The present invention relates generally to communication networks, and specifically to methods and systems for controlling frame transmission through bridged networks.
Local Area Networks (LANs) connect computing systems together at the Layer-2 level. The term “Layer 2” refers to the second layer in the protocol stack defined by the well-known Open Systems Interface (OSI) model, also known as the logical link, data link, or Media Access Control (MAC) layer. Each computing system connects to a LAN through a MAC device. Multiple LANs can be connected together using MAC bridges, as set forth in the IEEE Standard for Information Technology, Telecommunications and Information Exchange between Systems, Local and Metropolitan Area Networks, Common Specifications, Part 3: Media Access Control (MAC) Bridges, published as ANSI/IEEE Standard 802.1D (2004), which is incorporated herein by reference. (The 802.1D standard, as well as other IEEE standards cited herein, is available at standards.ieee.org/catalog/.) MAC bridges that implement the 802.1D standard allow MAC devices attached to physically separated LANs to appear to each other as if they were attached to a single LAN. The bridge includes two or more MAC devices that interconnect the bridge ports to respective LANs.
MAC bridges maintain a forwarding database (FDB) to map destination MAC addresses of the frames they receive to bridge network interfaces (also referred to as ports). The bridge builds the forwarding database by means of a learning process, in which it associates the source MAC address of each incoming frame with the interface on which the frame was received. When the bridge receives an incoming frame whose destination address is not found in the database, it floods (i.e., broadcasts) the frame through all its available interfaces, except the one through which the frame arrived. Other MAC bridges that do not recognize the destination address will further flood the frame to all the relevant interfaces. Through the flooding mechanism, the frame will eventually traverse all interconnected bridges at least once, and will ultimately reach its destination.
Layer-2 bridged networks are generally configured to provide multipoint-to-multipoint connectivity among stations (i.e., computers) in the network. Some applications, however, require that certain stations in the network be separated and prevented from communicating directly with one another. For example, access networks deployed by Internet service providers (ISPs) are meant to provide connectivity between subscribing customer premises and ISP equipment, which provides access to the Internet and other network services. The ISP typically uses an aggregation network to aggregate and concentrate customer traffic to and from access routers that are connected to the public network. For security and other reasons, the ISP may wish to prevent customer premises from communicating directly with one another via the aggregation network.
Melsen et al. describe one method for preventing direct communication between subscribers in “MAC-Forced Forwarding: A Method for Subscriber Separation on an Ethernet Access Network,” published by the Internet Engineering Task Force (IETF) as Request for Comments (RFC) 4562 (June, 2006), which is incorporated herein by reference. (This RFC, as well other documents published by the IETF that are cited hereinbelow, is available at www.ietf.org.) The method described in this RFC is based on an Address Resolution Protocol (ARP) proxy function that prohibits Ethernet MAC address resolution between hosts located within the same Internet Protocol version 4 (IPv4) subnet but at different customer premises. The effect of this proxy function is to direct all upstream traffic to an IPv4 gateway, which provides IP-layer connectivity between the hosts.
Melsen et al. describe a number of other solutions that may be deployed to prevent Layer-2 visibility between stations in an Ethernet access network. One possibility is to use the Point-to-Point Protocol over Ethernet (PPPoE), as defined by Mamakos et al. in IETF RFC 2516 (February, 1999). Melsen et al. point out, however, that this solution does not support efficient multicast, since frames must be replicated on each PPPoE session to all hosts in a given multicast group. Another possibility is to use a different Virtual Local Area Network (VLAN) for each customer premises network, as described by McPherson et al. in IETF RFC 3069 (February, 2001). According to Melsen et al., this solution also requires replication of multicast frames, is limited in scalability, and increases complexity of provisioning.
Embodiments of the present invention provide improved methods and systems for affording point-to-multipoint (P2MP) connectivity over a Layer-2 bridged network, while maintaining the underlying Layer-2 network architecture. These embodiments support an efficient IP (Layer-3) addressing scheme, which can use a single IP subnet across the network, so that all nodes belong to the same broadcast domain. Using these embodiments, a system operator can provision, add, and change nodes in the network easily and efficiently, with unlimited scalability.
In the embodiments of the present invention that are described hereinbelow, the interfaces of switches at the edge of a Layer-2 bridged network are configured as belonging to first and second types. In access network scenarios, for example, the first interface type may be a hub type, which connects to the Internet and public network services (or to a content center, such as a video distribution or video-on-demand service), while the second interface type is a spoke type, which connects to customer premises equipment. (Switches within the Layer-2 bridged network may also be connected to one another by a third type of interface, referred to hereinbelow as a network-type interface.)
Upon receiving frames through interfaces of the first and second types, the switches label the received frames with corresponding first and second type indications. These type indications are used in MAC learning and forwarding processes so as to prevent frames received through interfaces of the second type (such as spoke interfaces) from being transmitted through other interfaces of the second type. These frames may thus be transmitted out of the Layer-2 bridged network only through first-type (hub) interfaces. On the other hand, frames received through interfaces of the first type may be transmitted through any of the other interfaces.
Although the simplest P2MP model involves only a single hub with multiple spokes, the embodiments described herein can readily support multiple interfaces of the first type, each connected in its own P2MP topology with the second-type interfaces on the network. At the same time, multipoint-to-multipoint connectivity between the hubs is maintained. Some embodiments of the present invention, which are described hereinbelow, provide mechanisms that support reconfiguration of stations within the network while detecting and avoiding possible creation of Layer-2 loops.
There is therefore provided, in accordance with an embodiment of the present invention, a method for communication, including:
coupling a group of switches in a Layer-2 bridged network, each switch including multiple network interfaces;
configuring the interfaces so that at least one interface of at least one of the switches is configured as a first type of the interfaces, and a plurality of other interfaces are configured as a second type of the interfaces;
upon receiving frames through the interfaces of the first and second types for transmission over the network, labeling the received frames with corresponding first and second type indications; and
forwarding the frames through the Layer-2 bridged network using the switches responsively to the type indications, such that the frames labeled with the first type indication are permitted to be transmitted through any of the interfaces, while the frames labeled with the second type indication are permitted to be transmitted through the interfaces of the first type and prevented from being transmitted through the interfaces of the second type.
In some embodiments, the Layer-2 bridged network is arranged for multipoint-to-multipoint connectivity, and configuring the interfaces includes configuring the at least one interface as a hub and the plurality of the other interfaces as spokes in a point-to-multipoint topology. Typically, coupling the group of switches includes connecting the spokes to customer premises equipment, and connecting the hub to a Layer-3 network, so as to define an access network that enables the customer premises equipment to access the Layer-3 network while preventing communication via the Layer-2 bridged network between the customer premises equipment on different spokes except via the hub. In a disclosed embodiment, all nodes in the Layer-2 bridged network are assigned addresses in a single network broadcast domain, so that a frame broadcast via the hub will reach the customer premises equipment on all of the spokes.
The Layer-2 bridged network may include at least one of an Ethernet network and a virtual Layer-2 network.
In a disclosed embodiment, configuring the interfaces includes assigning the interfaces that do not belong to the first or second type to a third type, such that upon receiving the frames through the interfaces of the third type, the switches leave the type indications of the frames unchanged.
In some embodiments, forwarding the frames includes, upon receiving through a first interface of a given switch a frame including a given destination address, looking up the destination address in a forwarding database, which contains an identification of at least a second interface through which the frame should be forwarded and a type designation of the destination address as being associated with the first or second type of the interfaces, and comparing the type designation with a type indication of the frame in order to determine whether to forward the frame through the second interface. Typically, comparing the type designation with the type indication includes discarding the frame if the frame includes the second type indication and the type designation indicates that the destination address is associated with the second type of the interfaces.
In disclosed embodiments, the method includes updating the forwarding database using a database learning process responsively to the source address of the frame and to the type indication of the frame. Typically, updating the forwarding database includes adding to the database an entry including the source address of the frame and a number identifying the first interface, wherein the type designation of the entry is set equal to the type indication of the frame.
Additionally or alternatively, the method includes, if the database contains an entry including the source address of the frame, and the type designation of the entry is associated with the first type of the interfaces while the frame is labeled with the second type indication, refraining from updating the entry. The method may include incrementing a counter upon refraining from updating the entry, and updating the entry to contain the type designation that is associated with the second type of the interfaces when the counter reaches a predetermined threshold. Further additionally or alternatively, the method may include receiving a configuration input indicating whether to discard the frame when the database contains the entry including the source address of the frame, and the type designation of the entry is associated with the first type of the interfaces while the frame is labeled with the second type indication, and determining whether to discard the frame responsively to the configuration input.
There is also provided, in accordance with an embodiment of the present invention, apparatus for communication, including a group of switches, which are coupled together in a Layer-2 bridged network, each switch including:
multiple network interfaces, which are configured so that at least one interface of at least one of the switches is configured as a first type of the interfaces, and a plurality of other interfaces are configured as a second type of the interfaces; and
a frame processor, which is operative, upon receiving frames through the interfaces of the first and second types for transmission over the network, to label the received frames with corresponding first and second type indications, and to cause the interfaces to forward the frames through the Layer-2 bridged network responsively to the type indications, by permitting the frames that are labeled with the first type indication to be transmitted through any of the interfaces, while permitting the frames that are labeled with the second type indication to be transmitted through the interfaces of the first type and preventing the frames that are labeled with the second type indication from being transmitted through the interfaces of the second type.
The present invention will be more fully understood from the following detailed description of the embodiments thereof, taken together with the drawings in which:
Alternatively, a similar configuration of network 20 may be used to aggregate communication traffic between multiple base stations transceivers and a central voice gateway in a Third-Generation (3G) cellular backhaul network. Other applications that may use the communication architecture described herein will be apparent to those skilled in the art and are considered to be within the scope of the present invention.
Computers 22 are connected to network 26 via Layer-2 bridge nodes 28. Nodes 28 and 30 typically comprise Layer-2 switches with MAC bridging capability. In addition to nodes 28 and 30 at the edges of network 26, the network may comprise additional core switches (not shown), linking bridge nodes 28 with aggregation nodes 30. Each switch comprises multiple interfaces, which may also be referred to as ports. The operator of network 20 configures the interfaces according to their function:
Network 26 may comprise any suitable type of Layer-2 bridged network. For example, network 26 may be an Ethernet LAN, in which case interfaces 32, 34, 36 are physical Ethernet ports. As another example, network 26 may comprise a virtual bridged network, such as a virtual private LAN service (VPLS) provisioned over an underlying Layer-2 or Layer-3 network, or a VLAN broadcast domain. In this case, the node interfaces may comprise virtual interfaces or a mixture of physical ports and virtual interfaces. In one embodiment, network 26 comprises a VPLS that is provisioned over a Resilient Packet Ring (RPR) network, as described, for instance, in U.S. Patent Application Publication 2006/0109802, whose disclosure is incorporated herein by reference. In this case, Ethernet frames transmitted over network 26 are encapsulated in RPR packets, and the virtual interfaces in the VPLS are identified by the RPR MAC addresses of the corresponding ring network nodes.
Additionally or alternatively, Ethernet “pseudowires” may be provisioned over a network of tunnels through a Layer-3 network, such as Multi-Protocol Label Switching (MPLS) tunnels, as described by Martini et al., in “Encapsulation Methods for Transport of Ethernet over MPLS Networks,” published as IETF RFC 4448 (April, 2006), which is incorporated herein by reference. Other types and combinations of bridged Layer-2 networks in which the principles of the present invention may be implemented will be apparent to those skilled in the art and are considered to be within the scope of the present invention.
It is characteristic of Layer-2 bridged networks that a station connected to any interface of any bridge may communicate with any other station on any other interface of any bridge. The interfaces of nodes 28 and 30 are configured, however, to restrict this connectivity so that spoke-type interfaces 34 may communicate (either directly or via., network-type interfaces 36) only with hub-type interfaces 32, and not with other spoke-type interfaces. In other words, a P2MP topology is created between each hub-type interface and computers 22. These computers are thus constrained to communicate over access network 20 only via the hub-type interfaces and are prevented from communicating directly with one another over the access network. As a result, all communications to and from computers 22 will typically pass through gateways 38, thus enabling the operator of network 20 to use the gateways in applying security and record-keeping measures. This arrangement prevents users of computers 22 from sending malicious traffic directly to other computers via access network 20 or otherwise exploiting the resources of the access network without authorization (and payment as appropriate). On the other hand, hub-type interfaces 32 may be permitted to communicate with one another, as well as with spoke-type interfaces 34, via network 26.
Node 30 comprises multiple line cards 40, linked by a switching core 42. At least one of line cards 40 comprises hub-type interface 32, which connects to public network 24. Typically, each line card may comprise multiple interfaces, although only a few interfaces are shown in
MAC FDB 58 may have the following general form:
The MAC address, optional VLAN ID, and interface (port) number are similar to the comparable fields that are defined by the above-mentioned ANSI/IEEE Standard 802.1D. In other words, for each unicast MAC destination address and VLAN ID that may be carried by a frame that is received by the node in question, the table identifies the interface of the node through which the frame should be forwarded. As noted above, the “interface numbers” may refer to physical or virtual ports; and when Layer-2 frames are encapsulated in other Layer-2 frames, such as in the encapsulation defined by IEEE Standard 802.17b or in other types of MAC-in-MAC encapsulation, these virtual ports may be identified in the table above by the MAC addresses used in the encapsulating frames. (Forwarding of broadcast and multicast frames is determined by flood database 60.) When network 26 comprises a VPLS, the MAC FDB entries may also be resolved according to the VPLS ID, as described, for example, in the above-mentioned patent applications. An “age” field is used in purging stale entries from the MAC FDB, as described hereinbelow.
Two additional fields in MAC FDB 58 are used in enforcing and managing the P2MP network configuration:
Any suitable type indication may be used to mark the frame at step 72, as long as the other nodes in network 20 are programmed to recognize the indication. For example, the VLAN tag specified by IEEE standard 802.1Q includes a CFI bit, which is rarely used in practical network applications. The value of the CFI bit may thus be set to indicate whether the ingress interface is hub- or spoke-type. As another example, if network 20 comprises a set of virtual Ethernet connections over MPLS tunnels, as described in the above-mentioned RFC 4448, one of the bits of the inner pseudo-wire (PW) label may be used to indicate the UNI type. As a further alternative, a control word defined by Bryant et al., in “Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for Use over an MPLS PSN” (IETF RFC 4385, February, 2006), may be used for this purpose.
After receiving and (if the ingress interface is not network-type) marking the frame, the node performs a MAC learning procedure with respect to the MAC source address (SA) of the frame, at a learning step 74. The learning procedure is described in detail hereinbelow with reference to
On the other hand, if there is an entry in the MAC FDB corresponding to the MAC SA of the current frame but with an interface number different from the ingress interface of the current frame, handling of the frame will depend upon the values of the UNI type designation and move counter that are recorded in the FDB, as shown above in Table I. This decision process is described in greater detail hereinbelow with reference to
The node that received the frame at step 70 determines the egress interface through which it should transmit the frame by looking up the MAC destination address (DA) of the frame, at a MAC lookup step 76. Again, this step follows the general lines of the procedures described in sections 7.7-7.9 of ANSI/IEEE Standard 802.1D with modifications relating to P2MP functionality. The node uses MAC FDB 58 to look up the egress interface for unicast frames, or else uses flood database 60 to determine the egress interface(s) for broadcast and multicast frames, as well as unicast frames whose MAC DA does not appear in MAC FDB 58. Unicast frames that have a spoke-type UNI indication and whose MAC DA is marked with a spoke-type UNI designation in FDB 58 are determined to be illegal and are therefore discarded at step 80. Other frames are transmitted through the appropriate egress interface(s) determined by step 76, at a frame forwarding step 78.
Although MAC learning step 74 precedes MAC lookup 76 in
If the frame is marked as spoke-type, the node also looks up the MAC DA, at a spoke look-up step 94. If the MAC DA is a unicast address but is not found in MAC FDB 58 at step 94, the node floods the frame on all of its interfaces that are designated as hub-type or network-type in flood database 60, at a flooding step 95. If the MAC DA is a multicast address, the node forwards the frame to all hub- and network-type interfaces in the multicast group that are listed in flood database 60, or to all of the hub- and network-type interfaces of the node in the case of a broadcast address. Spoke-type frames are not flooded to spoke-type interfaces.
If the MAC DA is a unicast address, and the address is found in MAC FDB 58 at step 94, the node checks the corresponding FDB entry to determine whether the UNI type designation for the MAC DA is hub-type or spoke-type, at a type checking step 96. If the UNI type is hub-type, the node forwards the frame to the egress interface listed in the MAC FDB. Otherwise, if the UNI type is spoke-type, the frame is discarded at step 80, in order to prevent frame transmission between different customer premises computers 22 that does not pass through at least one of gateways 38.
At the initiation of the learning process, the receiving node looks up the MAC SA of each received frame in the MAC FDB, at a source address lookup step 100. If there is no entry in the MAC FDB for this MAC address, the node creates a new entry, at an entry creation step 102. As shown in Table I above, the entry includes the MAC source address of the frame and the ingress interface (interface number or MAC SA in case of MAC-in-MAC encapsulation) through which the frame was received. The UNI type indication of the frame, as assigned at step 72 (
If there is already an entry in the MAC FDB corresponding to the MAC SA of the current frame, the node checks the UNI type indication of the frame, at a frame type checking step 104. If the frame is marked as hub-type, the node updates the entry in the MAC FDB, at an entry update step 106, and resets the aging timer and move counter. At this step, if the ingress interface through which the frame was received and the UNI type indication of the frame are the same as the interface and UNI type designation listed in the entry, the node simply refreshes the entry, i.e., resets the aging timer and sets the move counter to zero.
Alternatively, at step 106, the node may find that the ingress interface through which the hub-type frame was received may be different from the interface that is listed in the MAC FDB entry for the MAC SA of the frame, or the UNI type designation of the entry may be spoke-type. It is assumed that changes of these sorts resulted from moving stations or reconfiguring interfaces in the network. In such cases, the node updates the entry in the MAC FDB corresponding to the MAC SA of the frame to reflect the new interface and/or UNI type. It also resets the aging timer and sets the move counter of the entry to zero.
On the other hand, if the UNI type indication of the frame is spoke-type, the node checks whether the UNI type designation of the entry in MAC FDB 58 corresponding to the MAC SA of the frame is hub-type or spoke-type, at an entry type checking step 108. If the entry in the MAC FDB is also designated as spoke-type, then the node refreshes the entry at step 106, in the manner described above.
If the UNI type designation of the entry in the MAC FDB is found to be hub-type at step 108, however, care must be taken to ensure that the current frame did not reach the present node as the result of passing through a loop in customer premises equipment. For example, it may occur that a frame was initially received in the network through one of interfaces 32 of one of nodes 30 (
Upon receiving a frame with a spoke-type UNI indication and a MAC SA for which the UNI type designation of the corresponding entry in MAC FDB 58 is hub-type, the node compares the number of the ingress interface through which the node received the frame to the number of the interface appearing in the corresponding entry in the MAC FDB, at an interface comparison step 110. If the interface numbers are identical, it can be assumed that the system operator has simply reconfigured the interface from hub-type to spoke-type. In this case, the entry in the MAC FDB is updated to reflect the changed interface UNI type at step 106. The aging timer and move counter are reset, as explained above.
If the interface numbers do not match at step 110, the reason may be either that a station was moved from a hub-type interface to a spoke-type interface, or that the current frame has been looped back through the customer premises network. To avoid retransmission of a looped frame, the node checks the value of the move counter (Table I) in the corresponding entry in the MAC FDB, at a counter checking step 112. This counter indicates the number of successive frames that have been received from the MAC SA of the current frame through an ingress interface that does not match the interface indicated by the corresponding entry in the MAC FDB. Each time a new frame from this MAC SA with a non-matching ingress interface is received, the move counter is incremented until it reaches a predetermined threshold, at an incrementation step 114. Until the threshold is reached, these frames may be either discarded or forwarded (notwithstanding the possible loop), depending on preset configuration parameters. MAC FDB re-learning, however, will not take effect until the move counter has reached its threshold.
After the move counter has been incremented at step 114 due to a frame looped back through the spoke-type interface, the next frame arriving with this same MAC SA will generally come from the original hub-type interface. As a consequence, this frame will result in resetting the move counter at step 106. Therefore, it may be sufficient to use a threshold value of one may be sufficient, since the move counter will never reach the threshold at step 112 (because the process will not pass through the step twice in succession for a given MAC SA). Therefore, the corresponding MAC entry will not be updated. A larger value of the threshold may be set, however, in order to avoid possible problems due to multiple customer premises loops.
On the other hand, if the change in the ingress interface number and type (from hub-type to spoke-type) for the given MAC SA occurred because the system operator moved a station from a hub-type interface to a spoke-type interface, the originating computer will continue transmitting frames from this MAC SA through the spoke-type interface until the move counter reaches the threshold at step 112. At this point, the node updates the interface number in the corresponding entry in the MAC FDB at step 106. The node also changes the UNI type designation to spoke-type, and resets the aging timer and move counter.
It will be appreciated that the embodiments described above are cited by way of example, and that the present invention is not limited to what has been particularly shown and described hereinabove. Rather, the scope of the present invention includes both combinations and subcombinations of the various features described hereinabove, as well as variations and modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not disclosed in the prior art.
Number | Name | Date | Kind |
---|---|---|---|
4535785 | van den Honert | Aug 1985 | A |
4602624 | Naples et al. | Jul 1986 | A |
4628942 | Sweeney et al. | Dec 1986 | A |
4702254 | Zabara | Oct 1987 | A |
4867164 | Zabara | Sep 1989 | A |
5025807 | Zabara | Jun 1991 | A |
5159595 | Flanagan et al. | Oct 1992 | A |
5188104 | Wernicke | Feb 1993 | A |
5199430 | Fang | Apr 1993 | A |
5205285 | Baker, Jr. | Apr 1993 | A |
5215086 | Terry, Jr. | Jun 1993 | A |
5263480 | Wernicke | Nov 1993 | A |
5282468 | Klepinski | Feb 1994 | A |
5299569 | Wernicke | Apr 1994 | A |
5307353 | Yamashita et al. | Apr 1994 | A |
5321393 | Carlton et al. | Jun 1994 | A |
5335657 | Terry, Jr. | Aug 1994 | A |
5461611 | Drake et al. | Oct 1995 | A |
5540730 | Terry, Jr. | Jul 1996 | A |
5571150 | Wernicke | Nov 1996 | A |
5581703 | Baugher et al. | Dec 1996 | A |
5596569 | Madonna et al. | Jan 1997 | A |
5638358 | Hagi et al. | Jun 1997 | A |
5706516 | Chang et al. | Jan 1998 | A |
5707400 | Terry, Jr. | Jan 1998 | A |
5755750 | Petruska | May 1998 | A |
5925137 | Okanoue et al. | Jul 1999 | A |
5983360 | Ugajin et al. | Nov 1999 | A |
6021263 | Kujoory et al. | Feb 2000 | A |
6032194 | Gai et al. | Feb 2000 | A |
6147993 | Kloth et al. | Nov 2000 | A |
6151297 | Congdon et al. | Nov 2000 | A |
6205359 | Boveja | Mar 2001 | B1 |
6205488 | Casey et al. | Mar 2001 | B1 |
6233073 | Bowers et al. | May 2001 | B1 |
6246667 | Ballantine et al. | Jun 2001 | B1 |
6256292 | Ellis et al. | Jul 2001 | B1 |
6262976 | McNamara | Jul 2001 | B1 |
6275493 | Morris et al. | Aug 2001 | B1 |
6304575 | Carroll et al. | Oct 2001 | B1 |
6314110 | Chin et al. | Nov 2001 | B1 |
6330229 | Jain et al. | Dec 2001 | B1 |
6339488 | Beshai et al. | Jan 2002 | B1 |
6339595 | Rekhter et al. | Jan 2002 | B1 |
6359858 | Smith et al. | Mar 2002 | B1 |
6366556 | Ballintine et al. | Apr 2002 | B1 |
6370121 | Hausman | Apr 2002 | B1 |
6400681 | Bertin et al. | Jun 2002 | B1 |
6408001 | Chuah et al. | Jun 2002 | B1 |
6442134 | Mitchell | Aug 2002 | B1 |
6446131 | Khansari et al. | Sep 2002 | B1 |
6456407 | Tammela et al. | Sep 2002 | B1 |
6456587 | Taniguchi | Sep 2002 | B2 |
6466985 | Goyal et al. | Oct 2002 | B1 |
6563793 | Golden et al. | May 2003 | B1 |
6584535 | Ouellet et al. | Jun 2003 | B1 |
6604136 | Chang et al. | Aug 2003 | B1 |
6628624 | Mahajan et al. | Sep 2003 | B1 |
6636478 | Sensel et al. | Oct 2003 | B1 |
6639893 | Chikenji et al. | Oct 2003 | B1 |
6639896 | Goode et al. | Oct 2003 | B1 |
6647008 | Galand et al. | Nov 2003 | B1 |
6678241 | Gai et al. | Jan 2004 | B1 |
6680906 | Nguyen | Jan 2004 | B1 |
6680912 | Kalman et al. | Jan 2004 | B1 |
6711125 | Walrand et al. | Mar 2004 | B1 |
6724880 | Lynch | Apr 2004 | B1 |
6731597 | Batchellor et al. | May 2004 | B1 |
6735198 | Edsall et al. | May 2004 | B1 |
6757286 | Stone | Jun 2004 | B1 |
6760775 | Anerousis et al. | Jul 2004 | B1 |
6765921 | Stacey et al. | Jul 2004 | B1 |
6778496 | Meempat et al. | Aug 2004 | B1 |
6788681 | Hurren et al. | Sep 2004 | B1 |
6795394 | Swinkels et al. | Sep 2004 | B1 |
6801506 | Dey | Oct 2004 | B1 |
6820210 | Daruwalla et al. | Nov 2004 | B1 |
6826158 | Seaman et al. | Nov 2004 | B2 |
6831932 | Boyle et al. | Dec 2004 | B1 |
6879559 | Blackmon et al. | Apr 2005 | B1 |
6879594 | Lee et al. | Apr 2005 | B1 |
6886043 | Mauger et al. | Apr 2005 | B1 |
6922394 | Kajiwara et al. | Jul 2005 | B2 |
6925054 | Atterton et al. | Aug 2005 | B1 |
6934259 | Klincewicz et al. | Aug 2005 | B2 |
6985447 | Gibson et al. | Jan 2006 | B2 |
7035279 | Bruckman et al. | Apr 2006 | B2 |
7468956 | Leelanivas et al. | Dec 2008 | B1 |
20010022786 | King et al. | Sep 2001 | A1 |
20010033575 | Shimamura et al. | Oct 2001 | A1 |
20020015411 | Kataoka et al. | Feb 2002 | A1 |
20020018482 | Gotzer | Feb 2002 | A1 |
20020024974 | Karagiannis et al. | Feb 2002 | A1 |
20020091795 | Yip | Jul 2002 | A1 |
20020093949 | Yasue et al. | Jul 2002 | A1 |
20020118700 | Bruckman | Aug 2002 | A1 |
20020176371 | Behzadi | Nov 2002 | A1 |
20020176450 | Kong et al. | Nov 2002 | A1 |
20020179720 | Liva et al. | Dec 2002 | A1 |
20030002443 | Basso et al. | Jan 2003 | A1 |
20030009594 | McElligott | Jan 2003 | A1 |
20030026298 | Bisson et al. | Feb 2003 | A1 |
20030061338 | Stelliga | Mar 2003 | A1 |
20030074469 | Busi et al. | Apr 2003 | A1 |
20030088698 | Singh et al. | May 2003 | A1 |
20030147344 | Stewart et al. | Aug 2003 | A1 |
20030147345 | Takagi et al. | Aug 2003 | A1 |
20030154315 | Sultan et al. | Aug 2003 | A1 |
20030196135 | Gottlieb | Oct 2003 | A1 |
20030208618 | Mor et al. | Nov 2003 | A1 |
20040022268 | Busi et al. | Feb 2004 | A1 |
20040071089 | Bauer et al. | Apr 2004 | A1 |
20040101303 | Williams | May 2004 | A1 |
20040170184 | Hashimoto | Sep 2004 | A1 |
20040202171 | Hama | Oct 2004 | A1 |
20050025069 | Aysan | Feb 2005 | A1 |
20050135436 | Nigam et al. | Jun 2005 | A1 |
20050163115 | Dontu et al. | Jul 2005 | A1 |
20050226265 | Takatori | Oct 2005 | A1 |
20080031263 | Ervin et al. | Feb 2008 | A1 |
Number | Date | Country | |
---|---|---|---|
20080049764 A1 | Feb 2008 | US |