5224099 | Corbalis et al. | Jun 1993 | A |
5233606 | Pashan et al. | Aug 1993 | A |
5274643 | Fisk | Dec 1993 | A |
5276681 | Tobagi et al. | Jan 1994 | A |
5313454 | Bustini et al. | May 1994 | A |
5335224 | Cole et al. | Aug 1994 | A |
5341366 | Soumiya et al. | Aug 1994 | A |
5359592 | Corbalis et al. | Oct 1994 | A |
5359593 | Derby et al. | Oct 1994 | A |
5361259 | Hunt et al. | Nov 1994 | A |
5361372 | Rege et al. | Nov 1994 | A |
5367643 | Chang et al. | Nov 1994 | A |
5381404 | Sugano et al. | Jan 1995 | A |
5390299 | Rege et al. | Feb 1995 | A |
5420857 | Jurkevich | May 1995 | A |
5422880 | Heitkamp et al. | Jun 1995 | A |
5425019 | Chugo et al. | Jun 1995 | A |
5483526 | Ben-Nun et al. | Jan 1996 | A |
5528763 | Serpanos | Jun 1996 | A |
5539729 | Bodnar | Jul 1996 | A |
5546389 | Wippenbeck et al. | Aug 1996 | A |
5561663 | Klausmeier | Oct 1996 | A |
5602988 | Haulin | Feb 1997 | A |
5613073 | Hammond, Jr. et al. | Mar 1997 | A |
5617417 | Sathe et al. | Apr 1997 | A |
5687167 | Bertin et al. | Nov 1997 | A |
5729546 | Gupta et al. | Mar 1998 | A |
5748629 | Caldara et al. | May 1998 | A |
5748905 | Hauser et al. | May 1998 | A |
5754787 | Dedrick | May 1998 | A |
5764626 | VanDervort | Jun 1998 | A |
5781533 | Manning et al. | Jul 1998 | A |
5790770 | McClure et al. | Aug 1998 | A |
5793744 | Kanerva et al. | Aug 1998 | A |
5815492 | Berthaud et al. | Sep 1998 | A |
5822540 | Caldara et al. | Oct 1998 | A |
5850395 | Hauser et al. | Dec 1998 | A |
5862137 | Manning et al. | Jan 1999 | A |
5867663 | McClure et al. | Feb 1999 | A |
5870538 | Manning et al. | Feb 1999 | A |
5872769 | Caldara et al. | Feb 1999 | A |
5872771 | Park et al. | Feb 1999 | A |
5881049 | Beshai et al. | Mar 1999 | A |
5889956 | Hauser et al. | Mar 1999 | A |
5896511 | Manning et al. | Apr 1999 | A |
5898671 | Hunt et al. | Apr 1999 | A |
5898691 | Liu | Apr 1999 | A |
5905729 | Gaddis et al. | May 1999 | A |
5909427 | Manning et al. | Jun 1999 | A |
5917804 | Shah et al. | Jun 1999 | A |
5917805 | Manning et al. | Jun 1999 | A |
5926475 | Saldinger et al. | Jul 1999 | A |
5933429 | Bubenik et al. | Aug 1999 | A |
5936940 | Marin et al. | Aug 1999 | A |
5940372 | Bertin et al. | Aug 1999 | A |
5948067 | Caldara et al. | Sep 1999 | A |
5956342 | Manning et al. | Sep 1999 | A |
5970067 | Sathe et al. | Oct 1999 | A |
5978359 | Caldara et al. | Nov 1999 | A |
5982771 | Caldara et al. | Nov 1999 | A |
5982776 | Manning et al. | Nov 1999 | A |
5983260 | Hauser et al. | Nov 1999 | A |
5983278 | Chong et al. | Nov 1999 | A |
5991298 | Hunt et al. | Nov 1999 | A |
5996019 | Hauser et al. | Nov 1999 | A |
6002667 | Manning et al. | Dec 1999 | A |
6011778 | Kilkki et al. | Jan 2000 | A |
6028840 | Worster | Feb 2000 | A |
6041039 | Kilkki et al. | Mar 2000 | A |
6052385 | Kanerva et al. | Apr 2000 | A |
6061348 | Castrigno et al. | May 2000 | A |
6076112 | Hauser et al. | Jun 2000 | A |
6084858 | Matthews et al. | Jul 2000 | A |
6088736 | Manning et al. | Jul 2000 | A |
6088817 | Haulin | Jul 2000 | A |
6115374 | Stonebridge et al. | Sep 2000 | A |
6115748 | Hauser et al. | Sep 2000 | A |
6141346 | Caldara et al. | Oct 2000 | A |
6154444 | Masuo et al. | Nov 2000 | A |
6160808 | Maurya | Dec 2000 | A |
6167030 | Kilkki et al. | Dec 2000 | A |
6167452 | Manning et al. | Dec 2000 | A |
6181705 | Branstad et al. | Jan 2001 | B1 |
6212582 | Chong et al. | Apr 2001 | B1 |
6219728 | Yin | Apr 2001 | B1 |
6222824 | Marin et al. | Apr 2001 | B1 |
6236655 | Caldara et al. | May 2001 | B1 |
6240102 | Asano | May 2001 | B1 |
6256309 | Daley et al. | Jul 2001 | B1 |
6256674 | Manning et al. | Jul 2001 | B1 |
6327615 | Kasper | Dec 2001 | B1 |
6356546 | Beshai et al. | Mar 2002 | B1 |
6356962 | Kasper | Mar 2002 | B1 |
6407998 | Polit et al. | Jun 2002 | B1 |
6418169 | Datari | Jul 2002 | B1 |
6426957 | Hauser et al. | Jul 2002 | B1 |
6466582 | Venters et al. | Oct 2002 | B2 |
6490249 | Aboul-Magd et al. | Dec 2002 | B1 |
6493317 | Ma | Dec 2002 | B1 |
6496504 | Malik | Dec 2002 | B1 |
6512769 | Chui et al. | Jan 2003 | B1 |
6516371 | Lai et al. | Feb 2003 | B1 |
6526060 | Hughes et al. | Feb 2003 | B1 |
6526063 | St-Amand et al. | Feb 2003 | B1 |
6526451 | Kasper | Feb 2003 | B2 |
6529498 | Cheng | Mar 2003 | B1 |
6539024 | Janoska et al. | Mar 2003 | B1 |
6546249 | Imai et al. | Apr 2003 | B1 |
6603764 | Epley | Aug 2003 | B1 |
6608813 | Chiussi et al. | Aug 2003 | B1 |
6608815 | Huang et al. | Aug 2003 | B1 |
6614757 | Rochberger et al. | Sep 2003 | B1 |
6625155 | Dziong | Sep 2003 | B1 |
6658014 | Tezuka | Dec 2003 | B1 |
6678264 | Gibson | Jan 2004 | B1 |
6687230 | Furutono et al. | Feb 2004 | B1 |
6690671 | Anbiah et al. | Feb 2004 | B1 |
6724881 | McAllister et al. | Apr 2004 | B1 |
6731599 | Hunter et al. | May 2004 | B1 |
6747972 | Lenoski et al. | Jun 2004 | B1 |
6751214 | Parruck et al. | Jun 2004 | B1 |
6778495 | Blair | Aug 2004 | B1 |
6819658 | Agarwal et al. | Nov 2004 | B1 |
6826196 | Lawrence | Nov 2004 | B1 |
6862284 | Spiegel et al. | Mar 2005 | B1 |
6876657 | Brewer et al. | Apr 2005 | B1 |
6891836 | Chen et al. | May 2005 | B1 |
6895441 | Shabtay et al. | May 2005 | B1 |
6934249 | Bertin et al. | Aug 2005 | B1 |
6956821 | Szviatovszki et al. | Oct 2005 | B2 |
6977898 | Miriyala | Dec 2005 | B1 |
7016975 | Dolganow et al. | Mar 2006 | B2 |
7039014 | Krishnamurthy et al. | May 2006 | B1 |
7092356 | Rabie et al. | Aug 2006 | B2 |
7233571 | Krishnamurthy et al. | Jun 2007 | B1 |
20010043624 | Saito et al. | Nov 2001 | A1 |
20020018269 | Chaudhuri et al. | Feb 2002 | A1 |
20020023163 | Frelechoux et al. | Feb 2002 | A1 |
20020057649 | Kinnunen | May 2002 | A1 |
20020124106 | Dolganow et al. | Sep 2002 | A1 |
20030236854 | Rom et al. | Dec 2003 | A1 |
20040213242 | Ando et al. | Oct 2004 | A1 |
20050207371 | Chen et al. | Sep 2005 | A1 |
Number | Date | Country |
---|---|---|
WO 9965194 | Dec 1999 | WO |