Generally caching of block device data at a relatively lower latency device provides phenomenal performance for both read and write input/output (“I/O”) operations. As a read cache device, the data is stored in the cache device until it is replaced with the new data. Until then, the data is read from the cache device for subsequent read I/O operations directed to the same data block. As a write cache, the new data is written to the cache device, and the write I/O operation is informed completed. Later based on policy, the dirty data stored in the cache device is actually persisted to the underlying stable medium.
A solid state device (“SSD”) can be used as the cache device. When compared to a hard disk drive, SSD devices have superior read and write performance. It is therefore desirable to maximize use of the SSD device as the cache device to achieve a greater performance advantage. In addition to having superior read and write performance, the SSD cache device typically has a larger capacity than conventional cache devices. This combination results in more complex management issues. For example, a cache medium includes a plurality of cache lines for caching data stored in the underlying data storage medium. Cache headers are provided and maintained to manage the cache lines. When servicing I/O operations, the cache headers are searched to determine whether there is a cache hit or miss. However, by maximizing use of a larger capacity cache device, more cache lines are available for caching data, and therefore more cache headers must be searched. Accordingly, the complexity of the cache header search is increased. Additionally, in case of a cache miss, it is desirable to use proper cache replacement logic to avoid swapping more-frequently accessed or more-recently accessed data out of the cache device. Swapping more-frequently accessed or more-recently accessed data out of the cache device leads to poor system performance because more and more cache misses will occur. In conventional data storage systems, least-recently used (LRU) or least-frequently used (LFU) cache replacement logic is employed to replace the old data.
Systems, devices and methods for performing cache replacement for a caching medium for a data storage system are described herein. In particular, an SSD cache device is used as the caching medium for the data storage system. Cache headers for managing the cache lines of the SSD cache device are assigned to buckets of an LRU data structure, for example, using a hashing algorithm. The cache headers in each of the buckets are arranged in a linked list based on a time of access. Thus, the tail node of each respective linked list is a cache header for an LRU cache line. The tail nodes (or cache headers for the LRU cache lines) are assigned to buckets of an LFU data structure. The tail nodes in each of the buckets are arranged in a linked list based on a frequency of access. An LFU cache line is selected using the LFU data structure. Accordingly, it is possible to select an LFU cache line from among a plurality of LRU cache lines while minimizing the amount of memory needed to maintain the LRU and LFU data structures.
An example computer-implemented method for performing cache replacement for a caching medium for a data storage system can include providing an SSD cache including a plurality of cache lines, providing a least-recently used (LRU) data structure including a plurality of buckets for managing the SSD cache, and providing a plurality of cache headers for managing the cache lines. Each cache header can associate a respective cache line and a corresponding data block stored in the data storage system. The method can also include assigning two or more cache headers to a same bucket of the LRU data structure, and arranging the two or more cache headers assigned to the same bucket of the LRU data structure in a linked list based on a time of access. Because the cache headers are arranged based on the time of access, a cache header for an LRU cache line is a tail node of the linked list of the same bucket of the LRU data structure. Further, the method can include providing a least-frequently used (LFU) data structure including a plurality of frequency buckets, where each frequency bucket corresponds to a fixed frequency range, assigning the tail node of the linked list of the same bucket of the LRU data structure to one of the frequency buckets based on a frequency of access, and selecting an LFU cache line for cache replacement using the LFU data structure.
Optionally, the frequency buckets of the LFU data structure can be arranged from an LFU frequency bucket to a most-recently used (MFU) frequency bucket. Additionally, to select an LFU cache line for cache replacement, the method can include searching the frequency buckets of the LFU data structure beginning with the LFU frequency bucket to identify a frequency bucket containing the LFU cache line.
Alternatively or additionally, the method can optionally include assigning two or more tail nodes corresponding to different buckets of the LRU data structure to a same frequency bucket of the LFU data structure, and arranging the two or more tail nodes assigned to the same frequency bucket of the LFU data structure in a linked list based on the frequency of access.
Optionally, the method can include removing a cache header for the LFU cache line from the linked list of the same frequency bucket of the LFU data structure, and assigning a next LRU cache header to the linked list of the same frequency bucket of the LFU data structure.
Alternatively or additionally, the linked list of the same bucket of the LRU data structure and the linked list of the same frequency bucket of the LFU data structure are optionally doubly-linked lists, respectively. Each of the two or more tail nodes can participate in the doubly-linked list of the same frequency bucket of the LFU data structure, for example, in addition to participating in the doubly-linked lists of different buckets of the LRU data structure.
Optionally, each of the two or more tail nodes can be a respective cache header including a previous pointer and a subsequent pointer. The previous pointer can optionally be reserved to point to a next LFU cache header in the doubly-linked list of the same frequency bucket of the LFU data structure. The subsequent pointer can optionally be reserved to point to a next MFU cache header in the doubly-linked list of the same frequency bucket of the LFU data structure.
Alternatively or additionally, each of the two or more tail nodes can be a respective cache header including a previous pointer, a subsequent pointer, and a frequency counter. Each of the two or more tail nodes in the doubly-linked list of the same frequency bucket of the LFU data structure can optionally be arranged based on a value of the frequency counter.
It should be understood that the above-described subject matter may also be implemented as a computer-controlled apparatus, a computer process, a computing system, or an article of manufacture, such as a computer-readable storage medium.
Other systems, methods, features and/or advantages will be or may become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features and/or advantages be included within this description and be protected by the accompanying claims.
The components in the drawings are not necessarily to scale relative to each other. Like reference numerals designate corresponding parts throughout the several views.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art. Methods and materials similar or equivalent to those described herein can be used in the practice or testing of the present disclosure. As used in the specification, and in the appended claims, the singular forms “a,” “an,” “the” include plural referents unless the context clearly dictates otherwise. The term “comprising” and variations thereof as used herein is used synonymously with the term “including” and variations thereof and are open, non-limiting terms. The terms “optional” or “optionally” used herein mean that the subsequently described feature, event or circumstance may or may not occur, and that the description includes instances where said feature, event or circumstance occurs and instances where it does not. While implementations will be described for performing cache replacement for a caching medium for a data storage system, it will become evident to those skilled in the art that the implementations are not limited thereto.
Turning now to
According to implementations, the nodes within a cluster may be housed in a one rack space unit storing up to four hard disk drives. For instance, the node 2A is a one rack space computing system that includes four hard disk drives 4A-4D (collectively, disks 4). Alternatively, each node may be housed in a three rack space unit storing up to fifteen hard disk drives. For instance, the node 2E includes hard disk drives 4A-4L. Other types of enclosures may also be utilized that occupy more or fewer rack units and that store fewer or more hard disk drives. In this regard, it should be appreciated that the type of storage enclosure and number of hard disk drives utilized is not generally significant to the implementation of the embodiments described herein. Any type of storage enclosure and virtually any number of hard disk devices or other types of mass storage devices may be utilized.
As shown in
Data may be striped across the nodes of each storage cluster. For instance, the cluster 5A may stripe data across the storage nodes 2A, 2B, 2C and 2D. The cluster 5B may similarly stripe data across the storage nodes 2E, 2F and 2G. Striping data across nodes generally ensures that different I/O operations are fielded by different nodes, thereby utilizing all of the nodes simultaneously, and that the same I/O operation is not split between multiple nodes. Striping the data in this manner provides a boost to random I/O performance without decreasing sequential I/O performance.
According to embodiments, each storage server computer 2A-2G includes one or more network ports operatively connected to a network switch 6 using appropriate network cabling. It should be appreciated that, according to embodiments of the invention, Ethernet or Gigabit Ethernet may be utilized. However, it should also be appreciated that other types of suitable physical connections may be utilized to form a network of which each storage server computer 2A-2G is a part. Through the use of the network ports and other appropriate network cabling and equipment, each node within a cluster is communicatively connected to the other nodes within the cluster. Many different types and number of connections may be made between the nodes of each cluster. Furthermore, each of the storage server computers 2A-2G need not be connected to the same switch 6. The storage server computers 2A-2G can be interconnected by any type of network or communication links, such as a LAN, a WAN, a MAN, a fiber ring, a fiber star, wireless, optical, satellite, or any other network technology, topology, protocol, or combination thereof.
Each cluster 5A-5B is also connected to a network switch 6. The network switch 6 is connected to one or more client computers 8A-8N (also referred to herein as “initiators”). It should be appreciated that other types of networking topologies may be utilized to interconnect the clients and the clusters 5A-5B. It should also be appreciated that the initiators 8A-8N may be connected to the same local area network (LAN) as the clusters 5A-5B or may be connected to the clusters 5A-5B via a distributed wide area network, such as the Internet. An appropriate protocol, such as the Internet Small Computer Systems Interface (“iSCSI”) or Fiber Channel protocol may be utilized to enable the initiators 8A-8N to communicate with and utilize the various functions of the storage clusters 5A-5B over a wide area network such as the Internet. An appropriate protocol, such as iSCSI, Fiber Channel, or Serial Attached SCSI (“SAS”), is also used to enable the members of the storage cluster to communicate with each other. These two protocols need not be similar.
Examples of the disks 4 may include hard drives, spinning disks, stationary media, non-volatile memories, or optically scanned media; each, or in combination, employing magnetic, capacitive, optical, semiconductor, electrical, quantum, dynamic, static, or any other data storage technology. The disks 4 may use IDE, ATA, SATA, PATA, SCSI, USB, PCI, Firewire, or any other bus, link, connection, protocol, network, controller, or combination thereof for I/O transfers.
Referring now to
The motherboard 12 may also utilize a system board chipset 22 implementing one or more of the devices described herein. One or more hardware slots 24A-24B may also be provided for expandability, including the addition of a hardware RAID controller to the storage server computer 2. It should also be appreciate that, although not illustrated in
As described briefly above, the motherboard 12 utilizes a system bus to interconnect the various hardware components. The system bus utilized by the storage server computer 2 provides a two-way communication path for all components connected to it. The component that initiates a communication is referred to as a “master” component and the component to which the initial communication is sent is referred to as a “slave” component. A master component therefore issues an initial command to or requests information from a slave component. Each slave component is addressed, and thus communicatively accessible to the master component, using a particular slave address. Both master components and slave components are operable to transmit and receive communications over the system bus. Buses and the associated functionality of master-slave communications are well-known to those skilled in the art, and therefore not discussed in further detail herein.
As discussed briefly above, the system memory in the storage server computer 2 may include including a RAM 20 and a ROM 18. The ROM 18 may store a basic input/output system (“BIOS”) or Extensible Firmware Interface (“EFI”) compatible firmware that includes program code containing the basic routines that help to transfer information between elements within the storage server computer 2. As also described briefly above, the Ethernet controller 16 may be capable of connecting the local storage server computer 2 to the initiators 8A-8N via a network. Connections which may be made by the network adapter may include LAN or WAN connections. LAN and WAN networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. The CPUs 14A-14B utilized by the storage server computer 2 are standard central processing units that perform the arithmetic and logical operations necessary for the operation of the storage server computer 2. CPUs are well-known in the art, and therefore not described in further detail herein. A graphics adapter may or may not be utilized within the storage server computer 2 that enables the display of video data (i.e., text and/or graphics) on a display unit.
As shown in
The mass storage devices and their associated computer-readable media, provide non-volatile storage for the storage server computer 2. Although the description of computer-readable media contained herein refers to a mass storage device, such as a hard disk or CD-ROM drive, it should be appreciated by those skilled in the art that computer-readable media can be any available media that can be accessed by the local storage server. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.
Referring now to
The RAID layer 302 abstracts the organization of the RAID array 320A and presents a logical block-level interface to higher layers in the storage stack 300. For example, the RAID layer 302 can implement RAID level 5, where data is striped across the plurality of disks (e.g., disks 4A-4D) in the RAID array 320A. In a four disk array, a RAID stripe includes data block D1 stored on disk 1 (e.g., “4A”), data block D2 stored on disk 2 (e.g., “4B”), data block D3 stored on disk 3 (e.g., “4C”) and parity block PA stored on disk 4 (e.g., “4D”), for example. The parity block PA can be computed using XOR logic of data block D1, data block D2 and data block D3 (e.g., PA=D1⊕D2⊕D3). Additionally, the parity blocks in a RAID 5 array are distributed or staggered across the plurality of disks. Although RAID level 5 is discussed above, it should be understood that the RAID layer 302 can implement other RAID levels, such as RAID level 0, 1, 2, 3, 4 or 6.
The DVM layer 306 uses the block-level interface provided by the RAID layer 302 to manage the available storage capacity of the RAID array 320A and service I/O operations initiated by the initiators 8A-8N. The DVM layer 306 can implement a variety of storage management functions, such as volume virtualization, thin provisioning, snapshots, locking, data replication, etc. The DVM layer 306 can be implemented on the storage node 2 in software, hardware or a combination thereof. Volume virtualization provides the facility to create and manage multiple, logical volumes on the RAID array 320A, as well as expand a logical volume across multiple storage nodes within a storage cluster. Thin provisioning provides for the allocation of physical capacity of the RAID array 320A to logical volumes on an as-needed basis. For example, the available physical storage capacity of the RAID array 320A can be divided into a number of unique, equally-sized areas referred to as territories. Optionally, the size of a territory can be one terabyte (TB), a reduced size of 8 megabytes (MB) or any other territory size. Alternatively or additionally, the available physical storage capacity of the RAID array 320A can optionally be further subdivided into units referred to herein as provisions. The provisions can be unique, equally sized areas of the available physical capacity. For example, provisions may be 1 MB in size, a reduced size of 512 kilobytes (KB) or any other provision size. Optionally, a provision can be further subdivided into chunks. For example, the chunk size can be selected as 64 KB, a reduced size of 8 KB or any other chunk size. Snapshots provide functionality for creating and utilizing point-in-time snapshots of the contents of logical storage volumes. The locking functionality allows for synchronizing I/O operations within the storage node 2 or across nodes within the storage cluster. Data replication provides functionality for replication of data within the storage node 2 or across nodes within the storage cluster 2.
The cache layer 304 intercepts read and/or write I/O operations flowing between the RAID layer 302 and the DVM layer 306. The cache layer 304 is configured to read data from and/or write data to an SSD cache medium 330. The cache layer 304 can be implemented on the storage node 2 in software, hardware or a combination thereof. The SSD cache medium 330 can be used in either a write-through cache mode or a write-back cache mode. When the SSD cache medium 330 is controlled according to the write-through cache mode, a new read I/O operation (e.g., directed to a data block) is stored in the SSD cache medium 330 before returning the requested data block to the host (e.g., initiators 8A-8N of
As described above, it is desirable to maximize the use of the available storage capacity of the SSD cache medium 330 due to its superior I/O performance capability as compared to that of the mass storage devices 320. An example technique to maximize use of the SSD cache medium 330 is to accommodate both smaller, random I/O operations as well as larger, sequential I/O operations. For example, instead of using 64 KB cache line granularity similar to conventional SSD cache applications, a smaller SSD cache line granularity such as 8 KB, for example, can optionally be used with the techniques described herein to maximize use of the SSD cache medium 330. When using 64 KB cache line granularity, a 64 KB cache line is underutilized when less than 64 KB of data (e.g., only a 8 KB of data from a random I/O) is stored in the cache line. In other words, a portion of the storage capacity of the 64 KB cache line remains unused when only 8 KB of data is stored therein. On the other hand, when using 8 KB cache line granularity, use of the available storage capacity of the SSD cache medium 330 is maximized because less storage space is underutilized. For example, the SSD cache device with 8 KB cache line granularity can accommodate smaller, random I/O operations (e.g., 8 KB of data) in a single cache line, as well as larger, sequential I/O operations (e.g., 32 KB of data) in multiple cache lines. It should be understood that 8 KB cache line granularity is provided herein only as an example of smaller SSD cache line granularity and that SSD cache line granularity more or less than 8 KB (e.g., 4 KB, 16 KB, 32 KB, etc.) can be used with to the techniques described herein.
The smaller SSD cache line granularity facilitates caching more data and also maximizing use of the storage capacity of the SSD cache medium 330 for caching the underlying slow storage. However, the amount of hash search required to find a cache hit increases due to the larger number of cache headers, and the searching becomes more complex, which puts additional pressure on the data storage system computer performing the hash search. Grouping cache headers into hash buckets and then sorting the cache headers based on time of access (e.g., the MRU cache forms the head of the list within the hash bucket and the LRU cache header forms the tail of the list within the hash bucket) can ensure faster and less complex searching. In case of a cache miss, it is desirable to use proper cache replacement logic to avoid swapping more-frequently accessed or more-recently accessed data out of the cache device. As described above, swapping more-frequently accessed or more-recently accessed data out of the cache device leads to poor system performance because more and more cache misses will occur.
Referring now to
A hashing algorithm can be used to assign cache headers 406 to particular buckets 404 of the data structure 402. For example, a cache header can be assigned to a particular bucket of the data structure based on the location of the data block in the underlying storage medium (e.g., a contiguous region of the physical storage capacity of the underlying storage medium where the data block is stored). In other words, the hashing algorithm can return the same hash value for data blocks stored in the same contiguous region of the physical storage capacity of the underlying storage medium. Each contiguous region of the physical storage capacity can have a predetermined size such as 64 KB, for example. It should be understood that 64 KB is provided only as an example of the size of each contiguous region and that the size of each contiguous region can be more or less than 64 KB. Using the hashing algorithm, cache headers for cache lines storing data blocks stored within the same contiguous region of the physical storage capacity can therefore be assigned to the same bucket of the data structure 402.
The data structure 402 shown in
The cache headers 406 assigned to each of the buckets 404 of the data structure 402 can be arranged based on a time of access. In other words, the cache headers 406 assigned to a particular bucket of the data structure 402 can be sorted within the particular bucket based on the time of access. As described above, the time of access (e.g., a time of last access) can be tracked using a counter in the cache headers 406, for example. The cache headers 406 can be maintained in the particular bucket of the data structure 402 in a linked list. Optionally, as described in detail below, the cache headers 406 can be maintained in the particular bucket of the data structure 402 in a doubly-linked list. The cache headers 406 can be arranged from a most-recently used (MRU) cache header 406A at a head of the linked list to a LRU cache header 406N at a tail of the linked list. In
An LFU data structure 430 can be maintained in addition to the data structure 402 (i.e., the LRU data structure). The LFU data structure 430 can be a list having a plurality of entries or buckets 432. For example, the LFU data structure 430 can be a frequency bucket list. Each frequency bucket 432 in the LFU data structure 430 can correspond to a fixed frequency range. For example, frequency bucket “0” can correspond to a frequency range 0-127, frequency bucket “1” can correspond to a frequency range 128-1K, frequency bucket “2” can correspond to a frequency range 1K-4K, frequency bucket “3” can correspond to a frequency range 4K-16K, etc. It should be understood that the number of frequency buckets 432 in the LFU data structure 430, as well as the fixed frequency ranges for each of the frequency buckets, can have values other than those described with regard to
A tail node (e.g., an LRU cache header) of a linked list of each of the buckets 404 of the data structure 402 can be assigned to a frequency bucket of the LFU data structure 430. For example, each LRU cache header of a linked list of each of the buckets 404 of the data structure 402 can be assigned to a frequency bucket of the LFU data structure 430 based on a frequency of access. As described above, each cache header can include a counter for tracking a frequency of access (e.g., a frequency counter). For example, a frequency counter of a cache header can be incremented each time a cache line associated with the cache header is accessed. Optionally, the frequency counter can be reset, for example to zero, after a fixed period of time. It should be understood that the fixed period of time can be any period of time such as seconds, minutes, hours, days, etc., for example. Accordingly, each LRU cache header of a linked list of each of the buckets 404 of the data structure 402 can be assigned to a frequency bucket of the LFU data structure 430 based on a value of its respective frequency counter. For example, as shown in
Using the LFU data structure 430, and in response to cache pressure, LFU cache headers can be selected for cache replacement before MFU cache headers are selected. In particular, the cache header at the head node of the frequency bucket associated with the lowest range (e.g., bucket “0” in
As described above, each linked list of the respective buckets 404 of the data structure 402 and each linked list of the respective frequency buckets 432 of the LFU data structure 430 can be doubly-linked lists. A doubly-linked list facilitates traversal of the linked list in either forward or backward directions. Additionally, a doubly-linked list allows for more efficient addition and/or removal of nodes from the linked list. The doubly-linked list can optionally be an overloaded doubly-linked list to reduce the amount of memory used to maintain the doubly-linked list. An overloaded doubly-linked list is described below with regard to
Additionally, Nth−1 cache header 406N−1 (e.g., the second-to-last node) can be reached from first cache header 406A with just one link traverse. A subsequent pointer 460N−1 of Nth−1 cache header 406N−1 can point to Nth cache header 406N, which is a tail node of the doubly-linked list 440. As described above, a tail node of the linked list of the LRU data structure is the LRU cache header, and the LRU cache header is assigned to the LFU data structure. The tail node can be identified by a specific bit of the cache header. If the specific bit for a tail node is set, the previous and subsequent pointers (e.g., previous and subsequent pointers 450N and 460N) can be reserved to point to previous and subsequent nodes, respectively, in a doubly-linked list 440 of a frequency bucket of the LFU data structure. The previous pointer 450A of Nth cache header 406N does not need to be used in the doubly-linked list 420 of the bucket 404 of the LRU data structure. Additionally, the subsequent pointer 460N of Nth cache header 406N does not need to be used in the doubly-linked list 420 of the bucket 404 of the LRU data structure because it is not a circular list. Accordingly, previous pointer 450A and subsequent pointer 460N of Nth cache header 406N can be reserved to participate in the doubly-linked list 440 of a frequency bucket of the LFU data structure. It is therefore possible to reduce the amount of memory needed to maintain the LFU data structure.
Referring now to
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
This application claims the benefit of U.S. Provisional Patent Application No. 62/158,044, filed on May 7, 2015, entitled “SYSTEMS, DEVICES AND METHODS USING A SOLID STATE DEVICE AS A CACHING MEDIUM WITH A CACHE REPLACEMENT ALGORITHM,” the disclosure of which is expressly incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4989131 | Stone | Jan 1991 | A |
5499337 | Gordon | Mar 1996 | A |
5680579 | Young et al. | Oct 1997 | A |
5732240 | Caccavale | Mar 1998 | A |
5799324 | McNutt et al. | Aug 1998 | A |
5802561 | Fava et al. | Sep 1998 | A |
5892937 | Caccavale | Apr 1999 | A |
6175900 | Forin et al. | Jan 2001 | B1 |
6490578 | Burkhard | Dec 2002 | B1 |
6523102 | Dye et al. | Feb 2003 | B1 |
6553511 | DeKoning | Apr 2003 | B1 |
6606629 | DeKoning | Aug 2003 | B1 |
6651153 | Orfali | Nov 2003 | B1 |
7177850 | Argenton et al. | Feb 2007 | B2 |
7257684 | Sinha et al. | Aug 2007 | B1 |
8219724 | Caruso et al. | Jul 2012 | B1 |
8572736 | Lin | Oct 2013 | B2 |
8631472 | Martin et al. | Jan 2014 | B1 |
8775741 | de la Iglesia | Jul 2014 | B1 |
9256272 | Hasegawa et al. | Feb 2016 | B2 |
9501420 | Susarla et al. | Nov 2016 | B2 |
9632932 | Sutardja et al. | Apr 2017 | B1 |
9798754 | Shilane et al. | Oct 2017 | B1 |
20020091965 | Moshayedi | Jul 2002 | A1 |
20040148471 | Wallin et al. | Jul 2004 | A1 |
20040260883 | Wallin et al. | Dec 2004 | A1 |
20050278486 | Trika et al. | Dec 2005 | A1 |
20070006013 | Moshayedi et al. | Jan 2007 | A1 |
20070260811 | Merry et al. | Nov 2007 | A1 |
20090204853 | Diggs et al. | Aug 2009 | A1 |
20090210620 | Jibbe et al. | Aug 2009 | A1 |
20090228646 | Edwards et al. | Sep 2009 | A1 |
20100070703 | Sarkar | Mar 2010 | A1 |
20100082879 | McKean | Apr 2010 | A1 |
20100088459 | Arya et al. | Apr 2010 | A1 |
20100100664 | Shimozono | Apr 2010 | A1 |
20100122200 | Merry et al. | May 2010 | A1 |
20100235670 | Keller et al. | Sep 2010 | A1 |
20100250842 | Deshpande et al. | Sep 2010 | A1 |
20100299547 | Saika | Nov 2010 | A1 |
20110029686 | Sethi et al. | Feb 2011 | A1 |
20110087833 | Jones | Apr 2011 | A1 |
20110173378 | Filor et al. | Jul 2011 | A1 |
20110238922 | Hooker et al. | Sep 2011 | A1 |
20120072698 | Unesaki et al. | Mar 2012 | A1 |
20120185647 | Dawkins | Jul 2012 | A1 |
20120221774 | Atkisson et al. | Aug 2012 | A1 |
20130038961 | Song | Feb 2013 | A1 |
20130122856 | Kalmbach et al. | May 2013 | A1 |
20130145223 | Okada et al. | Jun 2013 | A1 |
20130185511 | Sassone et al. | Jul 2013 | A1 |
20130285835 | Kim et al. | Oct 2013 | A1 |
20130318603 | Merza | Nov 2013 | A1 |
20140050002 | Sun | Feb 2014 | A1 |
20140052942 | Satou | Feb 2014 | A1 |
20140089558 | Baderdinni | Mar 2014 | A1 |
20140095547 | Guo et al. | Apr 2014 | A1 |
20140129758 | Okada et al. | May 2014 | A1 |
20140143505 | Sim et al. | May 2014 | A1 |
20140201442 | Rajasekaran et al. | Jul 2014 | A1 |
20140325166 | Iyigun et al. | Oct 2014 | A1 |
20150026403 | Ish et al. | Jan 2015 | A1 |
20150095567 | Noda | Apr 2015 | A1 |
20150206558 | Ni et al. | Jul 2015 | A1 |
20150278127 | Takakura | Oct 2015 | A1 |
20150370715 | Samanta et al. | Dec 2015 | A1 |
20160004459 | Oohira | Jan 2016 | A1 |
20160011782 | Kurotsuchi et al. | Jan 2016 | A1 |
20160170639 | Velayudhan | Jun 2016 | A1 |
20160276015 | Bains et al. | Sep 2016 | A1 |
Entry |
---|
Co-pending U.S. Appl. No. 15/145,084, filed May 3, 2016. |
Co-pending U.S. Appl. No. 15/145,099, filed May 3, 2016. |
Co-pending U.S. Appl. No. 15/145,111, filed May 3, 2016. |
Co-pending U.S. Appl. No. 15/145,874, filed May 4, 2016. |
Co-pending U.S. Appl. No. 15/145,878, filed May 4, 2016. |
Number | Date | Country | |
---|---|---|---|
62158044 | May 2015 | US |