1
Philip P Lozowick, Siman Tov Ben Michael: Method and apparatus for cut-through data packet transfer in a bridge device. Digital Equipment Corporation, A Sidney Johnston, Albert P Cefalo, April 26, 1994: US05307345 (117 worldwide citation)

A technique for reducing latencies in bridge operation, by facilitating cut-through transmission of a receive data packet while the packet is still being received, but without the need for starting or ending delimiters,or packet lengths, in the packet data. The technique can be applied to packets in ...


2
Philip P Lozowick, Siman Tov Ben Michael: Cryptographic processing in a communication network, using a single cryptographic engine. Digital Equipment Corporation, Barry N Young, A Sidney Johnston, July 13, 1993: US05228083 (77 worldwide citation)

A device and related method for cryptographically processing data packets being forwarded in both directions between a communication network and a client interface, using only a single cryptographic engine, but without any degradation in latency or throughput performance, as compared with a device u ...


3
Siman Tov Ben Michael, Philip P Lozowick, William Hawe, Butler Lampson: Method and apparatus for traffic congestion control in a communication network bridge device. Digital Equipment Corporation, Barry N Young, A Sidney Johnston, August 16, 1994: US05339313 (49 worldwide citation)

A technique for controlling access to a bridge connected to at least two networks, such that buffer memory requirements are minimized. For at least one target network of the two networks, two dynamic lists are maintained, to keep track of data packets received from the target network and not yet for ...


4
Siman Tov Ben Michael, Philip P Lozowick, Henry S Yang: Dynamic defer technique for traffic congestion control in a communication network bridge device. Digital Equipment, A Sidney Johnston, Noel F Heal, April 4, 1995: US05404353 (39 worldwide citation)

A technique for controlling access to a bridge connected to at least two networks, such that network collisions are reduced, transmit live-lock conditions are eliminated, and buffer memory requirements are minimized. For at least one target network of the two networks, two dynamic lists are maintain ...