Embodiments of the present application relate to forwarding data packets in a computer network, and more particularly to techniques for selecting a path such as an Equal Cost MultiPath (ECMP) path and/or a trunk port for forwarding data packets.
Network devices commonly have to select a path from multiple available choices for forwarding a packet. For example, ECMP is a routing strategy where next-hop packet forwarding to a destination can occur over multiple equal cost routing paths. The effect of multipath routing on a network device (e.g., a router) configured to forward packets is that the network device potentially has several next-hops for any given destination and must use some method to choose which path to the next-hop should be used for a given data packet. The use of ECMP helps to reduce delay and congestion in networks by taking advantage of multiple paths through a network by splitting traffic flows across those paths. Accordingly, in order to support ECMP path selection, a network device such as a router has to be able to select a particular ECMP path from multiple available paths to forward a packet.
Trunking is another technique that is commonly used in networks. A trunk represents a logical collection of multiple output ports generally associated with the same route or connected to the same MAC address. In a network environment, when a selected output path for a packet is a trunk, a network device has to be able to select a port from multiple ports associated with the trunk for forwarding the packet. In certain network environments, a selected ECMP path may itself correspond to a trunk. In such an environment, in addition to selecting a particular ECMP path, the network device also has to select a particular output port from the multiple output ports associated with the trunk for forwarding the data packet.
Conventionally, selection of paths (e.g., ECMP paths) and/or trunk ports for data forwarding is done by simply hashing on various fields of a packet header, such as based upon the IP source and destination address fields, and using the hash for selecting the path and/or trunk port. The diversification in the selection offered by such conventional techniques however is quite poor and does not offer proper distribution of traffic to the available paths and/or trunk ports. For example in ECMP forwarding, poor diversification results in the same ECMP path and/or trunk being selected for forwarding the traffic flow packets at multiple stages of the network. As a result, a router forwards traffic with the same source and destination addresses using the same port of a trunk or the same path, not fully utilizing the bandwidth available for the traffic via other ports or paths available to the router. Accordingly, using conventional techniques in which all routers in the network derive their hashing decision purely based on information extracted from the packet header, correlation occurs among routers that any given packet flow traverses, and such correlation reduces diversification. Further, existing ECMP solutions only work in some network topologies and provide limited diversification.
Embodiments of the present invention provide techniques that offer enhanced diversity in the selection of paths (e.g., ECMP paths) and/or ports from ports associated with trunks for forwarding network data traffic. In one embodiment, a network device uses a rotate function to generate a rotated index (path index) that is used to select a path (e.g., an ECMP) path from multiple paths (e.g., multiple ECMP paths) for forwarding a packet. A network device may also generate a rotated index (trunk index) that is used to select an output port from multiple output ports associated with a trunk for forwarding the packet.
In one embodiment, different network devices may be configured to apply different amounts of rotation to generate the rotated indices. As a result, for the same packet, the rotated path and trunk indices generated at one network device may be different from the rotated path and trunk indices generated at a second network device. As a result, different paths and/or port trunks may be selected for forwarding the same packet (or same traffic flows) at different network devices in a multistage network.
According to an embodiment of the present invention, techniques are provided for selecting a path for forwarding a packet. A first value may be generated at a first network device based upon one or more sections of the packet. The first value may be rotated at the first network device by a first amount to generate a first rotated index, wherein the first amount is preconfigured for the first network device. A path from a plurality of paths may be selected at the first network device for forwarding the packet from the first network device based upon the first rotated index.
In one embodiment, the one or more sections of the packet may be hashed to generate a hash value, and the first value may be generated using the hash value.
In one embodiment, the packet may be communicated from the first network device to a second network device using the selected path. At the second network device, a second value may be generated based upon the one or more sections of the packet. The second value may be rotated at the second network device by a second amount to generate a second rotated index, wherein the second amount is preconfigured for the second network device and is different from the first amount. A path from a plurality of paths may be selected at the second network device for forwarding the packet from the second network device based upon the second rotated index.
According to an embodiment of the present invention, techniques are provided for selecting a port for forwarding a packet. A first value may be generated at a first network device based upon one or more sections of the packet. The first value may be rotated at the first network device by a first amount to generate a first rotated index, wherein the first amount is preconfigured for the first network device. A port from a plurality of ports associated with a trunk may be selected at the first network device for forwarding the packet from the first network device based upon the first rotated index. In one embodiment, the one or more sections of the packet may be hashed to generate a hash value, and the first value may be generated using the hash value.
In one embodiment, the packet may be communicated from the first network device to a second network device using the selected port. At the second network device, a second value may be generated based upon the one or more sections of the packet. The second value may be rotated at the second network device by a second amount to generate a second rotated index, wherein the second amount is preconfigured for the second network device and is different from the first amount. A port from a plurality of ports associated with a trunk may be selected at the second network device for forwarding the packet from the second network device based upon the second rotated index.
The foregoing, together with other features and embodiments will become more apparent when referring to the following specification, claims, and accompanying drawings.
In the following description, for the purposes of explanation, specific details are set forth in order to provide a thorough understanding of embodiments of the invention. However, it will be apparent that the invention may be practiced without these specific details.
Embodiments of the present invention provide techniques that enhance diversification in the selection of paths (e.g., ECMP paths) and/or selection of trunk ports for forwarding traffic flows comprising packets.
Network device 100 receives and transmits data flows comprising packets using ports 102. A port within ports 102 may be classified as an input port or an output port depending upon whether a packet is received or transmitted using the port. A port over which a packet is received by network device 100 is referred to as an input port. A port used for communicating or transmitting a packet from network device 100 is referred to as an output port. A particular port may function both as an input port and an output port. Ports 102 may be capable of receiving and/or transmitting different types of data traffic at different speeds including 1 Gigabit/sec, 10 Gigabits/sec, or more. In some embodiments, multiple ports of network device 100 may be logically grouped into one or more trunks. A trunk represents a logical collection of multiple output ports of a network device generally associated with the same route or connected to the same MAC address.
In one embodiment, network device 100 may receive one or more packets via one or more input ports. For a packet received over an input port, network device 100 may be configured to determine an output port for the packet. The packet may then be forwarded to the determined output port and transmitted from network device 100 using the output port. As part of the processing to determine an output port for a packet, network device 100 may be configured to select a particular path (e.g., an ECMP path) from multiple paths (e.g., multiple ECMP paths) that may be available for forwarding the packet and select an output port corresponding to the particular selected path. If the selected path is a trunk, as part of forwarding a packet from an input port to an output port, network device 100 may be configured to select a particular output port from the multiple output ports associated with the selected trunk for forwarding the packet. The packet may then be communicated from network device 100 using the selected trunk output port.
In the embodiment depicted in
Packet processor 106 is configured to process each packet received by network device 100 and determine how the packet is to be forwarded. This processing may involve performing lookups in CAM 110, PRAM 112, and CAM2PRAM 114. In one embodiment, as part of the processing, packet processor 106 is configured to determine an output port to which the packet is to be forwarded. As part of determining an output port to which the packet is to be forwarded, packet processor 106 is configured to select a particular path from multiple paths for forwarding the packet and then select an output port corresponding to a particular selected path. For example, packet processor 106 may be configured to select an ECMP path from multiple ECMP paths for forwarding the packet and forward the packet to a port corresponding to the selected ECMP path. If the selected path is a trunk, as part of determining an output port to which the packet is to be forwarded, packet processor 106 is configured to select a particular output port from the multiple output ports associated with the selected trunk for forwarding the packet. The packet may then be communicated from network device 100 using the selected output port. In some scenarios, the selected path may itself be a trunk. In such a scenario, upon selecting a particular path, packet processor 106 is configured to select a particular output port from the multiple output ports associated with the selected path for forwarding the packet.
According to an embodiment of the present invention, packet processor 106 performs the selection of a path and/or selection of a port from ports grouped as a trunk using techniques that provide enhanced diversification in the selection of the path and/or trunk port. Embodiments of the present invention provide enhanced diversification by more equally distributing traffic flows between available paths (e.g., ECMP paths) and/or trunk ports.
In one embodiment, packet processor 106 is configured to extract one or more sections of the packet to be forwarded. Packet processor 106 is then configured to hash the extracted sections of the packet to generate a hash value. A trunk index is then determined based upon the hash value. In one embodiment, the trunk index is the hash value itself. The trunk index is then rotated or shifted (e.g., using a barrel shifter) by a certain amount to produce a rotated trunk index that is then used for selecting an output port from multiple ports associated with a trunk for forwarding a packet.
In one embodiment, a path index is derived from the hash value. In some embodiments, the path index is derived from the trunk index (e.g., the path index is set to the trunk index or a flipped trunk index). Network device 100 is then configured to rotate or shift (e.g., using a barrel shifter) the path index by a set amount to generate a rotated path index. The rotated path index is then used for selecting a path from multiple possible paths for forwarding the packet. The packet may then be forwarded by network device 100 using an output port corresponding to the selected path. For example, the rotated path index may be used to select an ECMP path from multiple ECMP paths. A rotated path index used for selecting an ECMP path may also be referred to as a rotated ECMP index. If the selected path is itself a trunk, then the trunk index may be used to select a particular port from the possibly multiple ports associated with the trunk for forwarding the packet.
The amount of rotation that is applied by a network device to generate the rotated trunk index and/or the rotated path index may be user-configurable and may be preconfigured for the network device. Different network devices in a network environment may be configured to apply different amounts of rotations. As a result, the amount of rotation applied by one network device may be different from the amount of rotation applied by another network device. Consequently, for the same packet, the rotated index generated by one network device may be different from the rotated index generated by another network device. In one embodiment, the amount of rotation that a particular network device is configured to perform may be predefined and controlled by a control variable(s) configured for that network device. In a network device, the amount of rotation used for generating a rotated trunk index may be the same as or different from the amount of rotation used for generating a rotated path index. Since different network devices may perform different amounts of rotation, a rotated trunk index generated by one network device for a packet may be different from a rotated trunk index generated for the same packet by another network device. Likewise, a rotated path index generated by one network device for a packet may be different from a rotated path index generated by another network device for the same packet. This enables diversification in the selection of paths and/or trunk ports for forwarding network traffic in a network environment.
As depicted in
Since processing performed by packet processor 106 needs to be performed at a high packet rate in a deterministic manner, packet processor 106 is generally a dedicated hardware device configured to perform the processing. In one embodiment, packet processor 106 may be a programmable logic device such as a field programmable gate array (FPGA). Packet processor 106 may also be an ASIC.
In one embodiment, network device 100 may comprise multiple linecards, with each linecard comprising the components depicted in
As depicted in
A hash value is then generated by hashing the section(s) extracted in 202 (step 204). Different techniques may be used for the hashing. In one embodiment, a random number may also be used along with the extracted portions to generate a hash value in 204.
A trunk index is then determined from the hash value generated in 204 (step 206). Different techniques may be used to determine the trunk index from the hash value. In one embodiment, the trunk index is set to the hash value. In an alternative embodiment, the hash value is flipped to generate the trunk index.
The trunk index generated in 206 is then rotated by a preconfigured amount to generate a rotated trunk index (step 208). The amount of rotation applied by a network device may be preconfigured for the network device. In one embodiment, the amount of rotation may be based upon a control value (trunk index control value) preconfigured for the network device. The rotated trunk index generated in 208 may then be used to select an output port from ports associated with a trunk selected for forwarding the packet (step 210). The packet may then be forwarded to the selected output port and then transmitted from the network device using the output port.
As depicted in
The following pseudo code depicts a technique that may be used for generating a rotated trunk index according to an embodiment of the present invention:
TRUNK_INDEX [7:0]=Hash Value;
case (TRUNK_INDEX_CONTROL_VALUE[2:0]){
0: ROTATED_TRUNK_INDEX[7:0]=TRUNK_INDEX[7:0];
1: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[0], TRUNK_INDEX[7:1]};
2: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[1:0], TRUNK_INDEX[7:2]};
3: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[2:0], TRUNK_INDEX[7:3]};
4: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[3:0], TRUNK_INDEX[7:4]};
5: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[4:0], TRUNK_INDEX[7:5]};
6: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[5:0], TRUNK_INDEX[7:6]};
7: ROTATED_TRUNK_INDEX[7:0]={TRUNK_INDEX[6:0], TRUNK_INDEX[7]};
}
According to the pseudo code depicted above, the TRUNK INDEX is set to the Hash Value. The amount by which TRUNK_INDEX is rotated is controlled by TRUNK_INDEX_CONTROL_VALUE which may be preconfigured for a network device. If the control value is 0 then no rotation is performed, if the control value is 1 then the TRUNK_INDEX is rotated by 1-bit, if the control value is 2 then the TRUNK_INDEX is rotated by 2-bits, if the control value is 3 then the TRUNK_INDEX is rotated by 3-bits, if the control value is 4 then the TRUNK_INDEX is rotated by 4-bits, if the control value is 5 then the TRUNK_INDEX is rotated by 5-bits, if the control value is 6 then the TRUNK_INDEX is rotated by 6-bits, and if the control value is 7 then the TRUNK_INDEX is rotated by 7-bits. The resultant ROTATED_TRUNK_INDEX may then be used to select an output port from multiple ports associated with a trunk selected for forwarding the packet.
As depicted in
A hash value is then generated by hashing the section(s) extracted in 402 (step 404). Various different hashing techniques may be used. In one embodiment, a random number may also be used along with the extracted sections to generate a hash value in 404.
A path index is then determined from the hash value generated in 404 (step 406). Different techniques may be used to determine the path index from the hash value. In one embodiment, the path index is set to the hash value. In an alternative embodiment, the hash value is flipped to generate the path index. The generation of the path index from the hash value may also depend upon how the trunk index was generated using the hash value. In one embodiment, the trunk index is set to the hash value while the path index is set to the flipped version of the hash value.
The path index generated in 406 is then rotated by a preconfigured amount to generate a rotated path index (step 408). The amount of rotation applied by a network device may be preconfigured for the network device. In one embodiment, the amount of rotation may be based upon a control value (path index control value) preconfigured for the network device. The rotated path index generated in 408 may then be used to select a path (e.g., an ECMP path) from multiple available paths (e.g., multiple ECMP paths) for forwarding the packet (step 410). An output port corresponding to the selected path may also be determined in 410. The packet may then be forwarded to the selected output port corresponding to the selected path and then transmitted from the network device using the output port.
As depicted in
In one embodiment, the same rotate module may be used for to generate a rotated trunk index and a rotated path index. The amount of rotation applied by a network device to generate a rotated path index may be the same as or different from the amount of rotation applied by the network device to generate a rotated trunk index. The same or different control values (e.g., the path index control value and the trunk index control value) may be used to control the rotation for generating a rotated trunk index and/or a rotated path index.
The following pseudo code depicts a technique that may be used for generating a rotated path index (assumed to be an ECMP index for selecting an ECMP path) according to an embodiment of the present invention:
ECMP_INDEX [7:0]=Hash Value;
case (ECMP_INDEX_CONTROL_VALUE[2:0]){
0: ROTATED_ECMP_INDEX[7:0]=ECMP_INDEX[7:0];
1: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[0], ECMP_INDEX[7:1]};
2: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[1:0], ECMP_INDEX[7:2]};
3: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[2:0], ECMP_INDEX[7:3]};
4: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[3:0], ECMP_INDEX[7:4]};
5: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[4:0], ECMP_INDEX[7:5]};
6: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[5:0], ECMP_INDEX[7:6]};
7: ROTATED_ECMP_INDEX[7:0]={ECMP_INDEX[6:0], ECMP_INDEX[7]};
}
According to the pseudo code depicted above, ECMP_INDEX is set to the hash value. The amount by which ECMP_INDEX is rotated is controlled by ECMP_INDEX_CONTROL_VALUE which may be preconfigured for a network device. If the control value is 0 then no rotation is performed, if the control value is 1 then the ECMP_INDEX is rotated by 1-bit, if the control value is 2 then the ECMP_INDEX is rotated by 2-bits, if the control value is 3 then the ECMP_INDEX is rotated by 3-bits, if the control value is 4 then the ECMP_INDEX is rotated by 4-bits, if the control value is 5 then the ECMP_INDEX is rotated by 5-bits, if the control value is 6 then the ECMP_INDEX is rotated by 6-bits, and if the control value is 7 then the ECMP_INDEX is rotated by 7-bits. The resultant ROTATED_ECMP_INDEX may then be used to select a path from multiple paths available for forwarding the packet.
It should be apparent that both the path index and the trunk index do not have to be used each time. A rotated trunk index may need to be used only when the selected path for forwarding a packet is a trunk. Similarly, a path index may need to be used only when there are multiple paths available for forwarding the packet and a single path has to be selected. There may be no need to use a path index in network topologies where there is only one or no path from a network device for forwarding a packet. Embodiments of the present invention thus provide the flexibility of using a path index and/or a trunk index as and when appropriate.
Once the rotated path index and the rotated trunk index have been determined, the rotated indices are then be used to select a path and/or a trunk port for forwarding a packet. Various different techniques may be used to select the path and/or trunk port using a rotated path index and a rotated trunk index.
As depicted in
An ECMP_mask value is then determined from the CAM2PRAM table entry determined from the CAM lookup performed in 602 (step 604). In one embodiment, the ECMP_mask is a 4-bit value from zero to the number of ECMP paths minus one. In order to get the number of ECMP paths and to avoid having to deal with a modulo operation (described below) using a zero base, an ECMP_Base value is determined from the ECMP_mask by adding one to the ECMP_mask (step 606). In one embodiment, the ECMP_Base value is determined as follows (by adding 1 to the 4-bit number):
ECMP_Base[4:0]=ECMP_mask[3:0]+4′h1//0-15→1-16 ports
The ECMP_Base identifies the total number of ECMP paths that are available for forwarding the packet from the network device.
An ECMP_Adjust value is then determined based upon the ECMP_Base determined in 606 and the rotated ECMP index generated as previously described (for example, the rotated path index generated in step 408 of
ECMP_Adjust[4:0]=Rotated ECMP Index[15:0] % ECMP_Base[4:0]
The ECMP_Adjust determined in 608 thus represents a number between 1 and the total number of available ECMP paths and used for path selection. The ECMP_Adjust is used an index to an entry in the PRAM (e.g., in PRAM 112 depicted in
The ECMP path to be used is then determined based upon the contents of the PRAM entry (step 612). In one embodiment, a forwarding identifier (FID) is determined from the PRAM entry. The particular ECMP path to be used for forwarding the packet is then determined from the FID. In one embodiment, an output port corresponding to the selected ECMP path is also determined in 612.
As depicted in
A trunk group identifier (TGID) and a PRAM forwarding identifier (PRAM FID) are then determined from the PRAM entry to which an index is obtained in 702 (step 704). In one implementation, the PRAM may be organized as a 32M×4 or 512K×64×4 memory. Each PRAM entry may include, for example, 247 bits of routing and status information, along with a 9-bit TGID (TRUNK_GROUP[8:0]), which indexes into a trunk group table. The TGID references the trunk to be used for forwarding the packet. PRAM entries sharing a trunk are programmed with the trunk's TGID.
In one embodiment, the trunk group table stores information for one or more trunks.
A trunk group table may store one or more entries corresponding to trunks and the entries are addressed by TGIDs stored in the PRAM entries. The information stored for each trunk may include information identifying the current number of active ports associated with the trunk. In one implementation, each trunk group table entry stores information for a trunk and comprises a value representing the number of currently active trunk ports for the trunk. In such an implementation, when the number of active member ports in a trunk changes, the information in the corresponding trunk group table entry is updated to reflect the change. In this manner, the information in the PRAM entries for the trunk does not have to be changed. PRAM entries sharing a trunk may be programmed with the trunk's TGID, which provides an index to an entry in the trunk group table storing information for that trunk. Updates to the trunk information are made in the trunk group table, rather than in the PRAM entries.
The TGID obtained in 704 is used to access an entry in the trunk group table (step 706). The number of active ports of the trunk is then determined from the trunk group table entry accessed in 706 (step 708). In one embodiment, a 4-bit number (TRUNK_PORTS[4:0]) represents a number from zero to the number of currently active member ports of the trunk minus one. Accordingly, TRUNK_PORTS[4:0] ranges from 0 to one less than the number of currently active member ports. Thus, an adjustment may be made in 708 by adding one to the TRUNK_PORTS to obtain the number of currently active ports as follows:
TRUNK_PORTS_ADJ[5:0]=TRUNK_PORTS[4:0]+5′h1
TRUNK_PORTS_ADJ represents the number of active trunk ports.
An output port for forwarding the packet is then determined from the multiple ports associated with the trunk based upon the number of ports determined in 708 and the rotated trunk index (step 710). In one embodiment, this is done by first determining a Trunk_Adjust value based upon the number of active trunk ports determined in 708 and the rotated trunk index previously generated (as generated in step 210 in
Trunk_Adjust[5:0]=Trunk Index[15:0] % TRUNK_PORTS_ADJ[5:0]
As shown above, a modulo operation is used to select one of the currently active ports of the trunk represented by Trunk_Adjust. A trunk_FID may then be obtained using the PRAM FID determined in 704 and the Trunk_Adjust. In one embodiment, a 16-bit trunk_FID is obtained using a bit-wise OR operation (|) as follows:
TRUNK_FID[15:0]=PRAM_FID[15:0]|Trunk_Adjust[4:0]
In one embodiment, the trunk_FID points to information related to the output port from the trunk to be used for forwarding the packet. Various other techniques may be used in alternative embodiments.
In embodiments wherein a path has to be determined from multiple paths available for forwarding the packet and the selected path is a trunk, then the processing depicted in
As described above, embodiments of the present invention provide techniques for generating an index (rotated path index) for selecting a path from multiple paths that may be available for forwarding a packet and for generating an index (rotated trunk index) for selecting a port from multiple ports associated with a port. The manner in which the rotated indices are generated enhances the diversification in the selection of paths and/or trunk ports for forwarding a packet.
Embodiments of the present invention ensure that packets belonging to the same “flow” are forwarded using the same path and/or same trunk port. A “flow” may be characterized by information selected from a packet to be forwarded. For example, one or more fields selected from the header of a packet may define a flow. The definition of a flow may change from one environment to another. In one embodiment, a flow means a combination of the source and destination fields in the packet. In such an environment, two packets may be considered to belong to the same flow if they both have the same source address and destination address. For a given flow, as long as the region boundary (e.g., the number of ports configured) is fixed, the same next-hop will be chosen for packets belonging to the flow. This is useful for several networking protocol and applications. For example, for a connected TCP flow, diverting packets from the same flow to different paths/ports will introduce additional overhead due to path/port setup requirements which will degrade the performance of the network. As a result, embodiments of the present invention ensure that packets belonging to the same flow are forwarded using the same path and/or same trunk port.
Embodiments of the present invention may be used for various applications. For example, service providers and datacenters looking for ECMP and trunk diversification may use embodiments of the present invention. Embodiments of the present invention may be used in various different network topologies including single and multi-stage networks. Embodiments of the present invention provide improved diversification in the selection of paths and/or trunk ports and as a result provide improved data load balancing across paths and trunk ports in a network.
As depicted in
Network device 802-1 may also provide three different possible ECMP paths for forwarding packets belonging to flow X. Based upon a rotated ECMP index generated by network device 802-1, network device 802-1 may select ECMP path 2 for forwarding packets belonging to flow X and forward the flow X packets along ECMP path 2 to network device 803-2.
Network device 802-2 may also provide three different possible ECMP paths for forwarding packets belonging to flow Y. Based upon a rotated ECMP index generated by network device 802-2, network device 802-1 may select ECMP path 3 for forwarding packets belonging to flow Y and forward the flow Y packets along ECMP path 3 to network device 803-6.
Network device 802-3 may also provide three different possible ECMP paths for forwarding packets belonging to flow Z. Based upon a rotated ECMP index generated by network device 802-3, network device 802-3 may select ECMP path 1 for forwarding packets belonging to flow Z and forward the flow Z packets along ECMP path 1 to network device 803-7.
As can be seen from the above example, the ECMP paths selected for forwarding a particular flow of packets at the different stages are different. This is because the amount of rotation applied by the network devices at the different stages may be different to generate different rotated ECMP indices thereby resulting in different ECMP paths being selected. For example, for packets belonging to flow X, at stage one, ECMP path 1 is selected, whereas, at stage two, ECMP path 2 is selected. This is due to the fact that the amount of rotation applied by network device 701 for generating a rotated path index or ECMP index may be different from the amount of rotation applied by network device 702-1. As a result, the rotated path index generated at network device 702 may be different from the rotated path index generated at network device 702-1. Due to this, a traffic flow may be diverted to different paths at different stages of the network while ensuring that, at a particular network device, all packets belonging to a particular traffic flow are all forwarded using the same path. This is different from conventional selection techniques, wherein the same path is likely to be selected at each network device for a traffic flow. Likewise, for packets belonging to flow Y, at stage one, ECMP path 2 is selected, whereas, at stage two, ECMP path 3 is selected. Further, for packets belonging to flow Z, at stage one, ECMP path 3 is selected, whereas, at stage two, ECMP path 1 is selected.
Accordingly, different ECMP paths may be selected at different stages, thereby enhancing the diversity of the selection, using the same technique for generating rotated path and trunk indices. Embodiments of the present invention may thus be used in a multistage network to enhance diversity in the selection of paths at the different stages.
If the selected path is a trunk, then the trunk index may be used to select a particular port from the multiple ports associated with the trunk for forwarding the packet. As with the selection of paths, the selected port for a particular flow of traffic may be different at different stages of the network since the amount of rotation applied by the network devices at the different stages for generating rotated trunk indices may be different at the different network devices resulting in different rotated trunk indices being generated at the different network devices.
Although specific embodiments of the invention have been described, various modifications, alterations, alternative constructions, and equivalents are also encompassed within the scope of the invention. For example, while embodiments have been described for using a rotated path index to select an ECMP path from multiple ECMP paths, the path index may also be used to select other types of paths. Embodiments of the present invention are not restricted to operation within certain specific data processing environments, but are free to operate within a plurality of data processing environments. Additionally, although embodiments of the present invention have been described using a particular series of transactions and steps, it should be apparent to those skilled in the art that the scope of the present invention is not limited to the described series of transactions and steps. For example, while embodiments of the present invention have been described for selecting ECMP paths, in other embodiments, the techniques described above may also be used to select a path from multiple path choices for forwarding a packet.
Further, while embodiments of the present invention have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the present invention. Embodiments of the present invention may be implemented only in hardware, or only in software, or using combinations thereof.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that additions, subtractions, deletions, and other modifications and changes may be made thereunto without departing from the broader spirit and scope as set forth in the claims.
The present application claims the benefit and priority under 35 U.S.C. 119(e) from the following U.S. Provisional Applications, the entire contents of which are herein incorporated by reference for all purposes: (1) U.S. Provisional Application No. 61/015,151 filed Dec. 19, 2007 entitled ADVANCED LOAD BALANCING FOR TRAFFIC OVER TRUNK INTERFACES AND/OR EQUAL COST ROUTED PATHS; (2) U.S. Provisional Application No. 61/015,153 filed Dec. 19, 2007 entitled EQUAL COST MULTIPLE PATH AND TRUNK DIVERSIFICATION FOR SINGLE AND MULTI-STAGE NETWORK; and (3) U.S. Provisional Application No. 60/975,363 filed Sep. 26, 2007 entitled FAST AND EFFICIENT TRUNK MANAGEMENT. The present application also incorporates by reference for all purposes the entire contents of U.S. Non-Provisional application Ser. No. 12/198,710, entitled TECHNIQUES FOR SELECTING PATHS AND/OR TRUNK PORTS FOR FORWARDING TRAFFIC FLOWS filed concurrently with the present application.
Number | Name | Date | Kind |
---|---|---|---|
3866175 | Seifert, Jr. et al. | Feb 1975 | A |
4325119 | Grandmaison et al. | Apr 1982 | A |
4348725 | Farrell et al. | Sep 1982 | A |
4628480 | Floyd | Dec 1986 | A |
4667323 | Engdahl et al. | May 1987 | A |
4683564 | Young et al. | Jul 1987 | A |
4698748 | Juzswik et al. | Oct 1987 | A |
4723243 | Joshi et al. | Feb 1988 | A |
4754482 | Weiss | Jun 1988 | A |
4791629 | Burns et al. | Dec 1988 | A |
4794629 | Pastyr et al. | Dec 1988 | A |
4807280 | Posner et al. | Feb 1989 | A |
4876681 | Hagiwara et al. | Oct 1989 | A |
4896277 | Vercellotti et al. | Jan 1990 | A |
4985889 | Frankish et al. | Jan 1991 | A |
5101404 | Kunimoto et al. | Mar 1992 | A |
5136584 | Hedlund | Aug 1992 | A |
5195181 | Bryant et al. | Mar 1993 | A |
5208856 | Leduc et al. | May 1993 | A |
5224108 | McDysan et al. | Jun 1993 | A |
5231633 | Hluchyj et al. | Jul 1993 | A |
5280582 | Yang et al. | Jan 1994 | A |
5282196 | Clebowicz | Jan 1994 | A |
5287477 | Johnson et al. | Feb 1994 | A |
5299190 | LaMaire et al. | Mar 1994 | A |
5299195 | Shah | Mar 1994 | A |
5301192 | Henrion | Apr 1994 | A |
5307345 | Lozowick et al. | Apr 1994 | A |
5323386 | Wiher et al. | Jun 1994 | A |
5365512 | Combs et al. | Nov 1994 | A |
5377189 | Clark | Dec 1994 | A |
5390173 | Spinney et al. | Feb 1995 | A |
5392279 | Taniguchi | Feb 1995 | A |
5406643 | Burke et al. | Apr 1995 | A |
5408469 | Opher et al. | Apr 1995 | A |
5430442 | Kaiser et al. | Jul 1995 | A |
5436893 | Barnett | Jul 1995 | A |
5461615 | Henrion | Oct 1995 | A |
5490258 | Fenner | Feb 1996 | A |
5506840 | Pauwels et al. | Apr 1996 | A |
5506841 | Sandquist | Apr 1996 | A |
5521923 | Willmann et al. | May 1996 | A |
5546385 | Caspi et al. | Aug 1996 | A |
5550816 | Hardwick et al. | Aug 1996 | A |
5563948 | Diehl et al. | Oct 1996 | A |
5566170 | Bakke et al. | Oct 1996 | A |
5598410 | Stone | Jan 1997 | A |
5600795 | Du | Feb 1997 | A |
5619497 | Gallagher et al. | Apr 1997 | A |
5640504 | Johnson, Jr. | Jun 1997 | A |
5646878 | Samra | Jul 1997 | A |
5663952 | Gentry, Jr. | Sep 1997 | A |
5663959 | Nakagawa | Sep 1997 | A |
5666353 | Klausmeier et al. | Sep 1997 | A |
5721819 | Galles et al. | Feb 1998 | A |
5732080 | Ferguson et al. | Mar 1998 | A |
5734826 | Olnowich et al. | Mar 1998 | A |
5740176 | Gupta et al. | Apr 1998 | A |
5745708 | Weppler et al. | Apr 1998 | A |
5751710 | Crowther et al. | May 1998 | A |
5802287 | Rostoker et al. | Sep 1998 | A |
5815146 | Youden et al. | Sep 1998 | A |
5818816 | Chikazawa et al. | Oct 1998 | A |
5835496 | Yeung et al. | Nov 1998 | A |
5838684 | Wicki et al. | Nov 1998 | A |
5862350 | Coulson | Jan 1999 | A |
5864555 | Mathur et al. | Jan 1999 | A |
5867675 | Lomelino et al. | Feb 1999 | A |
5870538 | Manning et al. | Feb 1999 | A |
5872769 | Caldara et al. | Feb 1999 | A |
5872783 | Chin | Feb 1999 | A |
5875200 | Glover et al. | Feb 1999 | A |
5896380 | Brown et al. | Apr 1999 | A |
5907566 | Benson et al. | May 1999 | A |
5907660 | Inoue et al. | May 1999 | A |
5909686 | Muller et al. | Jun 1999 | A |
5915094 | Kouloheris et al. | Jun 1999 | A |
5920566 | Hendel et al. | Jul 1999 | A |
5920886 | Feldmeier | Jul 1999 | A |
5936939 | Des Jardins et al. | Aug 1999 | A |
5936966 | Ogawa et al. | Aug 1999 | A |
5956347 | Slater | Sep 1999 | A |
5999528 | Chow et al. | Dec 1999 | A |
6000016 | Curtis et al. | Dec 1999 | A |
6011910 | Chau et al. | Jan 2000 | A |
6016310 | Muller et al. | Jan 2000 | A |
6023471 | Haddock et al. | Feb 2000 | A |
6031843 | Swanbery et al. | Feb 2000 | A |
6035414 | Okazawa et al. | Mar 2000 | A |
6038288 | Thomas et al. | Mar 2000 | A |
6067298 | Shinohara | May 2000 | A |
6067606 | Holscher et al. | May 2000 | A |
6076115 | Sambamurthy et al. | Jun 2000 | A |
6081522 | Hendel et al. | Jun 2000 | A |
6088356 | Hendel et al. | Jul 2000 | A |
6094434 | Kotzur et al. | Jul 2000 | A |
6104696 | Kadambi et al. | Aug 2000 | A |
6104700 | Haddock et al. | Aug 2000 | A |
6108306 | Kalkunte et al. | Aug 2000 | A |
6118787 | Kalkunte et al. | Sep 2000 | A |
6125417 | Bailis et al. | Sep 2000 | A |
6128666 | Muller et al. | Oct 2000 | A |
6144668 | Bass et al. | Nov 2000 | A |
6147996 | Laor et al. | Nov 2000 | A |
6151301 | Holden | Nov 2000 | A |
6151497 | Yee et al. | Nov 2000 | A |
6154446 | Kadambi et al. | Nov 2000 | A |
6157643 | Ma | Dec 2000 | A |
6160809 | Adiletta et al. | Dec 2000 | A |
6160812 | Bauman et al. | Dec 2000 | A |
6172990 | Deb et al. | Jan 2001 | B1 |
6178520 | DeKoning et al. | Jan 2001 | B1 |
6181699 | Crinion et al. | Jan 2001 | B1 |
6185222 | Hughes | Feb 2001 | B1 |
6195335 | Calvignac et al. | Feb 2001 | B1 |
6201492 | Amar et al. | Mar 2001 | B1 |
6222845 | Shue et al. | Apr 2001 | B1 |
6243667 | Kerr et al. | Jun 2001 | B1 |
6249528 | Kothary | Jun 2001 | B1 |
6263374 | Olnowich et al. | Jul 2001 | B1 |
6272144 | Berenbaum et al. | Aug 2001 | B1 |
6304903 | Ward | Oct 2001 | B1 |
6320859 | Momirov | Nov 2001 | B1 |
6333929 | Drottar et al. | Dec 2001 | B1 |
6335932 | Kadambi et al. | Jan 2002 | B2 |
6335935 | Kadambi et al. | Jan 2002 | B2 |
6343072 | Bechtolsheim et al. | Jan 2002 | B1 |
6351143 | Guccione et al. | Feb 2002 | B1 |
6356550 | Williams | Mar 2002 | B1 |
6356942 | Bengtsson et al. | Mar 2002 | B1 |
6359879 | Carvey et al. | Mar 2002 | B1 |
6363077 | Wong et al. | Mar 2002 | B1 |
6366557 | Hunter | Apr 2002 | B1 |
6369855 | Chauvel et al. | Apr 2002 | B1 |
6421352 | Manaka et al. | Jul 2002 | B1 |
6424658 | Mathur | Jul 2002 | B1 |
6424659 | Viswanadham et al. | Jul 2002 | B2 |
6427185 | Ryals et al. | Jul 2002 | B1 |
6430190 | Essbaum et al. | Aug 2002 | B1 |
6457175 | Lerche | Sep 2002 | B1 |
6459705 | Cheng | Oct 2002 | B1 |
6460088 | Merchant | Oct 2002 | B1 |
6463063 | Bianchini, Jr. et al. | Oct 2002 | B1 |
6466608 | Hong et al. | Oct 2002 | B1 |
6470436 | Croft et al. | Oct 2002 | B1 |
6473428 | Nichols et al. | Oct 2002 | B1 |
6473433 | Bianchini, Jr. et al. | Oct 2002 | B1 |
6477174 | Dooley et al. | Nov 2002 | B1 |
6480477 | Treadaway et al. | Nov 2002 | B1 |
6490280 | Leung | Dec 2002 | B1 |
6493347 | Sindhu et al. | Dec 2002 | B2 |
6496502 | Fite et al. | Dec 2002 | B1 |
6505281 | Sherry | Jan 2003 | B1 |
6510138 | Pannell | Jan 2003 | B1 |
6522656 | Gridley | Feb 2003 | B1 |
6532229 | Johnson et al. | Mar 2003 | B1 |
6532234 | Yoshikawa et al. | Mar 2003 | B1 |
6535504 | Johnson et al. | Mar 2003 | B1 |
6549519 | Michels et al. | Apr 2003 | B1 |
6553370 | Andreev et al. | Apr 2003 | B1 |
6556208 | Congdon et al. | Apr 2003 | B1 |
6567404 | Wilford | May 2003 | B1 |
6570884 | Connery et al. | May 2003 | B1 |
6577631 | Keenan et al. | Jun 2003 | B1 |
6587432 | Putzolu et al. | Jul 2003 | B1 |
6591302 | Boucher et al. | Jul 2003 | B2 |
6601186 | Fox et al. | Jul 2003 | B1 |
6606300 | Blanc et al. | Aug 2003 | B1 |
6628650 | Saite et al. | Sep 2003 | B1 |
6633580 | Torudbakken et al. | Oct 2003 | B1 |
6636483 | Pannell | Oct 2003 | B1 |
6643269 | Fan et al. | Nov 2003 | B1 |
6654342 | Dittia et al. | Nov 2003 | B1 |
6654346 | Mahalingaiah et al. | Nov 2003 | B1 |
6654370 | Quirke et al. | Nov 2003 | B1 |
6654373 | Maher, III et al. | Nov 2003 | B1 |
6658002 | Ross et al. | Dec 2003 | B1 |
6661791 | Brown | Dec 2003 | B1 |
6671275 | Wong et al. | Dec 2003 | B1 |
6678248 | Haddock et al. | Jan 2004 | B1 |
6681332 | Byrne et al. | Jan 2004 | B1 |
6683872 | Saito | Jan 2004 | B1 |
6687217 | Chow et al. | Feb 2004 | B1 |
6687247 | Wilford et al. | Feb 2004 | B1 |
6691202 | Vasquez et al. | Feb 2004 | B2 |
6696917 | Heitner et al. | Feb 2004 | B1 |
6697359 | George | Feb 2004 | B1 |
6697368 | Chang et al. | Feb 2004 | B2 |
6700894 | Shung | Mar 2004 | B1 |
6708000 | Nishi et al. | Mar 2004 | B1 |
6721229 | Cole | Apr 2004 | B1 |
6721268 | Ohira et al. | Apr 2004 | B1 |
6721313 | Van Duyne | Apr 2004 | B1 |
6721338 | Sato | Apr 2004 | B1 |
6731875 | Kartalopoulos | May 2004 | B1 |
6735218 | Chang et al. | May 2004 | B2 |
6745277 | Lee et al. | Jun 2004 | B1 |
6747971 | Hughes et al. | Jun 2004 | B1 |
6751224 | Parruck et al. | Jun 2004 | B1 |
6754881 | Kuhlmann et al. | Jun 2004 | B2 |
6765866 | Wyatt | Jul 2004 | B1 |
6775706 | Fukumoto et al. | Aug 2004 | B1 |
6778546 | Epps et al. | Aug 2004 | B1 |
6781990 | Puri et al. | Aug 2004 | B1 |
6785290 | Fujisawa et al. | Aug 2004 | B1 |
6788697 | Aweya et al. | Sep 2004 | B1 |
6792484 | Hook | Sep 2004 | B1 |
6792502 | Pandya et al. | Sep 2004 | B1 |
6798740 | Senevirathne et al. | Sep 2004 | B1 |
6804220 | Odenwalder et al. | Oct 2004 | B2 |
6804731 | Chang et al. | Oct 2004 | B1 |
6807179 | Kanuri et al. | Oct 2004 | B1 |
6807363 | Abiko et al. | Oct 2004 | B1 |
6810038 | Isoyama et al. | Oct 2004 | B1 |
6810046 | Abbas et al. | Oct 2004 | B2 |
6813243 | Epps et al. | Nov 2004 | B1 |
6813266 | Chiang et al. | Nov 2004 | B1 |
6816467 | Muller et al. | Nov 2004 | B1 |
6831923 | Laor et al. | Dec 2004 | B1 |
6831932 | Boyle et al. | Dec 2004 | B1 |
6836808 | Bunce et al. | Dec 2004 | B2 |
6839346 | Kametani | Jan 2005 | B1 |
6842422 | Bianchini | Jan 2005 | B1 |
6854117 | Roberts | Feb 2005 | B1 |
6856600 | Russell et al. | Feb 2005 | B1 |
6859438 | Haddock et al. | Feb 2005 | B2 |
6865153 | Hill et al. | Mar 2005 | B1 |
6901072 | Wong | May 2005 | B1 |
6906936 | James et al. | Jun 2005 | B1 |
6912637 | Herbst | Jun 2005 | B1 |
6920154 | Achler | Jul 2005 | B1 |
6925516 | Struhsaker et al. | Aug 2005 | B2 |
6934305 | Duschatko et al. | Aug 2005 | B1 |
6937606 | Basso et al. | Aug 2005 | B2 |
6946948 | McCormack et al. | Sep 2005 | B2 |
6957258 | Maher, III et al. | Oct 2005 | B2 |
6959007 | Vogel et al. | Oct 2005 | B1 |
6973092 | Zhou et al. | Dec 2005 | B1 |
6975599 | Johnson et al. | Dec 2005 | B1 |
6978309 | Dorbolo | Dec 2005 | B1 |
6980552 | Belz et al. | Dec 2005 | B1 |
6982974 | Saleh et al. | Jan 2006 | B1 |
6990102 | Kaniz et al. | Jan 2006 | B1 |
6993032 | Dammann et al. | Jan 2006 | B1 |
6996663 | Marsteiner | Feb 2006 | B1 |
7005812 | Mitchell | Feb 2006 | B2 |
7009968 | Ambe et al. | Mar 2006 | B2 |
7012919 | So et al. | Mar 2006 | B1 |
7050430 | Kalkunte et al. | May 2006 | B2 |
7080238 | Van Hoof et al. | Jul 2006 | B2 |
7082133 | Lor et al. | Jul 2006 | B1 |
7103041 | Speiser et al. | Sep 2006 | B1 |
7120744 | Klein | Oct 2006 | B2 |
7126948 | Gooch et al. | Oct 2006 | B2 |
7126956 | Scholten | Oct 2006 | B2 |
7151797 | Limberg | Dec 2006 | B2 |
7167471 | Calvignac et al. | Jan 2007 | B2 |
7176911 | Kidono et al. | Feb 2007 | B1 |
7185141 | James et al. | Feb 2007 | B1 |
7185266 | Blightman et al. | Feb 2007 | B2 |
7187687 | Davis et al. | Mar 2007 | B1 |
7190696 | Manur et al. | Mar 2007 | B1 |
7191277 | Broyles | Mar 2007 | B2 |
7191468 | Hanner | Mar 2007 | B2 |
7203194 | Chang et al. | Apr 2007 | B2 |
7206283 | Chang et al. | Apr 2007 | B2 |
7212536 | Mackiewich et al. | May 2007 | B2 |
7218637 | Best et al. | May 2007 | B1 |
7219293 | Tsai et al. | May 2007 | B2 |
7228509 | Dada et al. | Jun 2007 | B1 |
7237058 | Srinivasan | Jun 2007 | B2 |
7249306 | Chen | Jul 2007 | B2 |
7266117 | Davis | Sep 2007 | B1 |
7272611 | Cuppett et al. | Sep 2007 | B1 |
7272613 | Sim et al. | Sep 2007 | B2 |
7277425 | Sikdar | Oct 2007 | B1 |
7283547 | Hook et al. | Oct 2007 | B1 |
7286534 | Kloth | Oct 2007 | B2 |
7324509 | Ni | Jan 2008 | B2 |
7355970 | Lor | Apr 2008 | B2 |
7356030 | Chang et al. | Apr 2008 | B2 |
7366100 | Anderson et al. | Apr 2008 | B2 |
7391769 | Rajkumar et al. | Jun 2008 | B2 |
7428693 | Obuchi et al. | Sep 2008 | B2 |
7468975 | Davis | Dec 2008 | B1 |
7512127 | Chang et al. | Mar 2009 | B2 |
7558193 | Bradbury et al. | Jul 2009 | B2 |
7561590 | Walsh | Jul 2009 | B1 |
7596139 | Patel et al. | Sep 2009 | B2 |
7609617 | Appanna et al. | Oct 2009 | B2 |
7613991 | Bain | Nov 2009 | B1 |
7636369 | Wong | Dec 2009 | B2 |
7649885 | Davis | Jan 2010 | B1 |
7657703 | Singh | Feb 2010 | B1 |
7738450 | Davis | Jun 2010 | B1 |
7813367 | Wong | Oct 2010 | B2 |
7830884 | Davis | Nov 2010 | B2 |
7903654 | Bansal | Mar 2011 | B2 |
7933947 | Fleischer et al. | Apr 2011 | B2 |
7948872 | Patel et al. | May 2011 | B2 |
7953922 | Singh | May 2011 | B2 |
7953923 | Singh | May 2011 | B2 |
8014278 | Subramanian et al. | Sep 2011 | B1 |
8037399 | Wong et al. | Oct 2011 | B2 |
20010001879 | Kubik et al. | May 2001 | A1 |
20010007560 | Masuda et al. | Jul 2001 | A1 |
20010026551 | Horlin | Oct 2001 | A1 |
20010048785 | Steinberg | Dec 2001 | A1 |
20010053150 | Clear et al. | Dec 2001 | A1 |
20020001307 | Nguyen et al. | Jan 2002 | A1 |
20020012585 | Kalkunte et al. | Jan 2002 | A1 |
20020040417 | Winograd et al. | Apr 2002 | A1 |
20020054594 | Hoof et al. | May 2002 | A1 |
20020054595 | Ambe et al. | May 2002 | A1 |
20020069294 | Herkersdorf et al. | Jun 2002 | A1 |
20020073073 | Cheng | Jun 2002 | A1 |
20020085499 | Toyoyama et al. | Jul 2002 | A1 |
20020087788 | Morris | Jul 2002 | A1 |
20020089937 | Venkatachary et al. | Jul 2002 | A1 |
20020089977 | Chang et al. | Jul 2002 | A1 |
20020091844 | Craft et al. | Jul 2002 | A1 |
20020091884 | Chang et al. | Jul 2002 | A1 |
20020097713 | Chang et al. | Jul 2002 | A1 |
20020105966 | Patel et al. | Aug 2002 | A1 |
20020126672 | Chow et al. | Sep 2002 | A1 |
20020131437 | Tagore-Brage | Sep 2002 | A1 |
20020141403 | Akahane et al. | Oct 2002 | A1 |
20020146013 | Karlsson et al. | Oct 2002 | A1 |
20020161967 | Kirihata et al. | Oct 2002 | A1 |
20020169786 | Richek | Nov 2002 | A1 |
20020191605 | Van Lunteren et al. | Dec 2002 | A1 |
20030009466 | Ta et al. | Jan 2003 | A1 |
20030012198 | Kaganoi et al. | Jan 2003 | A1 |
20030033435 | Hanner | Feb 2003 | A1 |
20030043800 | Sonksen et al. | Mar 2003 | A1 |
20030043848 | Sonksen | Mar 2003 | A1 |
20030048785 | Calvignac et al. | Mar 2003 | A1 |
20030061459 | Aboulenein et al. | Mar 2003 | A1 |
20030074657 | Bramley, Jr. | Apr 2003 | A1 |
20030081608 | Barri et al. | May 2003 | A1 |
20030095548 | Yamano | May 2003 | A1 |
20030103499 | Davis et al. | Jun 2003 | A1 |
20030103500 | Menon et al. | Jun 2003 | A1 |
20030108052 | Inoue et al. | Jun 2003 | A1 |
20030110180 | Calvignac et al. | Jun 2003 | A1 |
20030115403 | Bouchard et al. | Jun 2003 | A1 |
20030120861 | Calle et al. | Jun 2003 | A1 |
20030128668 | Yavatkar et al. | Jul 2003 | A1 |
20030137978 | Kanetake | Jul 2003 | A1 |
20030152084 | Lee et al. | Aug 2003 | A1 |
20030152096 | Chapman | Aug 2003 | A1 |
20030156586 | Lee et al. | Aug 2003 | A1 |
20030159086 | Arndt | Aug 2003 | A1 |
20030165160 | Minami et al. | Sep 2003 | A1 |
20030169470 | Alagar et al. | Sep 2003 | A1 |
20030174719 | Sampath et al. | Sep 2003 | A1 |
20030177221 | Ould-Brahim et al. | Sep 2003 | A1 |
20030198182 | Pegrum et al. | Oct 2003 | A1 |
20030200343 | Greenblat et al. | Oct 2003 | A1 |
20030214956 | Navada et al. | Nov 2003 | A1 |
20030215029 | Limberg | Nov 2003 | A1 |
20030223424 | Anderson et al. | Dec 2003 | A1 |
20030223466 | Noronha, Jr. et al. | Dec 2003 | A1 |
20030227943 | Hallman et al. | Dec 2003 | A1 |
20040022263 | Zhao et al. | Feb 2004 | A1 |
20040028060 | Kang | Feb 2004 | A1 |
20040054867 | Stravers et al. | Mar 2004 | A1 |
20040062245 | Sharp et al. | Apr 2004 | A1 |
20040062246 | Boucher et al. | Apr 2004 | A1 |
20040088469 | Levy | May 2004 | A1 |
20040128434 | Khanna et al. | Jul 2004 | A1 |
20040141504 | Blanc | Jul 2004 | A1 |
20040190547 | Gordy et al. | Sep 2004 | A1 |
20040208177 | Ogawa | Oct 2004 | A1 |
20040208181 | Clayton et al. | Oct 2004 | A1 |
20040223502 | Wybenga et al. | Nov 2004 | A1 |
20040235480 | Rezaaifar et al. | Nov 2004 | A1 |
20040264380 | Kalkunte et al. | Dec 2004 | A1 |
20050010630 | Doering et al. | Jan 2005 | A1 |
20050010849 | Ryle et al. | Jan 2005 | A1 |
20050041684 | Reynolds et al. | Feb 2005 | A1 |
20050097432 | Obuchi et al. | May 2005 | A1 |
20050120122 | Farnham | Jun 2005 | A1 |
20050132132 | Rosenbluth et al. | Jun 2005 | A1 |
20050132179 | Glaum et al. | Jun 2005 | A1 |
20050138276 | Navada et al. | Jun 2005 | A1 |
20050144369 | Jaspers | Jun 2005 | A1 |
20050152324 | Benveniste | Jul 2005 | A1 |
20050152335 | Lodha et al. | Jul 2005 | A1 |
20050169317 | Pruecklmayer | Aug 2005 | A1 |
20050175018 | Wong | Aug 2005 | A1 |
20050185577 | Sakamoto et al. | Aug 2005 | A1 |
20050185652 | Iwamoto | Aug 2005 | A1 |
20050193316 | Chen | Sep 2005 | A1 |
20050201387 | Willis | Sep 2005 | A1 |
20050226236 | Klink | Oct 2005 | A1 |
20050246508 | Shaw | Nov 2005 | A1 |
20050249124 | Elie-Dit-Cosaque et al. | Nov 2005 | A1 |
20060031610 | Liav et al. | Feb 2006 | A1 |
20060034452 | Tonomura | Feb 2006 | A1 |
20060050690 | Epps et al. | Mar 2006 | A1 |
20060077891 | Smith et al. | Apr 2006 | A1 |
20060092829 | Brolin et al. | May 2006 | A1 |
20060092929 | Chun | May 2006 | A1 |
20060114876 | Kalkunte | Jun 2006 | A1 |
20060146374 | Ng et al. | Jul 2006 | A1 |
20060165089 | Klink | Jul 2006 | A1 |
20060209685 | Rahman et al. | Sep 2006 | A1 |
20060221841 | Lee et al. | Oct 2006 | A1 |
20060268680 | Roberts et al. | Nov 2006 | A1 |
20070038798 | Bouchard et al. | Feb 2007 | A1 |
20070088974 | Chandwani et al. | Apr 2007 | A1 |
20070127464 | Jain et al. | Jun 2007 | A1 |
20070179909 | Channasagara | Aug 2007 | A1 |
20070208876 | Davis | Sep 2007 | A1 |
20070253420 | Chang et al. | Nov 2007 | A1 |
20070258475 | Chinn et al. | Nov 2007 | A1 |
20070288690 | Wang et al. | Dec 2007 | A1 |
20080002707 | Davis | Jan 2008 | A1 |
20080031263 | Ervin et al. | Feb 2008 | A1 |
20080037544 | Yano et al. | Feb 2008 | A1 |
20080049742 | Bansal et al. | Feb 2008 | A1 |
20080069125 | Reed et al. | Mar 2008 | A1 |
20080092020 | Hasenplaugh et al. | Apr 2008 | A1 |
20080095169 | Chandra et al. | Apr 2008 | A1 |
20080117075 | Seddigh et al. | May 2008 | A1 |
20080181103 | Davies | Jul 2008 | A1 |
20080205407 | Chang et al. | Aug 2008 | A1 |
20080307288 | Ziesler et al. | Dec 2008 | A1 |
20090175178 | Yoon et al. | Jul 2009 | A1 |
20090279423 | Suresh et al. | Nov 2009 | A1 |
20090279440 | Wong et al. | Nov 2009 | A1 |
20090279441 | Wong et al. | Nov 2009 | A1 |
20090279541 | Wong et al. | Nov 2009 | A1 |
20090279542 | Wong et al. | Nov 2009 | A1 |
20090279546 | Davis | Nov 2009 | A1 |
20090279548 | Davis et al. | Nov 2009 | A1 |
20090279549 | Ramanathan et al. | Nov 2009 | A1 |
20090279558 | Davis et al. | Nov 2009 | A1 |
20090279559 | Wong et al. | Nov 2009 | A1 |
20090279561 | Chang et al. | Nov 2009 | A1 |
20090282148 | Wong et al. | Nov 2009 | A1 |
20090282322 | Wong et al. | Nov 2009 | A1 |
20090287952 | Patel et al. | Nov 2009 | A1 |
20090290499 | Patel et al. | Nov 2009 | A1 |
20100034215 | Patel et al. | Feb 2010 | A1 |
20100046521 | Wong | Feb 2010 | A1 |
20100061393 | Wong | Mar 2010 | A1 |
20100100671 | Singh | Apr 2010 | A1 |
20100135313 | Davis | Jun 2010 | A1 |
20100161894 | Singh | Jun 2010 | A1 |
20100246588 | Davis | Sep 2010 | A1 |
20100293327 | Lin et al. | Nov 2010 | A1 |
20110002340 | Davis | Jan 2011 | A1 |
20110044340 | Bansal et al. | Feb 2011 | A1 |
20110069711 | Jha et al. | Mar 2011 | A1 |
20110110237 | Wong et al. | May 2011 | A1 |
Number | Date | Country |
---|---|---|
1380127 | Jan 2004 | EP |
2003289359 | Oct 2003 | JP |
2004-537871 | Dec 2004 | JP |
WO 0184728 | Nov 2001 | WO |
WO 0241544 | May 2002 | WO |
Number | Date | Country | |
---|---|---|---|
61015151 | Dec 2007 | US | |
61015153 | Dec 2007 | US | |
60975363 | Sep 2007 | US |