Field
The present disclosure relates to network management. More specifically, the present disclosure relates to a method and system for monitoring the health of a virtual extensible local area network (LAN), or VXLAN, tunnel based on a keepalive mechanism.
Related Art
The exponential growth of the Internet has made it a popular delivery medium for multimedia applications, such as video on demand and television. Such applications have brought with them an increasing demand for bandwidth. As a result, equipment vendors race to build larger and faster switches with versatile capabilities, such as service insertion and provisioning, to move more traffic efficiently. However, the size of a switch cannot grow infinitely. It is limited by physical space, power consumption, and design complexity, to name a few factors. Furthermore, switches with higher capability are usually more complex and expensive. More importantly, because an overly large and complex system often does not provide economy of scale, simply increasing the size and capability of a switch may prove economically unviable due to the increased per-port cost.
A flexible way to improve the scalability of a switch system is to build a fabric switch. A fabric switch is a collection of individual member switches. These member switches form a single, logical switch that can have an arbitrary number of ports and an arbitrary topology. As demands grow, customers can adopt a “pay as you grow” approach to scale up the capacity of the fabric switch.
Meanwhile, layer-2 (e.g., Ethernet) switching technologies continue to evolve. More routing-like functionalities, which have traditionally been the characteristics of layer-3 (e.g., Internet Protocol or IP) networks, are migrating into layer-2. Notably, the recent development of the Transparent Interconnection of Lots of Links (TRILL) protocol allows Ethernet switches to function more like routing devices. TRILL overcomes the inherent inefficiency of the conventional spanning tree protocol, which forces layer-2 switches to be coupled in a logical spanning-tree topology to avoid looping. TRILL allows routing bridges (RBridges) to be coupled in an arbitrary topology without the risk of looping by implementing routing functions in switches and including a hop count in the TRILL header.
As Internet traffic is becoming more diverse, virtual computing in a network is becoming progressively more important as a value proposition for network architects. For example, virtual extensible local area network (VXLAN) is a network virtualization technology which facilitates an overlay encapsulation protocol, e.g., by providing a layer-3 encapsulation of a layer-2 frame through a VXLAN tunnel. However, because VXLAN tunnels are stateless, a source VXLAN tunnel endpoint (VTEP) typically does not maintain information related to the availability of a destination VTEP. If the destination VTEP is unreachable, the source VTEP may remain unaware and may not be able to bring the tunnel down. This can result in inefficient path utilization. Thus, while overlay tunneling brings many desirable features to a network, some issues remain unsolved in monitoring the health of a VXLAN tunnel.
One embodiment of the present invention provides a switch that is a member of a fabric switch. The switch includes a keepalive response module that identifies a keepalive response packet that does not correspond to any keepalive packet previously transmitted by the switch. The switch also includes a switch identifier extraction module that extracts a switch identifier from a payload of the keepalive response packet, where the switch identifier corresponds to another member switch in the fabric switch. The switch further includes a forwarding module that constructs a packet that includes the payload and is destined to the other member switch.
In a variation on this embodiment, the first protocol is based on a virtual extensible local area network (VXLAN).
In a further variation, the forwarding module encapsulates the payload based on a second protocol, determines an output port for the encapsulated payload based on the extracted switch identifier, and transmits the encapsulated payload via the determined output port.
In a further variation, the switch and the other member switch are each a virtual routing Bridge (RBridge) that belongs to the fabric switch. The switch identifier for an RBridge is an RBridge identifier associated with a respective switch. The second protocol is Transparent Interconnection of Lots of Links (TRILL).
In a further variation on this embodiment, the switch includes a fabric switch management module that determines a same reserved address for the switch and any member switch in the fabric switch.
In a further variation, the keepalive response packet includes a header and the payload. The header includes a source address corresponding to a switch identifier of a remote switch and a destination address corresponding to a reserved address. The payload includes a source address corresponding to the reserved address, a destination address corresponding to a switch identifier of the switch, and information relating to a tunnel between the switch and the remote switch.
In a further variation, the header further includes a network identifier that indicates a keepalive message and is set to one of: a reserved value; a value of 0; a value configured by a user; and a value that is provisioned between the switch and the remote switch.
In a further variation, the source address included in the header is a media access control (MAC) address that includes the corresponding switch identifier in an encoded format, and the destination address included in the payload is a MAC address that includes the corresponding switch identifier in an encoded format.
In the figures, like reference numerals refer to the same figure elements.
The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the claims.
In embodiments of the present invention, the problem of monitoring the health of a VXLAN tunnel is solved by sending keepalive packets from a source VXLAN tunnel endpoint (VTEP) to a destination VTEP and modifying the state of the VXLAN tunnel based on received keepalive response packets. VXLAN tunnels are typically stateless. Hence, a source VTEP may not maintain state information regarding the availability of a destination VTEP. If the destination VTEP is not reachable, the source VTEP may not be aware of the unavailability, and hence, may not bring down the tunnel. This can lead to inefficient path utilization. One solution is to use Internet Control Message Protocol (ICMP) messages or the Packet to Internet Groper (PING) facility. However, these packets are typically blocked by intermediate routers and firewalls. If a VXLAN tunnel spans a wide area network (WAN) (e.g., across an IP network), these packets may get dropped. As a result, a source VTEP may bring down a tunnel even when the destination VTEP is reachable. Another solution is to use a standard VXLAN keepalive packet. However, if one VTEP supports the keepalive mechanism but the other does not, this can lead to interoperability issues. Furthermore, the source VTEP can be a fabric switch, which is a large-scale logical switch that includes a number of physical member switches. A member switch that sends a VXLAN keepalive packet may not be the same member switch that receives a corresponding keepalive response.
To solve this problem, embodiments of the present invention provide a system that allows a fabric switch, via an originating member switch as the source VTEP, to periodically create and send keepalive packets where the keepalive response packet is included (e.g., encapsulated) in the keepalive packet. This keepalive response packet is destined to the source VTEP. The destination VTEP receives and processes (e.g., decapsulates) the keepalive packet as a standard VXLAN frame. The destination VTEP determines that the keepalive response packet is destined to the source VTEP and sends the keepalive response packet back to the fabric switch. Because any member switch in the fabric switch can receive the keepalive response packet, the receiving member switch performs intra-fabric forwarding as needed to ensure that the keepalive response packet is received by the originating member switch. If the originating member switch does not receive the keepalive response packet, the originating member switch determines that the destination VTEP is not reachable and acts accordingly (e.g., sets the VXLAN tunnel state to down.
Specifically, the originating member switch of the fabric switch creates a keepalive packet that comprises an outer VXLAN header, an inner VXLAN header, and a payload. The payload includes the VXLAN tunnel information and a switch identifier of the originating member switch. The inner VXLAN header and the payload constitute the keepalive response packet. The originating member switch sends the keepalive packet to the destination VTEP, which receives the keepalive packet, decapsulates the outer VXLAN header, and inspects the inner VXLAN header. The destination VTEP can be a switch, a fabric switch, or any layer-3 or layer-3 device capable of processing a VXLAN data frame. Based on the destination addresses included in the inner VXLAN header, the destination VTEP sends the keepalive response packet (comprised of the inner VXLAN header and the payload) back to the fabric switch. Because the keepalive packet is constructed to include the keepalive response packet inside (e.g., the inner VXLAN header and the payload), the destination VTEP can process the keepalive packet like a standard VXLAN data frame and perform a standard VXLAN decapsulation. Thus, the destination VTEP does not need to support any specific VXLAN keepalive mechanisms.
When the fabric switch receives the keepalive response packet from the destination VTEP, a member switch other than the originating member switch may receive the keepalive response packet. The receiving member switch then determines whether it is the originating switch. If not, the receiving member switch forwards the keepalive response packet to the originating member switch. When the originating member switch receives the keepalive response packet, it tracks the received keepalive response based on a previously initiated timer and a drop counter. For example, upon sending the keepalive packet, the originating member switch can initiate a timer with a predetermined expiration time. If the timer expires before a corresponding keepalive response packet is received, the system can increment a drop counter that has a predetermined threshold. If the drop counter exceeds the threshold, the system can set the tunnel to a down state. If a keepalive response packet is received before the expiration of the timer, the system can reset the drop counter and, if the tunnel is in a down state, set the tunnel to an up state.
In some embodiments, the source VTEP does not belong to a fabric switch and is simply a standalone tunnel endpoint. In such a non-fabric scenario, the keepalive packet comprises an outer VXLAN header and an inner VXLAN header, and may not contain a payload with tunnel information. Instead, the keepalive mechanism relies on a virtual network identifier (VNI) in the VXLAN headers to indicate that the packet is a keepalive response packet for a VXLAN tunnel.
In some embodiments, the fabric switch is an Ethernet fabric switch in which any number of switches coupled in an arbitrary topology may logically operate as a single switch. Any new switch may join or leave the fabric switch in “plug-and-play” mode without any manual configuration. A fabric switch appears as a single logical switch to an external device. In some further embodiments, the fabric switch is a Transparent Interconnection of Lots of Links (TRILL) network and a respective member of switch of the fabric switch is a TRILL routing bridge (RBridge). In some embodiments, the fabric switch is layer-3 (e.g., Internet Protocol or IP) network and a member switch is a layer-3 node (e.g., capable of routing based on a routing protocol).
Although the present disclosure is presented using examples based on the TRILL protocol, embodiments of the present invention are not limited to networks defined using TRILL, or a particular Open System Interconnection Reference Model (OSI reference model) layer. For example, embodiments of the present invention can also be applied to a multi-protocol label switching (MPLS) network. In this disclosure, the term “fabric switch” is used in a generic sense, and can refer to a network operating in any networking layer, sub-layer, or a combination of networking layers.
The term “end device” can refer to a device coupled to a fabric switch. An end device can be a host, a server, a conventional layer-2 switch, a layer-3 router, or any other type of device. Additionally, an end device can be coupled to other switches or hosts further away from a network. An end device can also be an aggregation point for a number of network devices to enter the network. The terms “device” and “machine” are used interchangeably.
The term “tunnel” refers to a data communication where one or more networking protocols are encapsulated using another networking protocol. Although the present disclosure is presented using examples based on a layer-3 encapsulation of a layer-2 protocol, “tunnel” should not be interpreted as limiting embodiments of the present invention to layer-2 and layer-3 protocols. A “tunnel” can be established for any networking layer, sub-layer, or a combination of networking layers.
The term “frame” refers to a group of bits that can be transported together across a network. “Frame” should not be interpreted as limiting embodiments of the present invention to layer-2 networks. “Frame” can be replaced by other terminologies referring to a group of bits, such as “packet,” “cell,” or “datagram.”
The term “switch” is used in a generic sense, and it can refer to any standalone or fabric switch operating in any network layer. “Switch” should not be interpreted as limiting embodiments of the present invention to layer-2 networks. Any device that can forward traffic to an external device or another switch can be referred to as a “switch.” Examples of a “switch” include, but are not limited to, a layer-2 switch, a layer-3 router, a TRILL RBridge, or a fabric switch comprising a plurality of similar or heterogeneous smaller physical switches.
The term “RBridge” refers to routing bridges, which are bridges implementing the TRILL protocol as described in Internet Engineering Task Force (IETF) Request for Comments (RFC) “Routing Bridges (RBridges): Base Protocol Specification,” available at http://tools.ietf.org/html/rfc6325, which is incorporated by reference herein. Embodiments of the present invention are not limited to application among RBridges. Other types of switches, routers, and forwarders can also be used.
The term “edge port” refers to a port in a fabric switch which exchanges data frames with an external device outside of the fabric switch. The term “inter-switch port” refers to a port which couples a member switch of a fabric switch with another member switch and is used for exchanging data frames between the member switches.
The term “switch identifier” refers to a group of bits that can be used to identify a switch. If the switch is an RBridge, the switch identifier can be an “RBridge identifier.” The TRILL standard uses “RBridge ID” to denote a 48-bit Intermediate-System-to-Intermediate-System (IS-IS) ID assigned to an RBridge, and “RBridge nickname” to denote a 16-bit value that serves as an abbreviation for the “RBridge ID.” In this disclosure, “switch identifier” is used as a generic term, is not limited to any bit format, and can refer to any format that can identify a switch. The term “RBridge identifier” is used in a generic sense, is not limited to any bit format, and can refer to “RBridge ID,” “RBridge nickname,” or any other format that can identify an RBridge.
The term “fabric switch” refers to a number of interconnected physical switches which form a single, scalable logical switch. In a fabric switch, any number of switches can be connected in an arbitrary topology, and the entire group of switches functions together as one single, logical switch. This feature makes it possible to use many smaller, inexpensive switches to construct a large fabric switch, which can be viewed as a single logical switch externally.
Network Architecture
Network 100 also includes a virtual tunnel 108 between fabric switch 110 and fabric switch 120 passing through a network 106. Network 106 can be a layer-3 network (e.g., an IP network). Network 106 can couple fabric switch 110 and/or 120 via a virtual link aggregation group (vLAG), as specified in U.S. Pat. No. 8,665,886, titled “Redundant Host Connection in a Routed Network,” which is incorporated by reference herein. Fabric switches 110 and 120 can each act as a virtual VXLAN tunnel endpoint (VTEP) in a VXLAN-based communication. A source VTEP can monitor the health of a tunnel by sending keepalive packets to (e.g., denoted by flow 140) and receiving keepalive responses from (e.g., denoted by flows 142 and 146) a destination VTEP.
Because member switches in fabric switch 110 can share the same virtual IP address, any member switch of fabric switch 110 can receive keepalive response packet 184. The receiving member switch (in this case, switch 112) decapsulates the inner VXLAN header and determines whether the local MAC address of switch 112 matches the destination MAC address included in the payload. If not, switch 112 encapsulates the payload with a fabric header to generate an intra-fabric keepalive response packet 188 and forward packet 188 to switch 111, which is the originating member switch, via flow 144. Examples of a fabric header include, but are not limited to, a TRILL header, an IP header, and an outer Ethernet header. Switch virtualization in a fabric switch and its associated operations, such as data frame forwarding, and fabric switch configurations in a virtual cluster fabric using a TRILL protocol are respectively described in U.S. Pat. No. 8,665,886, titled “Redundant Host Connection in a Routed Network,” and U.S. patent application Ser. No. 13/087,239, titled “Virtual Cluster Switching,” the disclosures of which are incorporated herein. In some embodiments, switches 111 and 112 are RBridges in a TRILL network 110 and RBridge 112 forwards intra-fabric keepalive response packet 188 to RBridge 111 by encapsulating keepalive response packet payload 192 in a TRILL header. In some embodiments, switches 111 and 112 are layer-3 nodes in a layer-3 network (e.g., an IP network) and switch 112 forwards intra-fabric keepalive response packet 188 to switch 111 by encapsulating keepalive response packet payload 192 in an IP header. Note that if the receiving member switch is the originating member switch, intra-fabric switch forwarding does not occur, as described below in relation to
Upon receiving intra-fabric keepalive response packet 188, switch 111 determines that it is the destination member switch, decapsulates the fabric header, and inspects the payload (e.g., keepalive response packet payload 192). Switch 111 then examines the destination MAC address included in the payload, determines that it matches local MAC address 116, and takes an action based on the VXLAN tunnel information included in the payload. For example, switch 111 can reset a drop counter and, if the tunnel is in a down state, sets the tunnel to an up state. The drop counter can have a predetermined threshold. Furthermore, switch 111 can initiate a timer with a predetermined expiration time when it sends keepalive packet 180. In monitoring the health of a VXLAN tunnel, switch 111 can use the drop counter and the timer in conjunction with the received keepalive response packets (e.g., keepalive response packet 184 and infra-fabric keepalive response packet 188) from switch 121 to determine whether to set VXLAN tunnel 108 to an up or a down state, as described below in relation to
The member switch that receives keepalive response packet 184 (in this case, switch 111) decapsulates the inner VXLAN header and, based on the switch identifier included in the payload, determines whether its local MAC address 116 matches the destination MAC address included in the payload. Since they match, switch 111 uses the VXLAN tunnel information included in the payload to take an action, as described above in relation to
Thus, the originating member switch of a fabric switch acts as the source VTEP, creates and sends keepalive packets, and can receive a keepalive response packet via two types of ports: 1) via an inter-switch port, an intra-fabric keepalive response packet 188, where keepalive response packet payload 192 is encapsulated with a fabric header, as described in relation to
Exemplary Format of a Keepalive Packet
Inner VXLAN header 240 includes an Ethernet header 242, an IP header 248, a UDP header 254, and a VXLAN header 256. Ethernet header 242 includes a source media access control (MAC) address 244 with a value set to the MAC address of the destination VTEP. Ethernet header 242 also includes a destination MAC address 246 with a value set to a preassigned and reserved MAC address, MAC-INNER, shared by all member switches in the fabric switch that includes the source VTEP. In some embodiments, source MAC address 244 is MAC address 126 of switch 121 and destination MAC address 246 is the reserved MAC (e.g., MAC-INNER). In some embodiments, member switches in both fabrics are programmed as a local MAC address (e.g., a MAC address assigned to the local switch).
IP header 248 can include a source IP address 250 with a value set to the IP address of the destination VTEP (e.g., virtual IP address 125 of fabric switch 120) and a destination IP address 252 with a value set to the IP address of the source VTEP (e.g., virtual IP address 115 of fabric switch 110). VXLAN header 256 includes a VXLAN network identifier (VNI) 258 with a value set to “VNI-RES,” as described in relation to VNI field 224 of outer VXLAN header 210.
Payload 260 (e.g., keepalive response packet payload 192 of
Sending a Keepalive Packet and Processing a Keepalive Response
The member switch then determines whether the destination MAC address of the Ethernet header of the payload (e.g., destination MAC address 264 of payload 260 as shown in
In some embodiments, when the switch determines the destination MAC address to be the local MAC address, the tunnel information is processed by the software of the switch. The tunnel information included in the payload can be extracted by the software, which can modify a keepalive timestamp for a VXLAN tunnel to record the latest received keepalive response. Processing the keepalive response can also be offloaded to the switch hardware by maintaining a per tunnel access control list (ACL) with a counter, thereby allowing the software to poll a respective tunnel counter to determine whether a keepalive response has been received.
If the destination MAC in the payload does not match the local MAC address (operation 360), the switch encapsulates the payload with a fabric header (operation 368). The switch forwards the fabric-encapsulated payload to the originating member switch based on an intra-fabric forwarding protocol (operation 370), thereby allowing the originating member switch to receive the intra-fabric keepalive response packet and subsequently determine whether it has received a keepalive response. In some embodiments, the fabric header can be a TRILL header or an IP header. For example, the switch can create a TRILL header and set the egress identifier of the TRILL header as the switch identifier of the originating switch (e.g., based on the destination MAC address of the payload). The switch can determine an output port by looking up the next hop information for the switch identifier, and send the TRILL-encapsulated payload via the determined output port.
Receiving and Processing a Keepalive Packet
VXLAN Tunnel Keepalives in a Non-Fabric Switch
A source VTEP can monitor the health of virtual VXLAN tunnel by sending a keepalive packet to a destination VTEP and tracking keepalive response packets received from the destination VTEP. During operation, the source VTEP (e.g., switch 410) creates and sends a keepalive packet 480 to the destination VTEP (e.g., switch 420) via flow 440. Keepalive packet 480 includes an outer VXLAN header and an inner VXLAN header, as described below in conjunction with
Inner VXLAN header 540 includes an Ethernet header 542, an IP header 548, a UDP header 554, and a VXLAN header 556. IP header 548 can include a source IP address 550 with a value set to the IP address of the destination VTEP (e.g., IP 416 of switch 420) and a destination IP address 552 with a value set to the IP address of the source VTEP (e.g., IP 415 of switch 410). VXLAN header 556 includes a VXLAN network identifier (VNI) 558 with a value set to a VNI reserved for keepalive purposes. In some embodiments, the value of VNI 558 is set to “0”.
Exemplary Switch
During operation, keepalive response module 730 operates to receive a keepalive response packet via one of communication ports 702. Communication ports 702 are adapted to receive packets encapsulated based on a first protocol. In some embodiments, the first protocol is based on a virtual extensible local area network (VXLAN). Keepalive response module 730 further operates to determine whether the keepalive response packet corresponds to any keepalive packet previously transmitted by switch 700. Switch 700 can be a member switch of a fabric switch.
Switch identifier extraction module 732 is adapted to extract a switch identifier from a payload of the keepalive response packet, where the switch identifier can correspond to another member switch in the fabric switch. Forwarding module 720 is adapted to construct a packet that includes a payload of a keepalive response packet, where the constructed packet is destined to the other member switch (corresponding to the extracted switch identifier). In some embodiments, packet processor 710 constructs the keepalive packet. Forwarding module 720 is further adapted to encapsulate the payload based on a second protocol, determine an output port for the encapsulated payload based on the extracted switch identifier, and transmit the encapsulated payload via the determined output port. Fabric switch management module 740 is adapted to determine a same reserved address for the switch and any member switch in the fabric switch.
Note that the above-mentioned modules can be implemented in hardware as well as in software. In one embodiment, these modules can be embodied in computer-executable instructions stored in a memory which is coupled to one or more processors in switch 700. When executed, these instructions cause the processor(s) to perform the aforementioned functions.
In summary, embodiments of the present invention provide a switch, method, and computer system for monitoring the health of a VXLAN tunnel. In one embodiment, the switch includes a keepalive response module, a switch identifier extraction module, and a forwarding module. During operation, the keepalive response module identifies a keepalive response packet that does not correspond to any keepalive packet previously transmitted by the switch. The switch identifier module extracts a switch identifier from a payload of the keepalive response packet, where the switch identifier corresponds to another member switch in the fabric switch. The forwarding module constructs a packet that includes the payload and is destined to the other member switch. In this way, the switch facilitates the other switch to monitor the health of a VXLAN tunnel based on keepalive packets.
The methods and processes described herein can be embodied as code and/or data, which can be stored in a computer-readable non-transitory storage medium. When a computer system reads and executes the code and/or data stored on the computer-readable non-transitory storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the medium.
The methods and processes described herein can be executed by and/or included in hardware modules or apparatus. These modules or apparatus may include, but are not limited to, an application-specific integrated circuit (ASIC) chip, a field-programmable gate array (FPGA), a dedicated or shared processor that executes a particular software module or a piece of code at a particular time, and/or other programmable-logic devices now known or later developed. When the hardware modules or apparatus are activated, they perform the methods and processes included within them.
The foregoing descriptions of embodiments of the present invention have been presented only for purposes of illustration and description. They are not intended to be exhaustive or to limit this disclosure. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. The scope of the present invention is defined by the appended claims.
This application claims the benefit of: U.S. Provisional Application No. 61/937,950, titled “Virtual Extensible LAN Tunnel Keepalives,” by inventors Amit Kumar Ray, Phanidhar Koganti, Shunjia Yu, and Vardarajan Venkatesh, filed 10 Feb. 2014; and U.S. Provisional Application No. 62/037,519, titled “Virtual Extensible LAN Tunnel Keepalives,” by inventors Amit Kumar Ray, Phanidhar Koganti, Shunjia Yu, and Vardarajan Venkatesh, filed 14 Aug. 2014, the disclosures of which are incorporated by reference herein. The present disclosure is related to: U.S. patent application Ser. No. 13/087,239, titled “Virtual Cluster Switching,” by inventors Suresh Vobbilisetty and Dilip Chatwani, filed 14 Apr. 2011 (hereinafter U.S. patent application Ser. No. 13/087,239); U.S. patent application Ser. No. 13/092,724, titled “Fabric Formation for Virtual Cluster Switching,” by inventors Shiv Haris and Phanidhar Koganti, filed 22 Apr. 2011 (hereinafter U.S. patent application Ser. No. 13/092,724”); and U.S. Pat. No. 8,665,886, titled “Redundant Host Connection in a Routed Network,” by inventors Somesh Gupta, Anoop Ghanwani, Phanidhar Koganti, and Shunjia Yu, issued 4 Mar. 2014 (hereinafter “U.S. Pat. No. 8,665,886”), the disclosures of which are incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
829529 | Keathley | Aug 1906 | A |
5390173 | Spinney | Feb 1995 | A |
5802278 | Isfeld | Sep 1998 | A |
5878232 | Marimuthu | Mar 1999 | A |
5879173 | Poplawski | Mar 1999 | A |
5959968 | Chin | Sep 1999 | A |
5973278 | Wehrill, III | Oct 1999 | A |
5983278 | Chong | Nov 1999 | A |
5995262 | Hirota | Nov 1999 | A |
6041042 | Bussiere | Mar 2000 | A |
6085238 | Yuasa | Jul 2000 | A |
6092062 | Lohman | Jul 2000 | A |
6104696 | Kadambi | Aug 2000 | A |
6185214 | Schwartz | Feb 2001 | B1 |
6185241 | Sun | Feb 2001 | B1 |
6295527 | McCormack | Sep 2001 | B1 |
6331983 | Haggerty | Dec 2001 | B1 |
6438106 | Pillar | Aug 2002 | B1 |
6498781 | Bass | Dec 2002 | B1 |
6542266 | Phillips | Apr 2003 | B1 |
6553029 | Alexander | Apr 2003 | B1 |
6571355 | Linnell | May 2003 | B1 |
6583902 | Yuen | Jun 2003 | B1 |
6633761 | Singhal | Oct 2003 | B1 |
6636963 | Stein | Oct 2003 | B1 |
6771610 | Seaman | Aug 2004 | B1 |
6873602 | Ambe | Mar 2005 | B1 |
6937576 | DiBenedetto | Aug 2005 | B1 |
6956824 | Mark | Oct 2005 | B2 |
6957269 | Williams | Oct 2005 | B2 |
6975581 | Medina | Dec 2005 | B1 |
6975864 | Singhal | Dec 2005 | B2 |
7016352 | Chow | Mar 2006 | B1 |
7061877 | Gummalla | Jun 2006 | B1 |
7062177 | Grivna | Jun 2006 | B1 |
7173934 | Lapuh | Feb 2007 | B2 |
7197308 | Singhal | Mar 2007 | B2 |
7206288 | Cometto | Apr 2007 | B2 |
7310664 | Merchant | Dec 2007 | B1 |
7313637 | Tanaka | Dec 2007 | B2 |
7315545 | Chowdhury et al. | Jan 2008 | B1 |
7316031 | Griffith | Jan 2008 | B2 |
7330897 | Baldwin | Feb 2008 | B2 |
7380025 | Riggins | May 2008 | B1 |
7397794 | Lacroute | Jul 2008 | B1 |
7430164 | Bare | Sep 2008 | B2 |
7453888 | Zabihi | Nov 2008 | B2 |
7477894 | Sinha | Jan 2009 | B1 |
7480258 | Shuen | Jan 2009 | B1 |
7508757 | Ge | Mar 2009 | B2 |
7558195 | Kuo | Jul 2009 | B1 |
7558273 | Grosser | Jul 2009 | B1 |
7571447 | Ally | Aug 2009 | B2 |
7599901 | Mital | Oct 2009 | B2 |
7688736 | Walsh | Mar 2010 | B1 |
7688960 | Aubuchon | Mar 2010 | B1 |
7690040 | Frattura | Mar 2010 | B2 |
7706255 | Kondrat et al. | Apr 2010 | B1 |
7716370 | Devarapalli | May 2010 | B1 |
7720076 | Dobbins | May 2010 | B2 |
7729296 | Choudhary | Jun 2010 | B1 |
7787480 | Mehta | Aug 2010 | B1 |
7792920 | Istvan | Sep 2010 | B2 |
7796593 | Ghosh | Sep 2010 | B1 |
7801021 | Triantafillis | Sep 2010 | B1 |
7808992 | Homchaudhuri | Oct 2010 | B2 |
7836332 | Hara | Nov 2010 | B2 |
7843906 | Chidambaram | Nov 2010 | B1 |
7843907 | Abou-Emara | Nov 2010 | B1 |
7860097 | Lovett | Dec 2010 | B1 |
7898959 | Arad | Mar 2011 | B1 |
7912091 | Krishnan | Mar 2011 | B1 |
7924837 | Shabtay | Apr 2011 | B1 |
7937756 | Kay | May 2011 | B2 |
7945941 | Sinha | May 2011 | B2 |
7949638 | Goodson | May 2011 | B1 |
7957386 | Aggarwal | Jun 2011 | B1 |
8018938 | Fromm | Sep 2011 | B1 |
8027354 | Portolani | Sep 2011 | B1 |
8054832 | Shukla | Nov 2011 | B1 |
8068442 | Kompella | Nov 2011 | B1 |
8078704 | Lee | Dec 2011 | B2 |
8102781 | Smith | Jan 2012 | B2 |
8102791 | Tang | Jan 2012 | B2 |
8116307 | Thesayi | Feb 2012 | B1 |
8125928 | Mehta | Feb 2012 | B2 |
8134922 | Elangovan | Mar 2012 | B2 |
8155150 | Chung | Apr 2012 | B1 |
8160063 | Maltz | Apr 2012 | B2 |
8160080 | Arad | Apr 2012 | B1 |
8170038 | Belanger | May 2012 | B2 |
8175107 | Yalagandula | May 2012 | B1 |
8194674 | Pagel | Jun 2012 | B1 |
8195774 | Lambeth | Jun 2012 | B2 |
8204061 | Sane | Jun 2012 | B1 |
8213313 | Doiron | Jul 2012 | B1 |
8213336 | Smith | Jul 2012 | B2 |
8230069 | Korupolu | Jul 2012 | B2 |
8239960 | Frattura | Aug 2012 | B2 |
8249069 | Raman | Aug 2012 | B2 |
8270401 | Barnes | Sep 2012 | B1 |
8295291 | Ramanathan | Oct 2012 | B1 |
8295921 | Wang | Oct 2012 | B2 |
8301686 | Appajodu | Oct 2012 | B1 |
8339994 | Gnanasekaran | Dec 2012 | B2 |
8351352 | Eastlake | Jan 2013 | B1 |
8369335 | Jha | Feb 2013 | B2 |
8369347 | Xiong | Feb 2013 | B2 |
8392496 | Linden | Mar 2013 | B2 |
8462774 | Page | Jun 2013 | B2 |
8465774 | Breder | Jun 2013 | B2 |
8467375 | Blair | Jun 2013 | B2 |
8520595 | Yadav | Aug 2013 | B2 |
8599850 | Jha | Dec 2013 | B2 |
8599864 | Chung | Dec 2013 | B2 |
8615008 | Natarajan | Dec 2013 | B2 |
8706905 | McGlaughlin | Apr 2014 | B1 |
8724456 | Hong | May 2014 | B1 |
8798045 | Aybay | Aug 2014 | B1 |
8806031 | Kondur | Aug 2014 | B1 |
8826385 | Congdon | Sep 2014 | B2 |
8918631 | Kumar | Dec 2014 | B1 |
8937865 | Kumar | Jan 2015 | B1 |
9350680 | Thayalan | May 2016 | B2 |
20010005527 | Vaeth | Jun 2001 | A1 |
20010055274 | Hegge | Dec 2001 | A1 |
20020019904 | Katz | Feb 2002 | A1 |
20020021701 | Lavian | Feb 2002 | A1 |
20020039350 | Wang | Apr 2002 | A1 |
20020054593 | Morohashi | May 2002 | A1 |
20020091795 | Yip | Jul 2002 | A1 |
20030041085 | Sato | Feb 2003 | A1 |
20030093567 | Lolayekar | May 2003 | A1 |
20030097464 | Martinez | May 2003 | A1 |
20030123393 | Feuerstraeter | Jul 2003 | A1 |
20030147385 | Montalvo | Aug 2003 | A1 |
20030174706 | Shankar | Sep 2003 | A1 |
20030189905 | Lee | Oct 2003 | A1 |
20030189930 | Terrell | Oct 2003 | A1 |
20030208616 | Laing | Nov 2003 | A1 |
20030216143 | Roese | Nov 2003 | A1 |
20030223428 | BlanquerGonzalez | Dec 2003 | A1 |
20030233534 | Bernhard | Dec 2003 | A1 |
20040001433 | Gram | Jan 2004 | A1 |
20040003094 | See | Jan 2004 | A1 |
20040008868 | Bornowski | Jan 2004 | A1 |
20040010600 | Baldwin | Jan 2004 | A1 |
20040049699 | Griffith | Mar 2004 | A1 |
20040057430 | Paavolainen | Mar 2004 | A1 |
20040081171 | Finn | Apr 2004 | A1 |
20040095900 | Siegel | May 2004 | A1 |
20040117508 | Shimizu | Jun 2004 | A1 |
20040120326 | Yoon | Jun 2004 | A1 |
20040156313 | Hofmeister et al. | Aug 2004 | A1 |
20040165595 | Holmgren | Aug 2004 | A1 |
20040165596 | Garcia | Aug 2004 | A1 |
20040205234 | Barrack | Oct 2004 | A1 |
20040213232 | Regan | Oct 2004 | A1 |
20040243673 | Goyal | Dec 2004 | A1 |
20050007951 | Lapuh | Jan 2005 | A1 |
20050044199 | Shiga | Feb 2005 | A1 |
20050074001 | Mattes | Apr 2005 | A1 |
20050094568 | Judd | May 2005 | A1 |
20050094630 | Valdevit | May 2005 | A1 |
20050108375 | Hallak-Stamler | May 2005 | A1 |
20050122979 | Gross | Jun 2005 | A1 |
20050157645 | Rabie et al. | Jul 2005 | A1 |
20050157751 | Rabie | Jul 2005 | A1 |
20050169188 | Cometto | Aug 2005 | A1 |
20050195813 | Ambe | Sep 2005 | A1 |
20050207423 | Herbst | Sep 2005 | A1 |
20050213561 | Yao | Sep 2005 | A1 |
20050220096 | Friskney | Oct 2005 | A1 |
20050259586 | Hafid | Nov 2005 | A1 |
20050265356 | Kawarai | Dec 2005 | A1 |
20050278565 | Frattura | Dec 2005 | A1 |
20060007869 | Hirota | Jan 2006 | A1 |
20060018302 | Ivaldi | Jan 2006 | A1 |
20060023707 | Makishima et al. | Feb 2006 | A1 |
20060029055 | Perera | Feb 2006 | A1 |
20060034292 | Wakayama | Feb 2006 | A1 |
20060036648 | Frey | Feb 2006 | A1 |
20060036765 | Weyman | Feb 2006 | A1 |
20060059163 | Frattura | Mar 2006 | A1 |
20060062187 | Rune | Mar 2006 | A1 |
20060072550 | Davis | Apr 2006 | A1 |
20060083172 | Jordan | Apr 2006 | A1 |
20060083254 | Ge | Apr 2006 | A1 |
20060098589 | Kreeger | May 2006 | A1 |
20060140130 | Kalkunte | Jun 2006 | A1 |
20060168109 | Warmenhoven | Jul 2006 | A1 |
20060184937 | Abels | Aug 2006 | A1 |
20060209886 | Silberman | Sep 2006 | A1 |
20060221960 | Borgione | Oct 2006 | A1 |
20060227776 | Chandrasekaran | Oct 2006 | A1 |
20060235995 | Bhatia | Oct 2006 | A1 |
20060242311 | Mai | Oct 2006 | A1 |
20060242398 | Fontijn | Oct 2006 | A1 |
20060245439 | Sajassi | Nov 2006 | A1 |
20060251067 | DeSanti | Nov 2006 | A1 |
20060256767 | Suzuki | Nov 2006 | A1 |
20060265515 | Shiga | Nov 2006 | A1 |
20060285499 | Tzeng | Dec 2006 | A1 |
20060291388 | Amdahl et al. | Dec 2006 | A1 |
20060291480 | Cho | Dec 2006 | A1 |
20060294413 | Filz | Dec 2006 | A1 |
20070036178 | Hares | Feb 2007 | A1 |
20070053294 | Ho | Mar 2007 | A1 |
20070074052 | Hemmah | Mar 2007 | A1 |
20070081530 | Nomura | Apr 2007 | A1 |
20070083625 | Chamdani | Apr 2007 | A1 |
20070086362 | Kato | Apr 2007 | A1 |
20070094464 | Sharma | Apr 2007 | A1 |
20070097968 | Du | May 2007 | A1 |
20070098006 | Parry | May 2007 | A1 |
20070116224 | Burke | May 2007 | A1 |
20070116422 | Reynolds | May 2007 | A1 |
20070130295 | Rastogi | Jun 2007 | A1 |
20070156659 | Lim | Jul 2007 | A1 |
20070177525 | Wijnands | Aug 2007 | A1 |
20070177597 | Ju | Aug 2007 | A1 |
20070183313 | Narayanan | Aug 2007 | A1 |
20070211712 | Fitch | Sep 2007 | A1 |
20070220059 | Lu | Sep 2007 | A1 |
20070238343 | Velleca | Oct 2007 | A1 |
20070258449 | Bennett | Nov 2007 | A1 |
20070274234 | Kubota | Nov 2007 | A1 |
20070280223 | Pan | Dec 2007 | A1 |
20070289017 | Copeland, III | Dec 2007 | A1 |
20080052487 | Akahane | Feb 2008 | A1 |
20080056135 | Lee | Mar 2008 | A1 |
20080057918 | Abrant | Mar 2008 | A1 |
20080065760 | Damm | Mar 2008 | A1 |
20080080517 | Roy | Apr 2008 | A1 |
20080095160 | Yadav | Apr 2008 | A1 |
20080101386 | Gray | May 2008 | A1 |
20080112133 | Torudbakken | May 2008 | A1 |
20080112400 | Dunbar et al. | May 2008 | A1 |
20080133760 | Berkvens | Jun 2008 | A1 |
20080159277 | Vobbilisetty | Jul 2008 | A1 |
20080172492 | Raghunath | Jul 2008 | A1 |
20080181196 | Regan | Jul 2008 | A1 |
20080181243 | Vobbilisetty et al. | Jul 2008 | A1 |
20080186981 | Seto | Aug 2008 | A1 |
20080205377 | Chao | Aug 2008 | A1 |
20080219172 | Mohan | Sep 2008 | A1 |
20080225852 | Raszuk | Sep 2008 | A1 |
20080225853 | Melman | Sep 2008 | A1 |
20080228897 | Ko | Sep 2008 | A1 |
20080240129 | Elmeleegy | Oct 2008 | A1 |
20080267179 | LaVigne | Oct 2008 | A1 |
20080285458 | Lysne | Nov 2008 | A1 |
20080285555 | Ogasahara | Nov 2008 | A1 |
20080288020 | Einav | Nov 2008 | A1 |
20080298248 | Roeck | Dec 2008 | A1 |
20080304498 | Jorgensen | Dec 2008 | A1 |
20080310342 | Kruys | Dec 2008 | A1 |
20090022069 | Khan | Jan 2009 | A1 |
20090024734 | Merbach | Jan 2009 | A1 |
20090037607 | Farinacci | Feb 2009 | A1 |
20090042270 | Dolly | Feb 2009 | A1 |
20090044270 | Shelly | Feb 2009 | A1 |
20090067422 | Poppe | Mar 2009 | A1 |
20090067442 | Killian | Mar 2009 | A1 |
20090079560 | Fries | Mar 2009 | A1 |
20090080345 | Gray | Mar 2009 | A1 |
20090083445 | Ganga | Mar 2009 | A1 |
20090092042 | Yuhara | Apr 2009 | A1 |
20090092043 | Lapuh | Apr 2009 | A1 |
20090094354 | Rastogi | Apr 2009 | A1 |
20090106298 | Furusho | Apr 2009 | A1 |
20090106405 | Mazarick | Apr 2009 | A1 |
20090113408 | Toeroe | Apr 2009 | A1 |
20090116381 | Kanda | May 2009 | A1 |
20090122700 | Aboba | May 2009 | A1 |
20090129384 | Regan | May 2009 | A1 |
20090138577 | Casado | May 2009 | A1 |
20090138752 | Graham | May 2009 | A1 |
20090144720 | Roush | Jun 2009 | A1 |
20090161584 | Guan | Jun 2009 | A1 |
20090161670 | Shepherd | Jun 2009 | A1 |
20090168647 | Holness | Jul 2009 | A1 |
20090199177 | Edwards | Aug 2009 | A1 |
20090204965 | Tanaka | Aug 2009 | A1 |
20090213783 | Moreton | Aug 2009 | A1 |
20090222879 | Kostal | Sep 2009 | A1 |
20090232031 | Vasseur | Sep 2009 | A1 |
20090245112 | Okazaki | Oct 2009 | A1 |
20090245137 | Hares | Oct 2009 | A1 |
20090245242 | Carlson | Oct 2009 | A1 |
20090246137 | Hadida Ruah | Oct 2009 | A1 |
20090249444 | Macauley | Oct 2009 | A1 |
20090252049 | Ludwig | Oct 2009 | A1 |
20090252061 | Small | Oct 2009 | A1 |
20090252503 | Ishigami | Oct 2009 | A1 |
20090260083 | Szeto | Oct 2009 | A1 |
20090279558 | Davis | Nov 2009 | A1 |
20090292858 | Lambeth | Nov 2009 | A1 |
20090316721 | Kanda | Dec 2009 | A1 |
20090323698 | LeFaucheur | Dec 2009 | A1 |
20090323708 | Ihle | Dec 2009 | A1 |
20090327392 | Tripathi | Dec 2009 | A1 |
20090327462 | Adams | Dec 2009 | A1 |
20100002382 | Aybay | Jan 2010 | A1 |
20100027420 | Smith | Feb 2010 | A1 |
20100042869 | Szabo | Feb 2010 | A1 |
20100046471 | Hattori | Feb 2010 | A1 |
20100054260 | Pandey | Mar 2010 | A1 |
20100061269 | Banerjee | Mar 2010 | A1 |
20100074175 | Banks | Mar 2010 | A1 |
20100097941 | Carlson | Apr 2010 | A1 |
20100103813 | Allan | Apr 2010 | A1 |
20100103939 | Carlson | Apr 2010 | A1 |
20100114818 | Lier | May 2010 | A1 |
20100131636 | Suri | May 2010 | A1 |
20100157844 | Casey | Jun 2010 | A1 |
20100158024 | Sajassi | Jun 2010 | A1 |
20100165877 | Shukla | Jul 2010 | A1 |
20100165995 | Mehta | Jul 2010 | A1 |
20100168467 | Johnston | Jul 2010 | A1 |
20100169467 | Shukla | Jul 2010 | A1 |
20100169948 | Budko | Jul 2010 | A1 |
20100182920 | Matsuoka | Jul 2010 | A1 |
20100195489 | Zhou | Aug 2010 | A1 |
20100215042 | Sato | Aug 2010 | A1 |
20100215049 | Raza | Aug 2010 | A1 |
20100220724 | Rabie | Sep 2010 | A1 |
20100226368 | Mack-Crane | Sep 2010 | A1 |
20100226381 | Mehta | Sep 2010 | A1 |
20100246388 | Gupta | Sep 2010 | A1 |
20100254703 | Kirkpatrick | Oct 2010 | A1 |
20100257263 | Casado | Oct 2010 | A1 |
20100265849 | Harel | Oct 2010 | A1 |
20100271960 | Krygowski | Oct 2010 | A1 |
20100272107 | Papp | Oct 2010 | A1 |
20100281106 | Ashwood-Smith | Nov 2010 | A1 |
20100284414 | Agarwal | Nov 2010 | A1 |
20100284418 | Gray | Nov 2010 | A1 |
20100284698 | McColloch | Nov 2010 | A1 |
20100287262 | Elzur | Nov 2010 | A1 |
20100287548 | Zhou | Nov 2010 | A1 |
20100290473 | Enduri | Nov 2010 | A1 |
20100299527 | Arunan | Nov 2010 | A1 |
20100303071 | Kotalwar | Dec 2010 | A1 |
20100303075 | Tripathi | Dec 2010 | A1 |
20100303083 | Belanger | Dec 2010 | A1 |
20100309820 | Rajagopalan | Dec 2010 | A1 |
20100309912 | Mehta | Dec 2010 | A1 |
20100329110 | Rose | Dec 2010 | A1 |
20110007738 | Berman | Jan 2011 | A1 |
20110019678 | Mehta | Jan 2011 | A1 |
20110032945 | Mullooly | Feb 2011 | A1 |
20110035489 | McDaniel | Feb 2011 | A1 |
20110035498 | Shah | Feb 2011 | A1 |
20110044339 | Kotalwar | Feb 2011 | A1 |
20110044352 | Chaitou | Feb 2011 | A1 |
20110055274 | Scales et al. | Mar 2011 | A1 |
20110064086 | Xiong | Mar 2011 | A1 |
20110064089 | Hidaka | Mar 2011 | A1 |
20110072208 | Gulati | Mar 2011 | A1 |
20110085560 | Chawla | Apr 2011 | A1 |
20110085563 | Kotha | Apr 2011 | A1 |
20110088011 | Ouali | Apr 2011 | A1 |
20110110266 | Li | May 2011 | A1 |
20110134802 | Rajagopalan | Jun 2011 | A1 |
20110134803 | Dalvi | Jun 2011 | A1 |
20110134925 | Safrai | Jun 2011 | A1 |
20110142053 | Van Der Merwe | Jun 2011 | A1 |
20110142062 | Wang | Jun 2011 | A1 |
20110149526 | Turner | Jun 2011 | A1 |
20110158113 | Nanda | Jun 2011 | A1 |
20110161494 | McDysan | Jun 2011 | A1 |
20110161695 | Okita | Jun 2011 | A1 |
20110176412 | Stine | Jul 2011 | A1 |
20110188373 | Saito | Aug 2011 | A1 |
20110194403 | Sajassi | Aug 2011 | A1 |
20110194563 | Shen | Aug 2011 | A1 |
20110228767 | Singla | Sep 2011 | A1 |
20110228780 | Ashwood-Smith | Sep 2011 | A1 |
20110231570 | Altekar | Sep 2011 | A1 |
20110231574 | Saunderson | Sep 2011 | A1 |
20110235523 | Jha | Sep 2011 | A1 |
20110243133 | Villait | Oct 2011 | A9 |
20110243136 | Raman | Oct 2011 | A1 |
20110246669 | Kanada | Oct 2011 | A1 |
20110255538 | Srinivasan | Oct 2011 | A1 |
20110255540 | Mizrahi | Oct 2011 | A1 |
20110261828 | Smith | Oct 2011 | A1 |
20110268118 | Schlansker | Nov 2011 | A1 |
20110268120 | Vobbilisetty | Nov 2011 | A1 |
20110268125 | Vobbilisetty | Nov 2011 | A1 |
20110273988 | Tourrilhes | Nov 2011 | A1 |
20110273990 | Rajagopalan | Nov 2011 | A1 |
20110274114 | Dhar | Nov 2011 | A1 |
20110280572 | Vobbilisetty | Nov 2011 | A1 |
20110286357 | Haris | Nov 2011 | A1 |
20110286457 | Ee | Nov 2011 | A1 |
20110286462 | Kompella | Nov 2011 | A1 |
20110292947 | Vobbilisetty | Dec 2011 | A1 |
20110296052 | Guo | Dec 2011 | A1 |
20110299391 | Vobbilisetty | Dec 2011 | A1 |
20110299413 | Chatwani | Dec 2011 | A1 |
20110299414 | Yu | Dec 2011 | A1 |
20110299527 | Yu | Dec 2011 | A1 |
20110299528 | Yu | Dec 2011 | A1 |
20110299531 | Yu | Dec 2011 | A1 |
20110299532 | Yu | Dec 2011 | A1 |
20110299533 | Yu | Dec 2011 | A1 |
20110299534 | Koganti | Dec 2011 | A1 |
20110299535 | Vobbilisetty | Dec 2011 | A1 |
20110299536 | Cheng | Dec 2011 | A1 |
20110317559 | Kern | Dec 2011 | A1 |
20110317703 | Dunbar et al. | Dec 2011 | A1 |
20120011240 | Hara | Jan 2012 | A1 |
20120014261 | Salam | Jan 2012 | A1 |
20120014387 | Dunbar | Jan 2012 | A1 |
20120020220 | Sugita | Jan 2012 | A1 |
20120027017 | Rai | Feb 2012 | A1 |
20120033663 | Guichard | Feb 2012 | A1 |
20120033665 | Jacob Da Silva et al. | Feb 2012 | A1 |
20120033668 | Humphries | Feb 2012 | A1 |
20120033669 | Mohandas | Feb 2012 | A1 |
20120033672 | Page | Feb 2012 | A1 |
20120042095 | Kotha | Feb 2012 | A1 |
20120063363 | Li | Mar 2012 | A1 |
20120075991 | Sugita | Mar 2012 | A1 |
20120099567 | Hart | Apr 2012 | A1 |
20120099602 | Nagapudi | Apr 2012 | A1 |
20120099863 | Xu | Apr 2012 | A1 |
20120102160 | Breh | Apr 2012 | A1 |
20120106339 | Mishra | May 2012 | A1 |
20120117438 | Shaffer | May 2012 | A1 |
20120131097 | Baykal | May 2012 | A1 |
20120131289 | Taguchi | May 2012 | A1 |
20120134266 | Roitshtein | May 2012 | A1 |
20120147740 | Nakash | Jun 2012 | A1 |
20120158997 | Hsu | Jun 2012 | A1 |
20120163164 | Terry | Jun 2012 | A1 |
20120177039 | Berman | Jul 2012 | A1 |
20120210416 | Mihelich | Aug 2012 | A1 |
20120221636 | Surtani | Aug 2012 | A1 |
20120239918 | Huang | Sep 2012 | A1 |
20120243539 | Keesara | Sep 2012 | A1 |
20120260079 | Mruthyunjaya | Oct 2012 | A1 |
20120275297 | Subramanian | Nov 2012 | A1 |
20120275347 | Banerjee | Nov 2012 | A1 |
20120278804 | Narayanasamy | Nov 2012 | A1 |
20120294192 | Masood | Nov 2012 | A1 |
20120294194 | Balasubramanian | Nov 2012 | A1 |
20120320800 | Kamble | Dec 2012 | A1 |
20120320926 | Kamath et al. | Dec 2012 | A1 |
20120327766 | Tsai | Dec 2012 | A1 |
20120327937 | Melman et al. | Dec 2012 | A1 |
20130003535 | Sarwar | Jan 2013 | A1 |
20130003737 | Sinicrope | Jan 2013 | A1 |
20130003738 | Koganti | Jan 2013 | A1 |
20130028072 | Addanki | Jan 2013 | A1 |
20130034015 | Jaiswal | Feb 2013 | A1 |
20130034021 | Jaiswal | Feb 2013 | A1 |
20130066947 | Ahmad | Mar 2013 | A1 |
20130067466 | Combs | Mar 2013 | A1 |
20130070762 | Adams | Mar 2013 | A1 |
20130114595 | Mack-Crane | May 2013 | A1 |
20130124707 | Ananthapadmanabha | May 2013 | A1 |
20130127848 | Joshi | May 2013 | A1 |
20130132296 | Koppenhagen | May 2013 | A1 |
20130135811 | Dunwoody | May 2013 | A1 |
20130136123 | Ge | May 2013 | A1 |
20130148546 | Eisenhauer | Jun 2013 | A1 |
20130156425 | Kirkpatrick | Jun 2013 | A1 |
20130194914 | Agarwal | Aug 2013 | A1 |
20130219473 | Schaefer | Aug 2013 | A1 |
20130223449 | Koganti | Aug 2013 | A1 |
20130250951 | Koganti | Sep 2013 | A1 |
20130259037 | Natarajan | Oct 2013 | A1 |
20130266015 | Qu | Oct 2013 | A1 |
20130268590 | Mahadevan | Oct 2013 | A1 |
20130272135 | Leong | Oct 2013 | A1 |
20130294451 | Li | Nov 2013 | A1 |
20130297757 | Han | Nov 2013 | A1 |
20130301642 | Radhakrishnan | Nov 2013 | A1 |
20130308492 | Baphna | Nov 2013 | A1 |
20130308647 | Rosset | Nov 2013 | A1 |
20130315586 | Kipp | Nov 2013 | A1 |
20130332660 | Talagala | Dec 2013 | A1 |
20130336104 | Talla | Dec 2013 | A1 |
20130346583 | Low | Dec 2013 | A1 |
20140013324 | Zhang | Jan 2014 | A1 |
20140019608 | Kawakami | Jan 2014 | A1 |
20140025736 | Wang | Jan 2014 | A1 |
20140044126 | Sabhanatarajan | Feb 2014 | A1 |
20140050223 | Foo | Feb 2014 | A1 |
20140056298 | Vobbilisetty | Feb 2014 | A1 |
20140064056 | Sakata | Mar 2014 | A1 |
20140105034 | Sun | Apr 2014 | A1 |
20140157251 | Hocker | Jun 2014 | A1 |
20140298091 | Carlen | Oct 2014 | A1 |
20150010007 | Matsuhira | Jan 2015 | A1 |
20150030031 | Zhou | Jan 2015 | A1 |
20150127618 | Alberti | May 2015 | A1 |
20150143369 | Zheng | May 2015 | A1 |
20150195093 | Mahadevan et al. | Jul 2015 | A1 |
20150222506 | Kizhakkiniyil | Aug 2015 | A1 |
20150248298 | Gavrilov | Sep 2015 | A1 |
20150263991 | MacChiano | Sep 2015 | A1 |
20150281066 | Koley | Oct 2015 | A1 |
20150301901 | Rath | Oct 2015 | A1 |
20150347468 | Bester | Dec 2015 | A1 |
20160072899 | Tung | Mar 2016 | A1 |
Number | Date | Country |
---|---|---|
102801599 | Nov 2012 | CN |
0579567 | May 1993 | EP |
0579567 | Jan 1994 | EP |
0993156 | Dec 2000 | EP |
1398920 | Mar 2004 | EP |
1916807 | Apr 2008 | EP |
2001167 | Oct 2008 | EP |
2008056838 | May 2008 | WO |
2009042919 | Apr 2009 | WO |
2010111142 | Sep 2010 | WO |
2014031781 | Feb 2014 | WO |
Entry |
---|
Abawajy J. “An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment” Centre for Parallel and Distributed Computing, School of Computer Science Carleton University, Ottawa, Ontario, K1S 5B6, Canada. |
Office action dated Feb. 2, 2016, U.S. Appl. No. 13/092,460, filed Apr. 22, 2011. |
Office Action dated Feb. 2, 2016. U.S. Appl. No. 14/154,106, filed Jan. 13, 2014. |
Office Action dated Feb. 3, 2016, U.S. Appl. No. 13/098,490, filed May 2, 2011. |
Office Action dated Feb. 4, 2016, U.S. Appl. No. 13/557,105, filed Jul. 24, 2012. |
Office Action dated Feb. 11, 2016, U.S. Appl. No. 14/488,173, filed Sep. 16, 2014. |
Office Action dated Feb. 24, 2016, U.S. Appl. No. 13/971,397, filed Aug. 20, 2013. |
Office Action dated Feb. 24, 2016, U.S. Appl. No. 12/705,508, filed Feb. 12, 2010. |
Office Action dated Jul. 6, 2016, U.S. Appl. No. 14/618,941, filed Feb. 10, 2015. |
Office Action dated Jul. 20, 2016, U.S. Appl. No. 14/510,913, filed Oct. 9, 2014. |
Office Action dated Jul. 29, 2016, U.S. Appl. No. 14/473,941, filed Aug. 29, 2014. |
Office Action dated Jul. 28, 2016, U.S. Appl. No. 14/284,212, filed May 21, 2016. |
Number | Date | Country | |
---|---|---|---|
20150229724 A1 | Aug 2015 | US |
Number | Date | Country | |
---|---|---|---|
61937950 | Feb 2014 | US | |
62037519 | Aug 2014 | US |