1
Arindum Mukerji, Jesse Abraham Rothstein: Selectively enabling network packet concatenation based on metrics. F5 Networks, Frommer Lawrence & Haug, Jamie L Wiegand, January 18, 2011: US07873065 (141 worldwide citation)

A method, system, and apparatus are directed towards selectively concatenating data into a packet to modify a number of packets transmitted over a network based on a combination of network and/or send-queue metrics. In one embodiment, Nagle's algorithm is used for concatenating data into a packet. T ...


2
Jesse Abraham Rothstein, Arindum Mukerji: Capture and resumption of network application sessions. ExtraHop Networks, Meyertons Hood Kivlin Kowert & Goetzel P C, Jeffrey C Hood, Joel L Stevens, July 12, 2011: US07979555 (117 worldwide citation)

A system and method for capture and resumption of network application sessions in a network system. A transaction may be detected between a client and server that includes application session state information. The session state information may relate to a session between the client and the server. ...


3
Arindum Mukerji, Jesse Abraham Rothstein: Coalescing acknowledgement responses to improve network communications. F5 Network, Mathew M Gaffney, Frommer Lawrence & Haug, November 2, 2010: US07826487 (52 worldwide citation)

A system, apparatus, and method are directed to managing network communications by, in part, reducing a number of packets between a client and a server communicating through another device, such as a traffic management device (TMD). The invention reduces the number of packets communicated, in part, ...


4
Jesse Abraham Rothstein, Arindum Mukerji: Detecting anomalous network application behavior. ExtraHop Networks, Meyertons Hood Kivlin Kowert & Goetzel P C, Jeffrey C Hood, Joel L Stevens, May 22, 2012: US08185953 (44 worldwide citation)

System and Method for detecting anomalous network application behavior. Network traffic between at least one client and one or more servers may be monitored. The client and the one or more servers may communicate using one or more application protocols. The network traffic may be analyzed at the app ...


5
Arindum Mukerji: TCP throughput control by imposing temporal delay. F5 Networks, Frommer Lawrence & Haug, Jamie L Wiegand, February 19, 2013: US08379515 (43 worldwide citation)

A system, apparatus, and method are directed towards managing traffic over a network by imposing temporal delays in acknowledgments (ACKs). A Traffic Management Device (TMD), interposed between two network session end-points monitors a buffer of relayed packets. If the contents of the buffer exceed ...


6
Arindum Mukerji: TCP-over-TCP using multiple TCP streams. F5 Networks, Darby & Darby P C, Jamie L Wiegand, February 17, 2009: US07493383 (34 worldwide citation)

A system, apparatus, and method for managing TCP over TCP communications using multiple TCP network connections. A plurality of tunneled network connections may be established between network devices. The network devices may employ one of the tunneled network connections over which to establish a pl ...


7
Jesse Abraham Rothstein, Arindum Mukerji: Adaptive network traffic classification using historical context. ExtraHop Networks, Meyertons Hood Kivlin Kowert & Goetzel P C, Jeffrey C Hood, Joel L Stevens, February 28, 2012: US08125908 (29 worldwide citation)

Adaptive network traffic classification using historical context. Network traffic may be monitored and classified by considering several attributes using packet filters, regular expressions, context-free grammars, rule sets, and/or protocol dissectors, among other means and by applying a variety of ...


8
Arindum Mukerji: TCP throughput control by imposing temporal delay. F5 Networks, Frommer Lawrence & Haug, Jamie L Wiegand, March 25, 2014: US08681610 (29 worldwide citation)

A system, apparatus, and method are directed towards managing traffic over a network by imposing temporal delays in acknowledgments (ACKs). A Traffic Management Device (TMD), interposed between two network session end-points monitors a buffer of relayed packets. If the contents of the buffer exceed ...


9
Jesse Abraham Rothstein, Arindum Mukerji: De-duplicating of packets in flows at layer 3. ExtraHop Networks, Frommer Lawrence & Haug, John W Branch, December 31, 2013: US08619579 (16 worldwide citation)

Embodiments are directed towards receiving packets communicated over at least one network, determining layer 3 header information for the received packets, normalizing the determined layer 3 header information for each received packet, employing a determined value based on the normalized layer 3 hea ...


10
Jesse Abraham Rothstein, Arindum Mukerji: Management of multiple client requests. F5 Networks, Darby & Darby P C, Jamie L Wiegand, February 2, 2010: US07657618 (14 worldwide citation)

A system, apparatus, and method are directed to managing multiple back-end connections for pipelined HTTP communications. A traffic management device is configured to open back-end connections to multiple servers. The traffic management device distributes HTTP requests from a client device across mu ...