Transmitting digital data over wireless connections can sometimes include transmitting data that has been corrupted in some way. Such corruption can come in the form of or be caused by noise in the link or channel, by interference from other transmissions, or by other factors. This problem can be exacerbated in systems that transmit data at high data rates. To deal with corruption issues, some transmission systems employ hybrid automatic repeat request (ARQ) or H-ARQ schemes. Such schemes provide an opportunity for data that has been corrupted to be retransmitted when such corruption has been detected by a receiver.
In H-ARQ schemes, a receiver that has received corrupted packets has an opportunity to receive a retransmission of the packets that have been corrupted. Once the retransmitted packets have been received, the receiver can combine the newly-received packets with the previously corrupted packets in an attempt to decode the packets to find an accurate representation of those packets. Thus, coded bits corresponding to a corrupted packet are stored and combined with coded bits from a subsequently received corresponding packet in an attempt to increase the likelihood that the packet can be correctly decoded.
Use of H-ARQ schemes can provide signal sensitivity gain through this combination mechanism. This can, in turn, enhance a system's throughput in a multi-cell environment.
This Summary is provided to introduce subject matter that is further described below in the Detailed Description and Drawings. Accordingly, the Summary should not be considered to describe essential features nor used to limit the scope of the claimed subject matter.
In one or more embodiments, a decoder comprises error checking logic to ascertain whether one or more transmitted packets have been corrupted. A buffer is configured to store state information associated with packets that are received by the decoder. Decoding logic is operatively associated with the error checking logic and the buffer. The decoding logic is configured to receive a packet in an hybrid automatic repeat request (H-ARQ) mode and, for a retransmitted packet, the decoding logic reads buffered state information, buffered in the buffer and associated with a previously-transmitted packet, and uses the buffered state information to attempt to decode the retransmitted packet.
In accordance with another embodiment, a method comprises receiving a packet transmitted in an hybrid automatic repeat request (H-ARQ) mode. For a retransmitted packet, the method reads buffered state information associated with a previously-transmitted packet and uses the buffered state information to attempt to decode the retransmitted packet.
The same numbers are used throughout the drawings to reference like features.
Overview
In the various embodiments, decoders, methods, systems and devices exploit state information associated with transmitted packets to facilitate decoding operations. Specifically, in at least some embodiments, packets are received by a receiver. If the packet is unable to be decoded because of corruption, state information associated with that packet is buffered at the receiver and used for subsequent decoding. A retransmitted packet is then received, checked for corruption and, if not corrupted, is decoded leveraging the previously-buffered state information associated with the corrupted packet. If retransmitted packets are corrupted, this process can be repeated.
For example, in at least some embodiments, for a soft decision iterative tail biting (non-zero padding encoder) decoder, its starting decoding state is unknown at the decoder side. Due to this unknown starting state information at the decoder side, the decoding process starts with the same probability for all the trellis nodes (states) in the normal mode operation. However, in the H-ARQ operation, previously received packet's iterated forward and backward state probability can be exploited for determining the starting trellis state and efficient reverse metric calculation at the subsequent packet operation. For example, starting state can be determined by selecting the highest probability state and reverse metric calculations can be employed by using the buffered state probability information. For the soft decision iterative decoder, one iteration process is comprised of forward and backward metric value (state likelihood) calculation.
As a result, by using the previously iterated and merged likelihood state probability in the H-ARQ mode, iteration correction performance is improved and debasement can be reduced which requires less iteration operations (throughput gain achievement through the HW resource saving) with improved decoding performance. The trellis node state number is defined by the encoder's constituent memory size.
As noted above, various embodiments are employed in connection with systems that use the hybrid automatic repeat request (H-ARQ) transmission mode in compliance with the Institute of Electrical and Electronics Engineers (IEEE) Standard 802.16-2004, IEEE Standard 802.16e-2005, and IEEE Standard 802.16 Cor2/D4-2007.
In the discussion that follows, a section entitled “Operating Environment” is provided and describes one example operating environment in which one or more embodiments can be employed. It is to be appreciated and understood that this environment is provided for context and is not to be used to limit application of the claimed subject matter to one specific environment. Rather, the inventive principles can be employed in other environments in accord with the spirit and scope of the claimed subject matter. Following this, a section entitled “Example Transmitter” is provided followed by a section entitled “Example Receiver” each of which respectively describes a transmitter and a receiver that can be used in accordance with one or more embodiments. Following these sections, a section entitled “Implementation Example” describes but one implementation in accordance with one or more embodiments. A section entitled “Example Method” follows and describes an example method in accordance with one or more embodiments. Lastly, a section entitled “Example Receiver Environments” is provided and describes some examples of receiver environments that can utilize the principles described herein.
Operating Environment
Communication system 100 includes, in this example, one or more base stations 102 and multiple subscriber stations 104, 106, and 108. Base stations can be connected to an IP network 110 via a gateway (not shown). The IP network can include various special and general purpose servers shown generally at 112. Elements within both the base stations and subscriber stations are configured with processors, memories, instruction sets and the like, that implement the functionality described in this document. Typically, communication that takes place within the system goes through base station 102. The base station is responsible for allocating bandwidth and can typically handle thousands of subscriber stations. In at least some embodiments, base station 102 is implemented as a WIMAX tower, which is similar in concept to a cell-phone tower. A WIMAX tower can provide coverage to a very large area, e.g., 8000 square kilometers.
Subscriber stations can include, by way of example and not limitation, subscriber stations such as those that are associated with residential and business customers. A subscriber station includes a receiver, such as a WIMAX receiver. The receiver and associated antenna(s) can be embodied in a small box or PCMCIA card, or can be embodied in some type of computing device such as a laptop computer, notebook computer, desktop computer, mobile device and/or a handheld computing device to name just a few. Of course, the receiver can be embodied in other types of computing devices without departing from the spirit and scope of the claimed subject matter.
Communications system 100 includes two types of communication links. A downlink is used for communication from the base station 102 to the subscriber stations 104, 106, and 108. An uplink is used for communication from the subscriber stations to base station 102.
Communication system 100 utilizes the base station 102 to communicate packets to the various subscriber stations. In one or more embodiments, packets represent either headers or payloads with or without CRC or combinations of those. More specifically, when individual subscriber stations boot up, each can register with the base station. The base station can serve to exchange messages with the subscriber stations located in a corresponding service cell, authenticate and register subscriber stations via one or more servers in the IP network, transmit service request messages from the subscriber stations to the IP network, and transmit packets from the IP network to the subscriber stations, and so on.
As noted above, due to various circumstances, packets communicated from the base station can sometimes become corrupted. In accordance with the embodiments described below, state information associated with the packets can be utilized to mitigate and/or cure packet corruption.
Example Transmitter
Buffer 202 includes storage media such as random access memory for storing data that is to be transmitted to a receiver, such as one or more subscriber stations (not shown). Buffer 202 is coupled with encoder 204, which is configured to encode the buffer data in any suitable encoding scheme. In one or more embodiments, encoder 204 is implemented as a Convolutional Turbo Code (CTC) encoder. Other encoders can be used without departing from the spirit and scope of the claimed subject matter. Encoder 204 is responsible for generating both normal mode packets and H-ARQ modes packets that, in this embodiment, are compliant with the IEEE 802.16d/e protocol.
Encoder 204 is communicatively coupled with packet generator 206. The packet generator includes circuitry and logic that constructs data packets that are to be transmitted to various receivers. The packet generator is coupled with transceiver 208, which is configured to transmit the data packets to the various receivers, as will be understood by the skilled artisan.
Example Receiver
In the illustrated and described embodiment, transceiver 302 is one that operates in compliance with one or more of the IEEE 802.16 standards, such as the IEEE 802.16d/e standards.
Transceiver 302 is configured to receive transmitted packets from a transmitter, such as that shown in
Logic unit 306 is configured with a microprocessor controller and logic to facilitate decoding operations. Decoder 304 outputs data that has been decoded in accordance with the principles described below.
In operation, transceiver 302 receives transmissions in both normal and H-ARQ transmission modes, from a transmitter and provides transmitted data, such as data packets, to decoder 304 for decoding. In H-ARQ transmission mode, decoder 304 first attempts to decode a received packet. If the packet is not corrupted and decoding is successful, an acknowledgment message or ACK is sent by transceiver 302 to the transmitter. If, on the other hand, decoding fails for some reason, a “not acknowledged” message or NAK is sent back to the transmitter which, in this instance, is the base station. In response, the transmitter will send another H-ARQ transmission. The transmitter may continue to send H-ARQ transmissions until receiver 300 successfully decodes a packet and sends an acknowledgment.
In accordance with the described embodiment, decoder 304 is configured to exploit a retransmission packet's state information to facilitate decoding operation in the H-ARQ transmission mode. But one example of how this can be done is provided just below.
Implementation Example
The decoder 402 can be implemented using any suitable hardware, software, firmware, or combination thereof. Decoding logic 404 is configured to receive data packets and attempt to decode the packets using decoding techniques described below. Decoding logic 404 utilizes error checking logic 406 to ascertain whether a particular packet or packets has or have been corrupted. Any suitable variety of error checking techniques may be used. In at least some embodiments, error checking logic 406 includes cyclic redundancy check (CRC) logic which uses CRC data included with a packet to ascertain whether the packet is corrupted.
If a packet has not been corrupted, normal decoding operations with respect to the packet take place. On the other hand, in an event a packet has been corrupted, decoding logic 404 utilizes buffer 408 to store state information associated with the packet in state storage 410. Subsequently received packets associated with the corrupted packet are then received and the state information that is stored in state storage 410 is utilized in iterative attempts to decode the packet.
In conventional CTC decoder operations, the decoder does not know starting state values associated with individual packets. Consequently, the decoding process in the conventional CTC decoders starts by using the same probability for individual trellis states. For example, in current CTC operations, there are eight trellis states. Each state is assigned a ⅛ probability because the starting state values are not known.
In the illustrated and described embodiment, however, previously calculated and buffered state information can be exploited for newly received packets in the decoding operation. Specifically, previously calculated, iterated state information at a previous frame may be stored in a buffer, such as buffer 408. This state information may be used as a starting state probability for a next received packet in the H-ARQ transmission mode. As such, reliable decoder correction performance per iteration and better decoding performance may be achieved. This is particularly the case for circumstances in which short H-ARQ packets are transmitted, as such will provide less debased decoding performance in fading channels and performance benefits for the same iteration number.
Example Method
The method determines, at 500, whether the H-ARQ transmission mode is on responsive to receiving a CTC decoder input sequence. The input sequence can comprise one or more packets. If the H-ARQ transmission mode is not on, then equal state probabilities are assigned, at 502, to a packet and the sequence is decoded at 504. Decoding can take place using a variety of decoding techniques.
If, on the other hand, the H-ARQ transmission mode is determined to be on, then a determination is made at 506 as to whether a packet is a retransmitted packet. If the packet is not a retransmitted packet, then equal state probabilities are assigned to the packet at 508. Next, a check is performed at 510 to ascertain whether the packet has been corrupted. In the illustrated and described embodiment, this check is performed as a cyclic redundancy check or CRC. If the packet has not been corrupted, the sequence is decoded at 512. If, on the other hand, the packet has been corrupted as by failing the cyclic redundancy check, state information such as forward/reverse state information is written into a buffer at 514.
Returning to 506, if the packet is determined to be a retransmitted packet, buffered state information is read from the buffer at 516 and a check is performed at 518 to ascertain whether the packet has been corrupted. If the packet has not been corrupted, then the sequence is decoded at 520 using the buffered state information. Recall that the buffered state information that is utilized is that of a previously-transmitted corrupt packet. If, on the other hand, the received packet has been corrupted as by failing the CRC check at 518, a determination is made as to whether a maximum retransmission number has been reached at 522.
If at 522 the maximum retransmission number has not been reached, then forward/reverse state information is written to the buffer at 524 and the method can return to 506. If, on the other hand, the maximum retransmission number has been reached at 522, the packet is ignored and the buffer is cleared at 526.
Example Receiver Environments
Referring now to
Referring to
HDD 600 may communicate with a host device (not shown) such as a computer, mobile computing devices such as personal digital assistants, cellular phones, media or MP3 players and the like, and/or other devices via one or more wired or wireless communication links 608. HDD 600 may be connected to memory 609, such as random access memory (RAM), a low-latency nonvolatile memory such as flash memory, read only memory (ROM) and/or other suitable electronic data storage.
Referring now to
DVD drive 700 may communicate with an output device (not shown) such as a computer, television, or other device via one or more wired or wireless communication links 710. DVD drive 700 includes mass data storage 704 that stores data in a nonvolatile manner. Mass data storage 704 may include a hard disk drive (HDD) such as that shown in
Referring now to
HDTV 800 may include mass data storage 806, which stores data in a nonvolatile manner such as optical and/or magnetic storage devices. At least one magnetic storage device may have the configuration shown in
Referring now to
A receiver can be embodied in other control systems 908 of vehicle 900. Control system 908 may likewise receive signals from input sensors 910 and/or output control signals 912 to one or more output devices. In some implementations, control system 908 may be part of an anti-lock braking system (ABS), a navigation system, a telematics system, a vehicle telematics system, a lane departure system, an adaptive cruise control system, a vehicle entertainment system such as a stereo, DVD, compact disc, and the like. Still other implementations are contemplated.
Powertrain control system 902 may include mass data storage 914 that stores data in a nonvolatile manner. Mass data storage 914 may include optical and/or magnetic storage devices for example hard disk drives HDD and/or DVDs. At least one magnetic storage device may have the configuration shown in
Referring now to
Cellular phone 1000 may include mass data storage 1014, which stores data in a nonvolatile manner such as optical and/or magnetic storage devices for example hard disk drives HDD and/or DVDs. At least one magnetic storage device may have the configuration shown in
Referring now to
Set top box 1100 may include a mass data storage 1106 that stores data in a nonvolatile manner. Mass data storage 1106 may include optical and/or magnetic storage devices for example hard disk drives HDD and/or DVDs. At least one magnetic storage device may have the configuration shown in
Referring now to
Media player 1200 may include mass data storage 1210 that stores data such as compressed audio and/or video content in a nonvolatile manner. In some implementations, the compressed audio files include files that are compliant with MP3 format or other suitable compressed audio and/or video formats. The mass data storage may include optical and/or magnetic storage devices for example hard disk drives HDD and/or DVDs. At least one magnetic storage device may have the configuration shown in
Referring to
VoIP phone 1300 may include mass data storage 1316 that stores data in a nonvolatile manner such as optical and/or magnetic storage devices, for example hard disk drives HDD and/or DVDs. At least one magnetic storage device may have the configuration shown in
In the various embodiments, decoders, methods, systems and devices exploit state information associated with transmitted packets to facilitate decoding operations. Specifically, in at least some embodiments, packets are received by a receiver. If the packet is unable to be decoded because of corruption, state information associated with that packet is buffered at the receiver and used for subsequent decoding. A retransmitted packet is then received, checked for corruption and, if not corrupted, is decoded leveraging the previously-buffered state information associated with the corrupted packet. In an event that one or more retransmitted packets are corrupted, this process can be repeated a number of times. Using the above-described approach, correction performance per iteration can be enhanced and debasement can be stabilized within several iterations. As a result, additional performance gain can be achieved.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims
This present disclosure is a continuation of U.S. patent application Ser. No. 11/945,151, filed on Nov. 26, 2007, which claims priority under 35 U.S.C. §119(e) to U.S. Provisional Application No. 60/867,317, filed on Nov. 27, 2006, the disclosures of which are both incorporated by reference herein in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4449190 | Flanagan et al. | May 1984 | A |
5623474 | Oshio et al. | Apr 1997 | A |
5778029 | Kaufmann | Jul 1998 | A |
6031628 | Jacob et al. | Feb 2000 | A |
6222889 | Lee | Apr 2001 | B1 |
6255906 | Eidson et al. | Jul 2001 | B1 |
6266517 | Fitzpatrick et al. | Jul 2001 | B1 |
6275685 | Wessel et al. | Aug 2001 | B1 |
6639944 | De Haan et al. | Oct 2003 | B1 |
6667659 | Stengel et al. | Dec 2003 | B2 |
6731406 | Ganapathy et al. | May 2004 | B1 |
6829313 | Xu | Dec 2004 | B1 |
6912249 | Haartsen | Jun 2005 | B2 |
6950469 | Karczewicz et al. | Sep 2005 | B2 |
6983026 | Pinckley et al. | Jan 2006 | B2 |
7023941 | Rey et al. | Apr 2006 | B1 |
7180901 | Chang et al. | Feb 2007 | B2 |
7200799 | Wang et al. | Apr 2007 | B2 |
7213194 | Nieminen | May 2007 | B2 |
7262722 | Jahanghir et al. | Aug 2007 | B1 |
7360141 | Michel et al. | Apr 2008 | B2 |
7362818 | Smith et al. | Apr 2008 | B1 |
7418057 | Shako et al. | Aug 2008 | B2 |
7447274 | Shako et al. | Nov 2008 | B2 |
7450641 | Sun et al. | Nov 2008 | B2 |
7466762 | Shako et al. | Dec 2008 | B2 |
7599431 | Anderson et al. | Oct 2009 | B1 |
7675886 | Agrawal et al. | Mar 2010 | B2 |
7702020 | Gallant et al. | Apr 2010 | B2 |
7706475 | Kopikare et al. | Apr 2010 | B1 |
7782973 | Kim et al. | Aug 2010 | B2 |
7822147 | Huang et al. | Oct 2010 | B2 |
7965710 | Choi et al. | Jun 2011 | B1 |
8014737 | Pratt et al. | Sep 2011 | B2 |
8160150 | Moore | Apr 2012 | B2 |
8345533 | Zhao | Jan 2013 | B1 |
8411709 | Choi et al. | Apr 2013 | B1 |
8902726 | Zhao et al. | Dec 2014 | B1 |
20020053058 | Lee et al. | May 2002 | A1 |
20020067773 | Jackson et al. | Jun 2002 | A1 |
20020072346 | Kato et al. | Jun 2002 | A1 |
20030098804 | Ekstrand et al. | May 2003 | A1 |
20030126551 | Mantha et al. | Jul 2003 | A1 |
20030164736 | Stengel et al. | Sep 2003 | A1 |
20030179831 | Gupta et al. | Sep 2003 | A1 |
20040090909 | Khlat | May 2004 | A1 |
20040141525 | Bhushan et al. | Jul 2004 | A1 |
20040148546 | Meyer et al. | Jul 2004 | A1 |
20040223473 | Ha et al. | Nov 2004 | A1 |
20040232984 | Meade et al. | Nov 2004 | A1 |
20050018519 | Nii | Jan 2005 | A1 |
20050213661 | Xiang et al. | Sep 2005 | A1 |
20050231292 | Akahori et al. | Oct 2005 | A1 |
20050243946 | Chung et al. | Nov 2005 | A1 |
20050276266 | Terry | Dec 2005 | A1 |
20060084389 | Beale et al. | Apr 2006 | A1 |
20060174236 | Stein et al. | Aug 2006 | A1 |
20060227895 | Booth et al. | Oct 2006 | A1 |
20070016838 | Mielczarek et al. | Jan 2007 | A1 |
20070025448 | Cha et al. | Feb 2007 | A1 |
20070092013 | Cahn et al. | Apr 2007 | A1 |
20070118791 | Hepler et al. | May 2007 | A1 |
20070135065 | Leffel et al. | Jun 2007 | A1 |
20070241812 | Yang et al. | Oct 2007 | A1 |
20080031376 | Ban | Feb 2008 | A1 |
20080049709 | Pan et al. | Feb 2008 | A1 |
20080074289 | Sauder et al. | Mar 2008 | A1 |
20080090583 | Wang et al. | Apr 2008 | A1 |
20080094280 | Fenton | Apr 2008 | A1 |
20080219373 | Zhang et al. | Sep 2008 | A1 |
20080270344 | Yurick et al. | Oct 2008 | A1 |
20080279322 | Franovici et al. | Nov 2008 | A1 |
20090097533 | Lakkis | Apr 2009 | A1 |
20090103622 | Tripathi et al. | Apr 2009 | A1 |
20090181622 | Hardacker | Jul 2009 | A1 |
20090257526 | Wang et al. | Oct 2009 | A1 |
20090310704 | Jethanandani et al. | Dec 2009 | A1 |
20100035554 | Ba et al. | Feb 2010 | A1 |
20100077275 | Yu et al. | Mar 2010 | A1 |
Entry |
---|
“Advisory Action”, U.S. Appl. No. 11/945,183, Nov. 9, 2010, 2 pages. |
“Advisory Action”, U.S. Appl. No. 11/945,151, Nov. 22, 2010, 3 pages. |
Zhang, et al., “U.S. Appl. No. 12/098,222”, filed Apr. 4, 2008, 78 pages. |
“Final Office Action”, U.S. Appl. No. 12/510,716, Jun. 28, 2012, 10 pages. |
“Final Office Action”, U.S. Appl. No. 12/397,057, Apr. 27, 2012, 11 pages. |
“Final Office Action”, U.S. Appl. No. 11/945,183, Sep. 13, 2010, 12 pages. |
“Final Office Action”, U.S. Appl. No. 12/574,879, Nov. 20, 2012, 13 pages. |
“Final Office Action”, U.S. Appl. No. 12/269,744, Sep. 19, 2012, 13 pages. |
“Final Office Action”, U.S. Appl. No. 11/945,151, Aug. 26, 2011, 20 pages. |
“Final Office Action”, U.S. Appl. No. 11/945,151, Sep. 10, 2010, 27 pages. |
“Final Office Action”, U.S. Appl. No. 12/511,606, Sep. 13, 2012, 8 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/397,057, Aug. 1, 2012, 10 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/269,744, Aug. 18, 2011, 10 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/574,879, Jun. 4, 2012, 11 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/767,922, Nov. 2, 2012, 12 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/269,744, Feb. 16, 2012, 14 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/540,753, Apr. 5, 2012, 14 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/253,078, Jun. 8, 2012, 18 pages. |
“Non-Final Office Action”, U.S. Appl. No. 11/945,151, Apr. 26, 2012, 20 pages. |
“Non-Final Office Action”, U.S. Appl. No. 11/945,151, Mar. 25, 2010, 22 pages. |
“Non-Final Office Action”, U.S. Appl. No. 11/945,151, Mar. 28, 2011, 22 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/511,606, Jan. 4, 2012, 6 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/511,629, Apr. 13, 2012, 6 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/397,057, Nov. 9, 2011, 7 pages. |
“Non-Final Office Action”, U.S. Appl. No. 12/510,716, Nov. 8, 2011, 8 pages. |
“Non-Final Office Action”, U.S. Appl. No. 11/945,183, Apr. 5, 2010, 8 pages. |
“Notice of Allowance”, U.S. Appl. No. 12/540,753, Aug. 27, 2012, 5 pages. |
“Notice of Allowance”, U.S. Appl. No. 11/945,183, Feb. 23, 2011, 7 pages. |
“Notice of Allowance”, U.S. Appl. No. 11/945,151, Nov. 23, 2012, 8 pages. |
“Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems; Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands”, IEEE Std 802.16e, Feb. 28, 2006, 822 pages. |
“Part 16: Air Interface for Fixed Broadband Wireless Access Systems”, IEEE Std. 802.16, Oct. 1, 2004, 857 pages. |
“Restriction Requirement”, U.S. Appl. No. 12/269,744, Jun. 22, 2011, 6 pages. |
“Supplemental Notice of Allowance”, U.S. Appl. No. 11/945,151, Mar. 6, 2013, 2 pages. |
Mujtaba, “TGn Sync Proposal Technical Specification”, IEEE 802.11-04 / Wireless LANs, May 2005, pp. 1-131. |
“Non-Final Office Action”, U.S. Appl. No. 13/727,331, Apr. 3, 2014, 5 pages. |
“Notice of Allowance”, U.S. Appl. No. 13/727,331, Jul. 18, 2014, 4 pages. |
“Supplemental Notice of Allowance”, U.S. Appl. No. 13/727,331, Nov. 5, 2014, 4 pages. |
Number | Date | Country | |
---|---|---|---|
60867317 | Nov 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11945151 | Nov 2007 | US |
Child | 13836896 | US |