The transmission and distribution of data and content over networks has evolved over the years. Users expect a network, service, or content provider to be able to deliver data and content in various formats and at various times.
For particular system configurations and associated resources (e.g., bandwidth), dedicating resources to particular users may be expensive and burdensome. For example, in the context of an interactive environment (e.g., an interactive program guide (IPG)), offering users an ability to interact with content may deplete resources (e.g., bandwidth). The reduction or depletion of resources may have a noticeable impact or effect. For example, services might not be available as a result of the reduction in resources.
In the context of contention based protocols, frames of data may be sent by a transmitter when a frame becomes available. A frame may be resent until a receiver successfully receives it. As a network becomes more complicated (e.g., Ethernet systems with multiple sources and destinations) and/or communication volume increases, data frames may collide at a greater rate. An increase in collisions may result in a reduction or degradation in terms of efficiency.
Increasing the total amount of bandwidth available is expensive, as maintenance costs, management costs, and network complexity tend to increase with the increase in bandwidth, and resources may tend to be underutilized (on average) in such a configuration. Reducing the amount of bandwidth consumed by a given application may be undesirable, as an author or an operator of a given network or service may strive to provide content-rich applications.
This summary is not intended to identify critical or essential features of the disclosure provided herein, but instead merely summarizes certain features and variations thereof.
In some illustrative embodiments, a monitor may be used to observe traffic or data flow in one or more networks. In some embodiments, the monitor may comprise one or more sniffers. In some embodiments, the monitor may observe the traffic in real-time or substantially real-time. In some embodiments, the monitor may observe traffic in an upstream direction, a downstream direction, or in both upstream and downstream directions.
In some embodiments, the monitor may be positioned at one or more locations. For example, the monitor may be positioned at an interface between one or more networks (e.g., at an interface between a radio frequency (RF) network and an internet protocol (IP) network). In some embodiments, the monitor may be positioned within one or more networks (e.g., within an RF network). In some embodiments, the monitor may be positioned in, or located within, one or more devices. In some embodiments, the monitor may be positioned to receive results (e.g., traffic results) from one or more devices (e.g., one or more servers, such as one or more application servers). The monitor may analyze the received results and provide commands or directives to the one or more devices based at least in part on the analysis.
In some embodiments, the monitor may be used to manage or shape traffic in one or more networks. For example, in some embodiments the monitor may transmit or issue commands or directives to control the rate of traffic or data flow in the one or more networks.
Other details and features will also be described in the sections that follow.
The present disclosure is pointed out with particularity in the appended claims. Features of the disclosure will become more apparent upon a review of this disclosure in its entirety, including the drawing figures provided herewith.
Some features herein are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements.
Various connections and/or communication links between elements are discussed in the following description. These connections and/or links are general and, unless specified otherwise, may be direct or indirect, wired or wireless, and this specification is not intended to be limiting in this respect.
In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown, by way of illustration, various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made, without departing from the scope of the present disclosure.
There may be one line 101 originating from the central office 103, and it may be split a number of times to distribute the signal to various premises 102 in the vicinity (which may be many miles) of the central office 103. The lines 101 may include components not illustrated, such as splitters, filters, amplifiers, etc. to help convey the signal clearly, but in general each split introduces a bit of signal degradation. Portions of the lines 101 may also be implemented with fiber-optic cable, while other portions may be implemented with coaxial cable, other lines, or wireless communication paths. By running fiber optic cable along some portions, for example, signal degradation in those portions may be significantly minimized, allowing a single central office 103 to reach even farther with its network of lines 101 than before.
The central office 103 may include a modem termination system (TS) 104, such as a cable modem termination system (CMTS), which may be a computing device configured to manage communications between devices on the network of lines 101 and backend devices such as servers 105-107 (to be discussed further below). The termination system (TS) may be as specified in a standard, such as the Data Over Cable Service Interface Specification (DOCSIS) standard, published by Cable Television Laboratories, Inc. (a.k.a. CableLabs), or it may be a similar or modified device instead. The termination system (TS) may be configured to place data on one or more downstream frequencies to be received by modems at the various premises 102, and to receive upstream communications from those modems on one or more upstream frequencies. The central office 103 may also include one or more network interfaces 108, which can permit the central office 103 to communicate with various other external networks 109. These networks 109 may include, for example, networks of Internet devices, telephone networks, cellular telephone networks, fiber optic networks, local wireless networks (e.g., WiMAX), satellite networks, and any other desired network, and the interface 108 may include the corresponding circuitry needed to communicate on the network 109, and to other devices on the network such as a cellular telephone network and its corresponding cell phones.
As noted above, the central office 103 may include a variety of servers 105-107 that may be configured to perform various functions. For example, the central office 103 may include a push notification server 105. The push notification server 105 may generate push notifications to deliver data and/or commands to the various premises 102 in the network (or more specifically, to the devices in the premises 102 that are configured to detect such notifications). The central office 103 may also include a content server 106. The content server 106 may be one or more computing devices that are configured to provide content to users in the homes. This content may be, for example, video on demand movies, television programs, songs, text listings, etc. The content server 106 may include software to validate user identities and entitlements, locate and retrieve requested content, encrypt the content, and initiate delivery (e.g., streaming) of the content to the requesting user and/or device.
The central office 103 may also include one or more application servers 107. An application server 107 may be a computing device configured to offer any desired service, and may run various languages and operating systems (e.g., servlets and JSP pages running on Tomcat/MySQL, OSX, BSD, Ubuntu, Redhat, HTML5, JavaScript, AJAX and COMET). For example, an application server may be responsible for collecting television program listings information and generating a data download for electronic program guide or interactive program guide listings. Another application server may be responsible for monitoring user viewing habits and collecting that information for use in selecting advertisements. Another application server may be responsible for formatting and inserting advertisements in a video stream being transmitted to the premises 102. Another application server may be responsible for receiving user remote control commands, and processing them to provide an intelligent remote control experience.
An exemplary premises equipment may include an interface 120. The interface 120 may, in one aspect, comprise a modem 110, which may include transmitters and receivers used to communicate on the lines 101 and with the central office 103. The modem 110 may be, for example, a coaxial cable modem (for coaxial cable lines 101), a fiber interface node (for fiber optic lines 101), or any other modem device. The modem 110 may be connected to, or be a part of, a gateway interface device 111. The gateway interface device 111 may be a computing device that communicates with the modem 110 to allow one or more other devices in the premises to communicate with the central office 103 and other devices beyond the central office. The gateway 111 may comprise a terminal such as a set-top box (STB), digital video recorder (DVR), computer server, or any other desired computing device. The gateway 111 may also include (not shown) local network interfaces to provide communication signals to devices in the home, such as televisions 112, additional STBs 113, personal computers 114, laptop computers 115, wireless devices 116 (wireless laptops and netbooks, mobile phones, mobile televisions, personal digital assistants (PDA), etc.), and any other desired devices. Examples of the local network interfaces include Multimedia Over Coax Alliance (MoCA) interfaces, Ethernet interfaces, universal serial bus (USB) interfaces, wireless interfaces (e.g., IEEE 802.11), Bluetooth interfaces, and others.
In some embodiments, communications between the various components and devices shown in
Certain aspects of this disclosure may be implemented in connection with one or more wired or wireless networks. Aspects of this disclosure may be applied in connection with data and communication networks and protocols.
In some embodiments, a contention-based protocol may be used. For example, multiple transmitters may transmit on a given channel or frequency. A transmitter may determine whether there is energy present in the channel or frequency, and if so, the transmitter may wait for the energy to dissipate. Once the transmitter determines that there is no energy present in the channel, it may begin transmitting data. During the transmission, the transmitter may continue observing or listening to the channel or frequency to determine if a collision or contention occurs. If a collision or contention occurs, the transmitter may engage in a back-off period (which may be a random value in some embodiments) and retransmit the data upon the expiration of the back-off period.
In some embodiments, ALOHA communications or slotted ALOHA may be used. Slotted ALOHA subdivides the channel or frequency associated with standard ALOHA into multiple time slots. One or more transmitters may be assigned to particular time slots, thereby reducing the pool of transmitters that may potentially vie for the channel at a given point in time. As a result, the probability of collisions or contention using slotted ALOHA may be less than that experienced using standard ALOHA.
In theory, a particular network may operate at a maximum capacity of approximately 18%, for example, operating under an assumption of a distribution (e.g., a Poisson distribution) of messages being generated and sent in the network. Practical considerations may dictate that such a distribution is not actually present. For example, in the context of an interactive environment, there may be a spike or increase in the number of messages transmitted at various points in time. For example, in the context of an interactive program guide (IPG), if an advertisement is presented that invites users to select the advertisement (or a button or other selection mechanism associated therewith) to purchase a product or service (or engage in some other activity, such as providing enrollment information to receive more information on the product or service, or a discount regarding the same), there may be a large or significant increase in the number of messages (e.g., upstream messages) that are transmitted in the network over the period of time (or a portion thereof) that the advertisement is enabled for selection by users.
If not addressed, the periods of time in which a large number of messages are generated and sent in the network may have an impact on the performance of the network. If the number of users selecting the advertisement exceeds a threshold associated with upstream transmission resources (e.g., resources associated with communications in a direction from client devices towards a provider's device (e.g., a server)), then the indication of the particular user's selection of the advertisement to the provider's device may be significantly delayed (e.g., beyond a threshold representative of a tolerable delay). Similarly, resources associated with downstream communications (e.g., resources associated with communications in a direction from a provider's device towards one or more client or user devices) may be overwhelmed or exhausted, e.g., in response to the large number of users selecting the advertisement within a relatively short period of time. If not addressed, the consumption of resources may result in a service being unavailable or operating in a degraded state, which may in turn result in user dissatisfaction.
In some embodiments, a monitor may be used to monitor and manage resource consumption. In some embodiments, the monitor may observe traffic, messages, or data flow in real-time. In some embodiments, the monitor may observe traffic in an upstream and/or a downstream direction. In some embodiments, the monitor may comprise one or more sniffers. In some embodiments, the monitor may communicate with a network coordinator to control (e.g., throttle back) traffic.
As shown in
In some embodiments, the data 306 to be transmitted from a TX 302 to RX 314 may take place at a radio frequency (RF). The data may include a payload, such as an internet protocol (IP) payload. The data may be modulated (e.g., via the modulator shown in
RX 314 may be configured to receive one or more signals at one or more frequencies. If the signal is subject to modulation or encryption, RX 314 may demodulate (e.g., via the demodulator shown in
A monitor may be established at point A 322 to measure and monitor the traffic (e.g., the number of messages) being sent by the TXs 302. If the measured traffic at point A 322 indicates that the traffic exceeds a threshold amount, the monitor (or some other device associated with the monitor) may signal an entity responsible for the application that generated the traffic to throttle or reduce the traffic. For example, if RX 314 is associated with (e.g., included in) a server 344 that is responsible for providing an application, and the messages transmitted by TXs 302 are generated in response to that application, the monitor may signal the server 344 to throttle or reduce the traffic. Exemplary techniques for throttling or reducing traffic are described below.
If the application in question relates to an advertisement, and the data 306 comprises messages that indicate user selections of the advertisement, if the monitor at point A 322 indicates the number of messages in response to the advertisement exceeds a threshold amount, the monitor may command or direct a device, such as a server or any other device upstream from the TXs 302 responsible for the content of the advertisement, to reduce or throttle the activity associated with the advertisement. In some embodiments, the threshold amount may be a function of an application in question, network capacity (such as total network capacity), etc. The command or directive may specify the action to be taken by the device to reduce or throttle the activity associated with the advertisement. Alternatively, or additionally, the command or directive may leave it up to the device responsible for the content of the advertisement to determine one or more actions to take (if any) in order to reduce or throttle the activity associated with the advertisement.
The device responsible for the tracking and/or content of the advertisement (e.g., a server) may take any number of actions in response to the command/directive received from the monitor. For example, the device may disable the application, such that users are no longer presented with an option to select the advertisement. Alternatively, or additionally, the device may stagger the application, such as by limiting the number of client devices that receive the application, e.g., (only) a subset of client devices within a service group may receive the application. The staggering may be based on time, e.g., the application may be active for only a subset of time at a first client device relative to the length of the advertisement, and the time that the application is active at the first client device may be different from the time that the application is active at a second client device. In some embodiments, the device (e.g., the server) may impose a restriction on the number of users that are able to respond to, or interact with, the application, which may result in a reduction of traffic, e.g., upstream traffic.
The input or stimulus that is responsible for generating the messages (e.g., the interactive application associated with the advertisement) may be reduced or scaled back, which may result in a corresponding reduction or throttling of the messages from TXs 302 to RX 314. More generally, a reduction or throttling of the stimulus provided to client devices in the downstream direction may result in a reduction or throttling of traffic originating from the client devices in the upstream direction. In some embodiments, traffic may be monitored in an upstream direction, and responsive to determining that the monitored upstream traffic exceeds one or more thresholds, a controlling or throttling of traffic in a downstream direction may occur. In some embodiments, downstream data traffic may comprise portions that may require corresponding data traffic in the upstream direction.
In addition to, or as an alternative to, monitoring at point A 322, the monitor may be located at point B 328. For example, the monitor at point B 328 may monitor within a network, such as an RF network. The monitor may comprise a radio and may listen for on-going traffic (e.g., messaging). Locating the monitor at point B 328 may be used to determine network congestion based upon actual collisions. A more granular view of the network traffic may be obtained via a monitor located at point B 328 relative to the view obtained via a monitor located at point A 322. Furthermore, locating a monitor at point B 328 may enable a throttling of traffic at the instant collisions start to occur, or at some other point in time that may be correlated to, or associated with, a threshold value.
In some embodiments, the monitor may be located at a point different from (or in addition to) one or both of points A 322 and B 328 shown in
Also shown in
Monitor 504 may comprise a processor 510 (e.g., processor 201 of
Monitor 504 may comprise a traffic measurer 522. Traffic measurer 522 may receive as input traffic (e.g., data or messages) that appear on a communication channel or medium (e.g., lines 101 of
Monitor 504 may comprise a comparison monitor 528. Comparison monitor 528 may compare the traffic measured by traffic measurer 522, or other characteristics, against one or more thresholds. The one or more thresholds may be stored in memory 516 and may be retrieved by, or accessed at, comparison monitor 528.
Comparison monitor 528, which may comprise hardware, firmware, and/or software, may provide an indication of the comparison of the measured traffic to the one or more thresholds to a hardware, firmware, and/or software device, such as a director 534. Director 534 may issue one or more commands or directives in response to the indication from comparison monitor 528. For example, if the indication provided by comparison monitor 528 indicates that the measured traffic exceeds one or more thresholds, director 534 may issue a command or directive that causes a throttling or reduction of the traffic in accordance with the techniques described herein.
In some embodiments, a monitor (e.g., monitor 504) may have established rules related to classes of services. Certain types of traffic may be prioritized over others. For example, messaging related to specific services such as Video On Demand (VOD) may have a priority level assigned which is higher than that of an advertising-based service.
In some embodiments, certain forms of messaging interaction may be known as “short” while others may be known as “long” form interaction. “Short” messaging may include a limited set of interactions associated with an exchange, and long may be related to a more interactive session. An example of these might be the contrast between a Caller ID notification and an Interactive Gaming Session. The Caller ID notification might be classified as “short” and the Interactive Gaming Session might be classified as “long”. In some embodiments, a classification may be used to determine whether to request, e.g., an application server to throttle messaging ahead of the actual load on the network being realized.
In some embodiments, a taxonomy may be created for the classification of data networking exchanges used in a network (e.g., a cable network). In some embodiments, one or more upstream/downstream message exchanges may be classified according to type. In some embodiments, rules associated with a type and/or provisioned prioritizations may be applied. The applied rules may result in a throttling of lower priority or more highly interactive sessions.
The architectures and hardware/firmware/software environments described above are illustrative. One or more of the entities shown might not be included in some embodiments. For example, in some embodiments, additional entities not shown in
As shown in
In step 608, traffic may be measured (e.g., by traffic measurer 522 of
In step 614, the measured traffic may be monitored. For example, the measured traffic of step 608 may be compared (e.g., by comparison monitor 528 of
In step 620, a determination may be made (e.g., by comparison monitor 528 of
In step 626, one or more actions may be taken to control, for example, throttle, the traffic. In some embodiments, one or more commands or directives may be issued (e.g., by director 534 of
In some embodiments, the throttling action may subside or expire. For example, the throttling action may expire after a predetermined amount of time has lapsed, in response to an event (e.g., upstream traffic falling below a threshold associated with step 620), etc. A user selection or interaction with an application during the time when traffic is throttled may be processed after the throttling action has expired. For example, a user device or a client device may store or buffer a user selection until a point in time is reached where the condition(s) that caused the throttling to take place have subsided.
The method described above in connection with
Aspects of this disclosure may readily be applied to, and adapted to be operative on, one or more communication systems, including computer networks, television networks, satellite networks, telephone and cellular networks, and the like.
Although not required, functions described herein may be embodied as a method, a data processing system, and/or as a non-transitory computer-readable medium storing executable instructions. Aspects of the disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, an entirely firmware embodiment, or an embodiment combining software, firmware and hardware. The functionality may be resident in a single computing device, or may be distributed across multiple computing devices/platforms, the multiple computing devices/platforms optionally being connected to one another via one or more networks. Moreover, the structural components described herein may be distributed amongst one or more devices, optionally within a common housing or casing.
Although communications and contention based communication protocols have been discussed in the example embodiments, the disclosure relates to and encompasses other communication techniques and protocols. In some embodiments, one or more network, service, or content providers (or devices or equipment associated therewith) may be configured to provide data (e.g., content) using one or more transmission techniques, and may manage traffic generated in response to the data. Moreover, while aspects of the disclosure have been described in terms of applications and advertisements, aspects of the disclosure also include other forms and types of data (e.g., text, audio, computer programs, movies, programs/shows, caller identifications, etc.) delivered or distributed via one or more schemes or techniques (e.g., video on demand (VOD)).
In some embodiments, an active video network (AVN) may be used in connection with a browser, where a client device may be provided with a content-rich (e.g., graphic rich) navigation interface. Intelligence may reside in one or more network devices, and user selections may be conveyed from client devices to the one or more network devices to operate on the user selections. More generally, aspects of disclosure may be applied to any context, e.g., environments incorporating upstream communications.
The methodological acts and processes may be tied to particular machines or apparatuses. For example, as described herein, an application may distributed to a client or user device via one or more computing devices (e.g., servers) and that application may be rendered at the client device (e.g., at a display device associated with the client device). The application may support user interaction, and traffic generated in response to that user interaction may be measured and monitored in connection with a resource utilization. More generally, one or more computers may include one or more processors and memory storing instructions that, when executed, cause the one or more computers to perform the methodological acts and processes described herein. Furthermore, the methodological acts and processes described herein may perform a variety of functions including transforming an article (e.g., upstream traffic) into a different state or thing (e.g., throttled upstream traffic).
Aspects of the disclosure have been described in terms of illustrative embodiments thereof. While illustrative systems and methods as described herein embodying various aspects of the present disclosure are shown, it will be understood by those skilled in the art, that the disclosure is not limited to these embodiments. Modifications may be made by those skilled in the art, particularly in light of the foregoing teachings. For example, each of the features of the aforementioned illustrative examples may be utilized alone or in combination or subcombination with elements of the other examples. For example, any of the above described systems and methods or parts thereof may be combined with the other methods and systems or parts thereof described above in any order. It will also be appreciated and understood that modifications may be made without departing from the true spirit and scope of the present disclosure. The description is thus to be regarded as illustrative instead of restrictive on the present disclosure.
Number | Name | Date | Kind |
---|---|---|---|
5361394 | Shigihara | Nov 1994 | A |
5687167 | Bertin et al. | Nov 1997 | A |
5761191 | VanDervort et al. | Jun 1998 | A |
5872588 | Aras et al. | Feb 1999 | A |
5926476 | Ghaibeh | Jul 1999 | A |
6028860 | Laubach et al. | Feb 2000 | A |
6148081 | Szymanski et al. | Nov 2000 | A |
6331987 | Beser | Dec 2001 | B1 |
6427238 | Goodman et al. | Jul 2002 | B1 |
6502135 | Munger et al. | Dec 2002 | B1 |
6594246 | Jorgensen | Jul 2003 | B1 |
6915530 | Kauffman et al. | Jul 2005 | B1 |
6941574 | Broadwin et al. | Sep 2005 | B1 |
6970641 | Pierre et al. | Nov 2005 | B1 |
7017175 | Alao et al. | Mar 2006 | B2 |
7027461 | Bontempi | Apr 2006 | B1 |
7055169 | Delpuch et al. | May 2006 | B2 |
7065780 | Barbier et al. | Jun 2006 | B2 |
7231455 | Marejka | Jun 2007 | B2 |
7305697 | Alao et al. | Dec 2007 | B2 |
7362704 | Sisto et al. | Apr 2008 | B2 |
7426185 | Musacchio et al. | Sep 2008 | B1 |
7433953 | Kappler et al. | Oct 2008 | B1 |
7440999 | DeCenzo | Oct 2008 | B2 |
7468945 | Enomoto et al. | Dec 2008 | B2 |
7650379 | Hart et al. | Jan 2010 | B2 |
7876696 | Kotelba | Jan 2011 | B2 |
7917648 | Wu et al. | Mar 2011 | B2 |
8201205 | Boucher | Jun 2012 | B2 |
8208001 | Tucker | Jun 2012 | B2 |
8213301 | Park et al. | Jul 2012 | B2 |
8396055 | Patel et al. | Mar 2013 | B2 |
8682363 | Cardi et al. | Mar 2014 | B1 |
8843652 | Balasubramanian | Sep 2014 | B2 |
8850480 | Chane | Sep 2014 | B2 |
8914839 | Howe | Dec 2014 | B2 |
9106557 | Wolcott et al. | Aug 2015 | B2 |
9461955 | Sherrets | Oct 2016 | B1 |
9635421 | Tidwell | Apr 2017 | B2 |
20020006111 | Akita et al. | Jan 2002 | A1 |
20020126673 | Dagli et al. | Sep 2002 | A1 |
20020142780 | Airy et al. | Oct 2002 | A1 |
20020188732 | Buckman et al. | Dec 2002 | A1 |
20030018745 | McGowan | Jan 2003 | A1 |
20030210665 | Salmenkaita et al. | Nov 2003 | A1 |
20040177087 | Wu et al. | Sep 2004 | A1 |
20040257995 | Sandy et al. | Dec 2004 | A1 |
20050047783 | Sisto et al. | Mar 2005 | A1 |
20050076339 | Merril et al. | Apr 2005 | A1 |
20050094558 | Lu | May 2005 | A1 |
20050138674 | Howard | Jun 2005 | A1 |
20050195968 | Park et al. | Sep 2005 | A1 |
20050281235 | Beach et al. | Dec 2005 | A1 |
20060053146 | Allhusen et al. | Mar 2006 | A1 |
20060099956 | Harada et al. | May 2006 | A1 |
20060120282 | Carlson et al. | Jun 2006 | A1 |
20060129458 | Maggio | Jun 2006 | A1 |
20060142040 | Jones | Jun 2006 | A1 |
20060184664 | Jung | Aug 2006 | A1 |
20060212917 | Boucher et al. | Sep 2006 | A1 |
20060233108 | Krishnan | Oct 2006 | A1 |
20070071026 | Rogers | Mar 2007 | A1 |
20070091176 | Shih et al. | Apr 2007 | A1 |
20070195789 | Yao | Aug 2007 | A1 |
20070214248 | Ikeda et al. | Sep 2007 | A1 |
20080075003 | Lee et al. | Mar 2008 | A1 |
20080089240 | Toomey et al. | Apr 2008 | A1 |
20080144586 | Kneckt et al. | Jun 2008 | A1 |
20080191816 | Balachandran et al. | Aug 2008 | A1 |
20080310452 | Vedantham et al. | Dec 2008 | A1 |
20090067328 | Morris et al. | Mar 2009 | A1 |
20090086634 | Kwan et al. | Apr 2009 | A1 |
20090089825 | Coldwell | Apr 2009 | A1 |
20090213871 | Carlson et al. | Aug 2009 | A1 |
20090222851 | Talmi | Sep 2009 | A1 |
20090287405 | Liu et al. | Nov 2009 | A1 |
20100014423 | Furuskar et al. | Jan 2010 | A1 |
20100085923 | Nyberg et al. | Apr 2010 | A1 |
20110016213 | Nakao | Jan 2011 | A1 |
20110122887 | Ma et al. | May 2011 | A1 |
20110134746 | Liu et al. | Jun 2011 | A1 |
20110161261 | Wu et al. | Jun 2011 | A1 |
20110194538 | Zheng et al. | Aug 2011 | A1 |
20110305451 | Nishitani et al. | Dec 2011 | A1 |
20110306351 | Pettersson et al. | Dec 2011 | A1 |
20120039169 | Susitaival et al. | Feb 2012 | A1 |
20120057478 | Brannstrom et al. | Mar 2012 | A1 |
20120063377 | Osterling et al. | Mar 2012 | A1 |
20120064908 | Fox et al. | Mar 2012 | A1 |
20120099430 | Vos et al. | Apr 2012 | A1 |
20120116863 | Boss et al. | May 2012 | A1 |
20120203822 | Floyd et al. | Aug 2012 | A1 |
20120330710 | Hauser et al. | Dec 2012 | A1 |
20130016675 | Cha et al. | Jan 2013 | A1 |
20130051359 | Skarby | Feb 2013 | A1 |
20130121147 | Tapia et al. | May 2013 | A1 |
20130166773 | Armstrong et al. | Jun 2013 | A1 |
20130201996 | Masputra et al. | Aug 2013 | A1 |
20140146666 | Kwan et al. | May 2014 | A1 |
20140173025 | Killick | Jun 2014 | A1 |
20140180575 | Lin | Jun 2014 | A1 |
20140269962 | Gao et al. | Sep 2014 | A1 |
Number | Date | Country | |
---|---|---|---|
20130080620 A1 | Mar 2013 | US |