Patents by Inventor Tarek Nabhan

Tarek Nabhan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8432799
    Abstract: The present invention relates to increasing performance of Wide Area Network (WAN) communications and in particular to a redundant proxy device associated with one end of a transport layer connection that monitors packet traffic and selectively reroutes packets to a proxy application.
    Type: Grant
    Filed: May 18, 2012
    Date of Patent: April 30, 2013
    Assignee: F5 Networks, Inc.
    Inventors: Youssri Helmy, Tarek Nabhan
  • Patent number: 8203949
    Abstract: The present invention relates to increasing performance of Wide Area Network (WAN) communications and in particular to a redundant proxy device associated with one end of a transport layer connection that monitors packet traffic and selectively reroutes packets to a proxy application.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: June 19, 2012
    Assignee: F5 Networks, Inc.
    Inventors: Youssri Helmy, Tarek Nabhan
  • Patent number: 8159940
    Abstract: The present invention relates to increasing performance of Wide Area Network (WAN) communications and in particular to a redundant proxy device associated with one end of a transport layer connection that monitors packet traffic and selectively reroutes packets to a proxy application.
    Type: Grant
    Filed: November 10, 2005
    Date of Patent: April 17, 2012
    Assignee: F5 Networks, Inc.
    Inventors: Youssri Helmy, Tarek Nabhan
  • Patent number: 7639700
    Abstract: An architecture for optimizing network communications that utilizes a device positioned at two edges of a constrained Wide Area Network (WAN) link. The device intercepts outgoing network packets and reroutes them to a proxy application. The proxy application uses persistent connections with a network accelerator device at the other end of the persistent connection. The proxy applications transmit the intercepted data after compressing it using a dictionary-based compression algorithm. Packet mangling may involve spoofing the connection request at each end node; a proxy-to-proxy communication protocol specifies a way to forward an original address, port, and original transport protocol information end to end. The packet mangling and proxy-to-proxy communication protocol assure network transparency.
    Type: Grant
    Filed: October 20, 2006
    Date of Patent: December 29, 2009
    Assignee: F5 Networks, Inc.
    Inventors: Tarek Nabhan, Youssri Helmy
  • Patent number: 7286476
    Abstract: An architecture for optimizing network communications that utilizes a device positioned at two edges of a constrained Wide Area Network (WAN) link. The device intercepts outgoing network packets and reroutes them to a proxy application. The proxy application uses multiple, preferably persistent connections with a network accelerator device at the other end of the persistent connection. The proxy applications transmit the intercepted data. Packet mangling may involve spoofing the connection request at each end node; a proxy-to-proxy communication protocol specifies a way to forward an original address, port, and original transport protocol information end to end. The packet mangling and proxy-to-proxy communication protocol assure network layer transparency.
    Type: Grant
    Filed: August 1, 2003
    Date of Patent: October 23, 2007
    Assignee: F5 Networks, Inc.
    Inventors: Youssri Helmy, Tarek Nabhan
  • Patent number: 7126955
    Abstract: An architecture for optimizing network communications that utilizes a device positioned at two edges of a constrained Wide Area Network (WAN) link. The device intercepts outgoing network packets and reroutes them to a proxy application. The proxy application uses persistent connections with a network accelerator device at the other end of the persistent connection. The proxy applications transmit the intercepted data after compressing it using a dictionary-based compression algorithm. Packet mangling may involve spoofing the connection request at each end node; a proxy-to-proxy communication protocol specifies a way to forward an original address, port, and original transport protocol information end to end. The packet mangling and proxy-to-proxy communication protocol assure network transparency.
    Type: Grant
    Filed: January 29, 2003
    Date of Patent: October 24, 2006
    Assignee: F5 Networks, Inc.
    Inventors: Tarek Nabhan, Youssri Helmy
  • Publication number: 20050025150
    Abstract: An architecture for optimizing network communications that utilizes a device positioned at two edges of a constrained Wide Area Network (WAN) link. The device intercepts outgoing network packets and reroutes them to a proxy application. The proxy application uses multiple, preferably persistent connections with a network accelerator device at the other end of the persistent connection. The proxy applications transmit the intercepted data. Packet mangling may involve spoofing the connection request at each end node; a proxy-to-proxy communication protocol specifies a way to forward an original address, port, and original transport protocol information end to end. The packet mangling and proxy-to-proxy communication protocol assure network layer transparency.
    Type: Application
    Filed: August 1, 2003
    Publication date: February 3, 2005
    Applicant: ITWorx Egypt
    Inventors: Youssri Helmy, Tarek Nabhan
  • Publication number: 20040146053
    Abstract: An architecture for optimizing network communications that utilizes a device positioned at two edges of a constrained Wide Area Network (WAN) link. The device intercepts outgoing network packets and reroutes them to a proxy application. The proxy application uses persistent connections with a network accelerator device at the other end of the persistent connection. The proxy applications transmit the intercepted data after compressing it using a dictionary-based compression algorithm. Packet mangling may involve spoofing the connection request at each end node; a proxy-to-proxy communication protocol specifies a way to forward an original address, port, and original transport protocol information end to end. The packet mangling and proxy-to-proxy communication protocol assure network transparency.
    Type: Application
    Filed: January 29, 2003
    Publication date: July 29, 2004
    Applicant: ITWorx Egypt
    Inventors: Tarek Nabhan, Youssri Helmy