System and method for url fetching retry mechanism

ABSTRACT

A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved.

RELATED APPLICATION

This patent application is a continuation application of U.S. patentapplication Ser. No. 16/939,077 filed on Jul. 27, 2020, which is acontinuation application of U.S. application Ser. No. 16/938,991, filedon Jul. 26, 2020, which is a continuation application of PCT ApplicationNo. PCT/IL2020/050194 that was filed on Feb. 21, 2020 and which claimsthe benefit of U.S. Provisional Application Ser. No. 62/809,847, whichwas filed on Feb. 25, 2019, from U.S. Provisional Application Ser. No.62/855,036, which was filed on May 31, 2019, and from U.S. ProvisionalApplication Ser. No. 62/948,265, which was filed on Dec. 15, 2019, whichare all hereby incorporated herein by reference in their entirety.

TECHNICAL FIELD

This disclosure relates generally to an apparatus and method forimproving communication over the Internet by retrying fetching ofcontent (such as a web page or web site identified by a URL) by using adirect fetching scheme, or by using a non-direct fetching scheme that isbased on using intermediate nodes, and in particular, retrying of thefetching by using the same or different fetching parameters,characteristics, or schemes, such as by using different proxy servers,using different IP addresses, or using different intermediate deviceswhen retrying the fetching.

BACKGROUND

Unless otherwise indicated herein, the materials described in thissection are not prior art to the claims in this application and are notadmitted to be prior art by inclusion in this section.

The Internet is a global system of interconnected computer networks thatuse the standardized Internet Protocol Suite (TCP/IP), including theTransmission Control Protocol (TCP) and the Internet Protocol (IP), toserve billions of users worldwide. It is a network of networks thatconsists of millions of private, public, academic, business, andgovernment networks, of local to global scope, that are linked by abroad array of electronic and optical networking technologies. TheInternet carries a vast range of information resources and services,such as the interlinked hypertext documents on the World Wide Web (WWW)and the infrastructure to support electronic mail. The Internet backbonerefers to the principal data routes between large, strategicallyinterconnected networks and core routers in the Internet. These dataroutes are hosted by commercial, government, academic, and otherhigh-capacity network centers, the Internet exchange points and networkaccess points that interchange Internet traffic between the countries,continents and across the oceans of the world. Traffic interchangebetween Internet service providers (often Tier 1 networks) participatingin the Internet backbone exchange traffic by privately negotiatedinterconnection agreements, primarily governed by the principle ofsettlement-free peering.

The Transmission Control Protocol (TCP) is one of the core protocols ofthe Internet Protocol suite (IP) described in RFC 675 and RFC 793, andthe entire suite is often referred to as TCP/IP. TCP provides reliable,ordered and error-checked delivery of a stream of octets betweenprograms running on computers connected to a local area network,intranet or the public Internet. It resides at the transport layer. Webbrowsers typically use TCP when they connect to servers on the WorldWide Web, and used to deliver email and transfer files from one locationto another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and avariety of other protocols that are typically encapsulated in TCP. Asthe transport layer of TCP/IP suite, the TCP provides a communicationservice at an intermediate level between an application program and theInternet Protocol (IP). Due to network congestion, traffic loadbalancing, or other unpredictable network behavior, IP packets can belost, duplicated, or delivered out of order. TCP detects these problems,requests retransmission of lost data, rearranges out-of-order data, andeven helps minimize network congestion to reduce the occurrence of theother problems. Once the TCP receiver has reassembled the sequence ofoctets originally transmitted, it passes them to the receivingapplication. Thus, TCP abstracts the application's communication fromthe underlying networking details. The TCP is utilized extensively bymany of the Internet's most popular applications, including the WorldWide Web (WWW), E-mail, File Transfer Protocol, Secure Shell,peer-to-peer file sharing, and some streaming media applications.

While IP layer handles actual delivery of the data, TCP keeps track ofthe individual units of data transmission, called segments, which amessage is divided into for efficient routing through the network. Forexample, when an HTML file is sent from a web server, the TCP softwarelayer of that server divides the sequence of octets of the file intosegments and forwards them individually to the IP software layer(Internet Layer). The Internet Layer encapsulates each TCP segment intoan IP packet by adding a header that includes (among other data) thedestination IP address. When the client program on the destinationcomputer receives them, the TCP layer (Transport Layer) reassembles theindividual segments and ensures they are correctly ordered and errorfree as it streams them to an application.

The TCP protocol operations may be divided into three phases.Connections must be properly established in a multi-step handshakeprocess (connection establishment) before entering the data transferphase. After data transmission is completed, the connection terminationcloses established virtual circuits and releases all allocatedresources. A TCP connection is typically managed by an operating systemthrough a programming interface that represents the local end-point forcommunications, the Internet socket. During the duration of a TCPconnection, the local end-point undergoes a series of state changes.

Since TCP/IP is based on the client/server model of operation, the TCPconnection setup involves the client and server preparing for theconnection by performing an OPEN operation. A client process initiates aTCP connection by performing an active OPEN, sending a SYN message to aserver. A server process using TCP prepares for an incoming connectionrequest by performing a passive OPEN. Both devices create for each TCPsession a data structure used to hold important data related to theconnection, called a Transmission Control Block (TCB).

There are two different kinds of OPEN, named ‘Active OPEN’ and ‘PassiveOPEN’. In Active OPEN the client process using TCP takes the “activerole” and initiates the connection by actually sending a TCP message tostart the connection (a SYN message). In Passive OPEN the server processdesigned to use TCP is contacting TCP and saying: “I am here, and I amwaiting for clients that may wish to talk to me to send me a message onthe following port number”. The OPEN is called passive because asidefrom indicating that the process is listening, the server process doesnothing. A passive OPEN can in fact specify that the server is waitingfor an active OPEN from a specific client, though not all TCP/IP APIssupport this capability. More commonly, a server process is willing toaccept connections from all comers. Such a passive OPEN is then to beunspecified.

In passive OPEN, the TCP uses a three-way handshake, and before a clientattempts to connect with a server, the server must first bind to andlisten at a port to open it up for connections. Once the Passive OPEN isestablished, a client may initiate an Active OPEN. To establish aconnection, the three-way (or 3-step) handshake occurs:

1. SYN: The active open is performed by the client sending a SYN to theserver. The client sets the segment's sequence number to a random valueA.2. SYN-ACK: In response, the server replies with a SYN-ACK. Theacknowledgment number is set to one more than the received sequencenumber, i.e. A+1, and the sequence number that the server chooses forthe packet is another random number, B.3. ACK: Finally, the client sends an ACK back to the server. Thesequence number is set to the received acknowledgement value, i.e. A+1,and the acknowledgement number is set to one more than the receivedsequence number i.e. B+1.

At this point, both the client and server have received anacknowledgment of the connection. The steps 1, 2 establish theconnection parameter (sequence number) for one direction and it isacknowledged. The steps 2, 3 establish the connection parameter(sequence number) for the other direction and it is acknowledged, andthen a full-duplex communication is established.

TCP keepalive. When two hosts are connected over a network via TCP/IP,TCP Keepalive Packets can be used to determine if the connection isstill valid, and terminate it if needed. Most hosts that support TCPalso support TCP Keepalive, where each host (or peer) periodically sendsa TCP packet to its peer which solicits a response. The TCP keepalivescheme involves using timers when setting up a TCP connection, and whenthe keepalive timer reaches zero, a keepalive probe packet is sent withno data in it and the ACK flag turned on. This procedure is usefulbecause if the other peers lose their connection (for example byrebooting) the broken connection is noticed, even no traffic on it isexchanged. If the keepalive probe is not replied to, the connectioncannot be considered valid anymore. The TCP keepalive mechanism may beused to prevent inactivity from disconnecting the channel. For example,when being behind a NAT proxy or a firewall, a host may be disconnectedwithout a reason. This behavior is caused by the connection trackingprocedures implemented in proxies and firewalls, which keep track of allconnections that pass through them. Due to the physical limits of thesemachines, they can only keep a finite number of connections in theirmemory. The most common and logical policy is to keep newest connectionsand to discard old and inactive connections first.

A keepalive signal is often sent at predefined intervals, and plays animportant role on the Internet. After a signal is sent, if no reply isreceived the link is assumed to be down and future data will be routedvia another path until the link is up again. A keepalive signal can alsobe used to indicate to Internet infrastructure that the connectionshould be preserved. Without a keepalive signal, intermediateNAT-enabled routers can drop the connection after timeout. Since theonly purpose is to find links that don't work or to indicate connectionsthat should be preserved, keepalive messages tend to be short and nottake much bandwidth.

Transmission Control Protocol (TCP) keepalives are an optional feature,and if included must default to off. The keepalive packet contains nulldata, and in an Ethernet network, a keepalive frame length is 60 bytes,while the server response to this, also a null data frame, is 54 bytes.There are three parameters related to keepalive: Keepalive time is theduration between two keepalive transmissions in idle condition where TCPkeepalive period is required to be configurable and by default is set tono less than 2 hours, Keepalive interval is the duration between twosuccessive keepalive retransmissions, if acknowledgement to the previouskeepalive transmission is not received, and Keepalive retry is thenumber of retransmissions to be carried out before declaring that remoteend is not available.

The Internet Protocol (IP) is the principal communications protocol usedfor relaying datagrams (packets) across a network using the InternetProtocol Suite. Responsible for routing packets across networkboundaries, it is the primary protocol that establishes the Internet. IPis the primary protocol in the Internet Layer of the Internet ProtocolSuite and has the task of delivering datagrams from the source host tothe destination host based on their addresses. For this purpose, IPdefines addressing methods and structures for datagram encapsulation.Internet Protocol Version 4 (IPv4) is the dominant protocol of theInternet. IPv4 is described in Internet Engineering Task Force (IETF)Request for Comments (RFC) 791 and RFC 1349, and the successor, InternetProtocol Version 6 (IPv6), is currently active and in growing deploymentworldwide. IPv4 uses 32-bit addresses (providing 4 billion: 4.3×10⁹addresses), while IPv6 uses 128-bit addresses (providing 340 undecillionor 3.4×10³⁸ addresses), as described in RFC 2460.

An overview of an IP-based packet 15 is shown in FIG. 2 a . The packetmay be generally segmented into the IP data 16 b to be carried aspayload, and the IP header 16 f. The IP header 16 f contains the IPaddress of the source as Source IP Address field 16 d and theDestination IP Address field 16 c. In most cases, the IP header 16 f andthe payload 16 b are further encapsulated by adding a Frame Header 16 eand Frame Footer 16 a used by higher layer protocols.

The Internet Protocol is responsible for addressing hosts and routingdatagrams (packets) from a source host to the destination host acrossone or more IP networks. For this purpose the Internet Protocol definesan addressing system that has two functions. Addresses identify hostsand provide a logical location service. Each packet is tagged with aheader that contains the meta-data for the purpose of delivery. Thisprocess of tagging is also called encapsulation. IP is a connectionlessprotocol for use in a packet-switched Link Layer network, and does notneed circuit setup prior to transmission. The aspects of guaranteeingdelivery, proper sequencing, avoidance of duplicate delivery, and dataintegrity are addressed by an upper transport layer protocol (e.g.,TCP—Transmission Control Protocol and UDP—User Datagram Protocol).

The main aspects of the IP technology are IP addressing and routing.Addressing refers to how IP addresses are assigned to end hosts and howsub-networks of IP host addresses are divided and grouped together. IProuting is performed by all hosts, but most importantly by internetworkrouters, which typically use either Interior Gateway Protocols (IGPs) orExternal Gateway Protocols (EGPs) to help make IP datagram forwardingdecisions across IP connected networks. Core routers serving in theInternet backbone commonly use the Border Gateway Protocol (BGP) as perRFC 4098 or Multi-Protocol Label Switching (MPLS). Other prior artpublications relating to Internet related protocols and routing includethe following chapters of the publication number 1-587005-001-3 by CiscoSystems, Inc. (July 1999) entitled: “Internetworking TechnologiesHandbook”, which are all incorporated in their entirety for all purposesas if fully set forth herein: Chapter 5: “Routing Basics” (pages 5-1 to5-10), Chapter 30: “Internet Protocols” (pages 30-1 to 30-16), Chapter32: “IPv6” (pages 32-1 to 32-6), Chapter 45: “OS/Routing” (pages 45-1 to45-8) and Chapter 51: “Security” (pages 51-1 to 51-12), as well as in aIBM Corporation, International Technical Support Organization RedbookDocuments No. GG24-4756-00, entitled: “Local area Network Concepts andProducts: LAN Operation Systems and management”, 1st Edition May 1996,Redbook Document No. GG24-4338-00, entitled: “Introduction to NetworkingTechnologies”, 1st Edition April 1994, Redbook Document No. GG24-2580-01“IP Network Design Guide”, 2^(nd) Edition June 1999, and RedbookDocument No. GG24-3376-07 “TCP/IP Tutorial and Technical Overview”, ISBN0738494682 8th Edition December 2006, which are incorporated in theirentirety for all purposes as if fully set forth herein.

An Internet packet typically includes a value of Time-to-Live (TTL) foravoiding the case of packet looping endlessly. The initial TTL value isset in the header of the packet, and each router in the packet pathsubtracts one from the TTL field, and the packet is discarded upon thevalue exhaustion. Since the packets may be routed via different anddisparately located routers and servers, the TTL of the packets reachingthe ultimate destination computer are expected to vary.

The Internet architecture employs a client-server model, among otherarrangements. The terms ‘server’ or ‘server computer’ relates herein toa device or computer (or a plurality of computers) connected to theInternet and is used for providing facilities or services to othercomputers or other devices (referred to in this context as ‘clients’)connected to the Internet. A server is commonly a host that has an IPaddress and executes a ‘server program’, and typically operates as asocket listener. Many servers have dedicated functionality such as webserver, Domain Name System (DNS) server (described in RFC 1034 and RFC1035), Dynamic Host Configuration Protocol (DHCP) server (described inRFC 2131 and RFC 3315), mail server, File Transfer Protocol (FTP) serverand database server. Similarly, the term ‘client’ is used herein toinclude, but not limited to, a program or to a device or a computer (ora series of computers) executing this program, which accesses a serverover the Internet for a service or a resource. Clients commonly initiateconnections that a server may accept. For non-limiting example, webbrowsers are clients that connect to web servers for retrieving webpages, and email clients connect to mail storage servers for retrievingmails.

Web page. A web-page is typically a collection of information,consisting of one or more resources, intended to be renderedsimultaneously, and identified by a single Uniform Resource Identifier.More specifically, a web page may consist of a resource with zero, one,or more embedded resources intended to be rendered as a single unit, andreferred to by the URI of the one resource which is not embedded. AUniform Resource Identifier (URI) is intended to be recognized by a useras representing the identity of a specific Web Page (resource). Aresource may include a network data object or service that can beidentified by a URI. Resources may be available in multiplerepresentations (e.g. multiple languages, data formats, size, orresolution) or vary in other ways. The URI specification defines aUniform Resource Identifier (URI) or URL (Uniform Resource Locator) as acompact string of characters for identifying an abstract or physicalresource.

HTTP. The Hypertext Transfer Protocol (HTTP) is an application protocolfor distributed, collaborative, hypermedia information systems, commonlyused for communication over the Internet. Hypertext is. HTTP is theprotocol to exchange or transfer hypertext, which is a structured textthat uses logical links (hyperlinks) between nodes containing text. HTTPversion 1.1 was standardized as RFC 2616 (June 1999), which was replacedby a set of standards (obsoleting RFC 2616), including RFC7230—HTTP/1.1: Message Syntax and Routing, RFC 7231—‘HTTP/1.1: Semanticsand Content’, RFC 7232—‘HTTP/1.1: Conditional Requests’, RFC7233—‘HTTP/1.1: Range Requests’, RFC 7234—‘HTTP/1.1: Caching’, and RFC7235—‘HTTP/1.1: Authentication’. HTTP functions as a request-responseprotocol in the client-server computing model. A web browser, forexample, may be the client and an application running on a computerhosting a website may be the server. The client submits an HTTP requestmessage to the server. The server, which provide resources such as HTMLfiles and other content, or performs other functions on behalf of theclient, returns a response message to the client. The response containscompletion status information about the request and may also containrequested content in its message body. A web browser is an example of aUser Agent (UA). Other types of user agent include the indexing softwareused by search providers (web crawlers), voice browsers, mobile apps andother software that accesses, consumes or displays web content.

HTTP is designed to permit intermediate network elements to improve orenable communications between clients and servers. High-traffic websitesoften benefit from web cache servers that deliver content on behalf ofupstream servers to improve response time. Web browsers cache previouslyaccessed web resources and reuse them when possible, to reduce networktraffic. HTTP proxy servers at private network boundaries can facilitatecommunication for clients without a globally routable address, byrelaying messages with external servers. HTTP is an application layerprotocol designed within the framework of the Internet Protocol Suite.Its definition presumes an underlying and reliable transport layerprotocol, and Transmission Control Protocol (TCP) is commonly used.However, HTTP can use unreliable protocols such as the User DatagramProtocol (UDP), for example, in the Simple Service Discovery Protocol(SSDP). HTTP resources are identified and located on the network byUniform Resource Identifiers (URIs) or, more specifically, UniformResource Locators (URLs), using the http or https URI schemes. URIs andhyperlinks in Hypertext Markup Language (HTML) documents form webs ofinter-linked hypertext documents. An HTTP session is a sequence ofnetwork request-response transactions. An HTTP client initiates arequest by establishing a Transmission Control Protocol (TCP) connectionto a particular port on a server. An HTTP server listening on that portwaits for a client's request message. Upon receiving the request, theserver sends back a status line, such as “HTTP/1.1 200 OK”, and amessage of its own. The body of this message is typically the requestedresource, although an error message or other information may also bereturned. HTTP is a stateless protocol. A stateless protocol does notrequire the HTTP server to retain information or status

HTTP persistent connection, also called HTTP keep-alive, or HTTPconnection reuse, refers to using a single TCP connection to send andreceive multiple HTTP requests/responses, as opposed to opening a newconnection for every single request/response pair. Persistentconnections provide a mechanism by which a client and a server cansignal the close of a TCP connection. This signaling takes place usingthe Connection header field. The HTTP persistent connection is describedin IETF RFC 2616, entitled: “Hypertext Transfer Protocol—HTTP/1.1”. InHTTP 1.1, all connections are considered persistent unless declaredotherwise. The HTTP persistent connections do not use separate keepalivemessages, but they allow multiple requests to use a single connection.The advantages of using persistent connections involve lower CPU andmemory usage (because fewer connections are open simultaneously),enabling HTTP pipelining of requests and responses, reduced networkcongestion (due to fewer TCP connections), and reduced latency insubsequent requests (due to minimal handshaking). Any connection hereinmay use, or be based on, an HTTP persistent connection.

HTTPS. HTTPS (also referred to as HTTP over Transport Layer Security(TLS), HTTP over SSL, and HTTP Secure) is a communications protocol forsecure communication over a computer network which is widely used on theInternet. HTTPS consists of communication over Hypertext TransferProtocol (HTTP) within a connection encrypted by Transport LayerSecurity, or its predecessor, Secure Sockets Layer. The main motivationfor HTTPS is authentication of the visited website and protection of theprivacy and integrity of the exchanged data. HTTPS typically providesauthentication of the website and associated web server with which oneis communicating, which protects against man-in-the-middle attacks.Additionally, it provides bidirectional encryption of communicationsbetween a client and server, which protects against eavesdropping andtampering with or forging the contents of the communication. Inpractice, this provides a reasonable guarantee that one is communicatingwith precisely the website that one intended to communicate with (asopposed to an impostor), as well as ensuring that the contents ofcommunications between the user and site cannot be read or forged by anythird party.

The HTTPS Uniform Resource Identifier (URI) scheme has identical syntaxto the standard HTTP scheme, aside from its scheme token. However, HTTPSsignals the browser to use an added encryption layer of SSL/TLS toprotect the traffic. SSL/TLS is especially suited for HTTP, since it canprovide some protection even if only one side of the communication isauthenticated. This is the case with HTTP transactions over theInternet, where typically only the server is authenticated (by theclient examining the server's certificate). HTTPS creates a securechannel over an insecure networks, hence ensuring reasonable protectionfrom eavesdroppers and man-in-the-middle attacks, provided that adequatecipher suites are used and that the server certificate is verified andtrusted. Because HTTPS piggybacks HTTP entirely on top of TLS, theentirety of the underlying HTTP protocol can be encrypted. This includesthe request URL (which particular web page was requested), queryparameters, headers, and cookies (which often contain identityinformation about the user). However, because host (website) addressesand port numbers are necessarily part of the underlying TCP/IPprotocols, HTTPS cannot protect their disclosure. In practice this meansthat even on a correctly configured web server, eavesdroppers can inferthe IP address and port number of the web server (sometimes even thedomain name e.g., www.example.org, but not the rest of the URL) that oneis communicating with, as well as the amount (data transferred) andduration (length of session) of the communication, though not thecontent of the communication.

Deploying HTTPS also allows the use of HTTP/2 (or its predecessor, thenow-deprecated protocol SPDY), that are new generations of HTTP,designed to reduce page load times and latency. HTTP Strict TransportSecurity (HSTS) is typically used with HTTPS to protect users fromman-in-the-middle attacks, especially SSL stripping. While HTTPS URLsbegin with “https://” and use port 443 by default, or alternatively8443, the HTTP URLs begin with “http://” and use port 80 by default, andHTTP is not encrypted and is thus vulnerable to man-in-the-middle andeavesdropping attacks, which can let attackers gain access to websiteaccounts and sensitive information, and modify webpages to injectmalware or advertisements. HTTPS is designed to withstand such attacksand is considered secure against them (with the exception of older,deprecated versions of SSL).

HTTP Status codes. The Hypertext Transfer Protocol (HTTP) is a statelessapplication-level protocol for distributed, collaborative, hypertextinformation systems. The semantics of HTTP/1.1 messages, as expressed byrequest methods, request header fields, response status codes, andresponse header fields, along with the payload of messages (metadata andbody content) and mechanisms for content, are described in IETF RFC7231, entitled: “Hypertext Transfer Protocol (HTTP/1.1): Semantics andContent” (June 2014), which is incorporated in its entirety for allpurposes as if fully set forth herein. Status codes are typically issuedby a server in response to a client request made to the server. Thefirst digit of the status code specifies one of five standard classes ofresponses. The message phrases shown are typical, but any human-readablealternative may be provided.

All HTTP response status codes are separated into five classes orcategories. The first digit of the status code defines the class ofresponse, while the last two digits do not have any classifying orcategorization role. There are five classes defined by the standard: 1xx(100 to 199) informational response—the request was received, continuingprocess; 2xx (200 to 299) successful—the request was successfullyreceived, understood and accepted; 3xx (300-399) redirection—furtheraction needs to be taken in order to complete the request; 4xx (400 to499) client error—the request contains bad syntax or cannot befulfilled; and 5xx (500 to 599) server error—the server failed to fulfilan apparently valid request.

The status code ‘200 OK’ is a standard response for successful HTTPrequests. The actual response will depend on the request method used. Ina GET request, the response will contain an entity corresponding to therequested resource. In a POST request, the response will contain anentity describing or containing the result of the action.

The HTTP 404, ‘404 Not Found’, ‘404’, ‘Page Not Found’, or ‘Server NotFound’ error message is a Hypertext Transfer Protocol (HTTP) standardresponse code, in computer network communications, to indicate that thebrowser was able to communicate with a given server, but the servercould not find what was requested. Further, when the requestedinformation is found but access is not granted, the server may return a404 error if it wishes to not disclose this information, as well. Thewebsite hosting server will typically generate a “404 Not Found” webpage when a user attempts to follow a broken or dead link; hence the 404error is one of the most recognizable errors encountered on the WorldWide Web. When communicating via HTTP, a server is required to respondto a request, such as a web browser request for a web page, with anumeric response code and an optional, mandatory, or disallowed (basedupon the status code) message. In the code 404, the first digitindicates a client error, such as a mistyped Uniform Resource Locator(URL). The following two digits indicate the specific error encountered.HTTP's use of three-digit codes is similar to the use of such codes inearlier protocols such as FTP and NNTP. At the HTTP level, a 404response code is followed by a human-readable “reason phrase”. The HTTPspecification suggests the phrase “Not Found”[2] and many web servers bydefault issue an HTML page that includes both the 404 code and the “NotFound” phrase.

A 404 error is often returned when pages have been moved or deleted. Inthe first case, it is better to employ URL mapping or URL redirection byreturning a 301 Moved Permanently response, which can be configured inmost server configuration files, or through URL rewriting; in the secondcase, a 410 Gone should be returned. Because these two options requirespecial server configuration, most websites do not make use of them. A404 error indicates that the server itself was found, but that theserver was not able to retrieve the requested page.

5xx Server errors indicate that the server failed to fulfill a request.Response status codes beginning with the digit “5” indicate cases inwhich the server is aware that it has encountered an error or isotherwise incapable of performing the request. Except when responding toa HEAD request, the server should include an entity containing anexplanation of the error situation, and indicate whether it is atemporary or permanent condition. Likewise, user agents should displayany included entity to the user. These response codes are applicable toany request method.

URL Redirection. URL redirection, also referred to as ‘URL forwarding’,is a technique for making a web page available under more than one URLaddress. When a web browser attempts to open a URL that has beenredirected, a page with a different URL is opened. Similarly, domainredirection or domain forwarding is when all pages in a URL domain areredirected to a different domain, as when wikipedia.com andwikipedia.net are automatically redirected to wikipedia.org. URLredirection is done for various reasons: for URL shortening; to preventbroken links when web pages are moved; to allow multiple domain namesbelonging to the same owner to refer to a single web site; to guidenavigation into and out of a website; for privacy protection; and forhostile purposes such as phishing attacks or malware distribution.

‘3xx Redirection’ is a class of status code indicates the client musttake additional action to complete the request. Many of these statuscodes are used in URL redirection. A user agent may carry out theadditional action with no user interaction only if the method used inthe second request is GET or HEAD. A user agent may automaticallyredirect a request. A user agent should detect and intervene to preventcyclical redirects. In the HTTP protocol used by the World Wide Web, aredirect is a response with a status code beginning with 3 that causes abrowser to display a different page. If a client encounters a redirect,it needs to make a number of decisions how to handle the redirect.Different status codes are used by clients to understand the purpose ofthe redirect, how to handle caching and which request method to use forthe subsequent request. The HTTP/1.1 defines several status codes forredirection (RFC 7231): 300 multiple choices (e.g. offer differentlanguages); 301 moved permanently (redirects permanently from one URL toanother passing link equity to the redirected page); 302 found(originally “temporary redirect” in HTTP/1.0 and popularly used for CGIscripts; superseded by 303 and 307 in HTTP/1.1 but preserved forbackward compatibility); 303 see other (forces a GET request to the newURL even if original request was POST); 307 temporary redirect (providesa new URL for the browser to resubmit a GET or POST request); and 308permanent redirect (provides a new URL for the browser to resubmit a GETor POST request).

ASN. Within the Internet, an Autonomous System (AS) is a collection ofconnected Internet Protocol (IP) routing prefixes under the control ofone or more network operators on behalf of a single administrativeentity or domain that presents a common, clearly defined routing policyto the Internet. Autonomous System (AS) Numbers (ASNs) are used byvarious routing protocols, and IANA allocates AS Numbers to RegionalInternet Registries (RIRs). The RIRs further allocate or assign ASNumbers to network operators in line with RIR policies. Originally thedefinition required control by a single entity, typically an InternetService Provider (ISP) or a very large organization with independentconnections to multiple networks, that adhere to a single and clearlydefined routing policy, as originally defined in RFC 1771. The newerdefinition in RFC 1930 came into use to support multiple organizationsthat run Border Gateway Protocol (BGP) using private AS numbers to anISP that connects all those organizations to the Internet. Even thoughthere may be multiple autonomous systems supported by the ISP, theInternet only sees the routing policy of the ISP. That ISP must have anofficially registered Autonomous System Number (ASN). A unique ASN isallocated to each AS for use in BGP routing, and an ASN uniquelyidentifies each network on the Internet. ASN representation is describedin IETF 5396 dated December 2008 and entitled: “Textual Representationof Autonomous System (AS) Numbers”, and four octets ASKs are describedin IETF RFC 6793 dated December 2012 entitled: “BGP Support forFour-Octet Autonomous System (AS) Number Space”.

Autonomous systems can be grouped into four categories, depending ontheir connectivity and operating policy. A multihomed autonomous systemis an AS that maintains connections to more than one other AS. Thisallows the AS to remain connected to the Internet in the event of acomplete failure of one of their connections. However, unlike a transitAS, this type of AS would not allow traffic from one AS to pass throughon its way to another AS. A stub autonomous system refers to an AS thatis connected to only one other AS. This may be an apparent waste of anAS number if the network's routing policy is the same as its upstreamAS's. However, the stub AS may, in fact, have peering with otherautonomous systems that is not reflected in public route-view servers.Specific examples include private interconnections in the financial andtransportation sectors. A transit autonomous system is an AS thatprovides connections through itself to other networks. That is, networkA can use network B, the transit AS, to connect to network C. If one ASis an ISP for another, then the former is a transit AS. An InternetExchange Point autonomous system (IX or IXP) is a physicalinfrastructure through which Internet service providers (ISPs) orcontent delivery networks (CDNs) exchange Internet traffic between theirnetworks (autonomous systems).

An Operating System (OS) is software that manages computer hardwareresources and provides common services for computer programs. Theoperating system is an essential component of any system software in acomputer system, and most application programs usually require anoperating system to function. For hardware functions such as input andoutput and memory allocation, the operating system acts as anintermediary between programs and the computer hardware, although theapplication code is usually executed directly by the hardware and willfrequently make a system call to an OS function or be interrupted by it.Common features typically supported by operating systems include processmanagement, interrupts handling, memory management, file system, devicedrivers, networking (such as TCP/IP and UDP), and Input/Output (I/O)handling. Examples of popular modern operating systems include Android,BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBMz/OS.

A server device (in server/client architecture) typically offersinformation resources, services, and applications to clients, and isusing a server dedicated or oriented operating system. Current popularserver operating systems are based on Microsoft Windows (by MicrosoftCorporation, headquartered in Redmond, Wash., U.S.A.), Unix, andLinux-based solutions, such as the ‘Windows Server 2012’ serveroperating system is part of the Microsoft ‘Windows Server’ OS family,that was released by Microsoft on 2012, providing enterprise-classdatacenter and hybrid cloud solutions that are simple to deploy,cost-effective, application-focused, and user-centric, and is describedin Microsoft publication entitled: “Inside-Out Windows Server 2012”, byWilliam R. Stanek, published 2013 by Microsoft Press, which isincorporated in its entirety for all purposes as if fully set forthherein.

Unix operating systems are widely used in servers. Unix is amultitasking, multiuser computer operating system that exists in manyvariants, and is characterized by a modular design that is sometimescalled the “Unix philosophy,” meaning the OS provides a set of simpletools that each perform a limited, well-defined function, with a unifiedfilesystem as the main means of communication, and a shell scripting andcommand language to combine the tools to perform complex workflows. Unixwas designed to be portable, multi-tasking and multi-user in atime-sharing configuration, and Unix systems are characterized byvarious concepts: the use of plain text for storing data; a hierarchicalfile system; treating devices and certain types of Inter-ProcessCommunication (IPC) as files; and the use of a large number of softwaretools, small programs that can be strung together through a command lineinterpreter using pipes, as opposed to using a single monolithic programthat includes all of the same functionality. Under Unix, the operatingsystem consists of many utilities along with the master control program,the kernel. The kernel provides services to start and stop programs,handles the file system and other common “low level” tasks that mostprograms share, and schedules access to avoid conflicts when programstry to access the same resource or device simultaneously. To mediatesuch access, the kernel has special rights, reflected in the divisionbetween user-space and kernel-space. Unix is described in a publicationentitled: “UNIX Tutorial” by tutorialspoint.com, downloaded on July2014, which is incorporated in its entirety for all purposes as if fullyset forth herein.

A client device (in server/client architecture) typically receivesinformation resources, services, and applications from servers, and isusing a client dedicated or oriented operating system. Current popularserver operating systems are based on Microsoft Windows (by MicrosoftCorporation, headquartered in Redmond, Wash., U.S.A.), which is a seriesof graphical interface operating systems developed, marketed, and soldby Microsoft. Microsoft Windows is described in Microsoft publicationsentitled: “Windows Internals—Part 1” and “Windows Internals—Part 2”, byMark Russinovich, David A. Solomon, and Alex Ioescu, published byMicrosoft Press in 2012, which are both incorporated in their entiretyfor all purposes as if fully set forth herein. Windows 8 is a personalcomputer operating system developed by Microsoft as part of Windows NTfamily of operating systems, that was released for general availabilityon October 2012, and is described in Microsoft Press 2012 publicationentitled: “Introducing Windows 8—An Overview for IT Professionals” byJerry Honeycutt, which is incorporated in its entirety for all purposesas if fully set forth herein.

Chrome OS is a Linux kernel-based operating system designed by GoogleInc. out of Mountain View, Calif., U.S.A., to work primarily with webapplications. The user interface takes a minimalist approach andconsists almost entirely of just the Google Chrome web browser; sincethe operating system is aimed at users who spend most of their computertime on the Web, the only “native” applications on Chrome OS are abrowser, media player and file manager, and hence the Chrome OS isalmost a pure web thin client OS.

The Chrome OS is described as including a three-tier architecture:firmware, browser and window manager, and system-level software anduserland services. The firmware contributes to fast boot time by notprobing for hardware, such as floppy disk drives, that are no longercommon on computers, especially netbooks. The firmware also contributesto security by verifying each step in the boot process and incorporatingsystem recovery. The system-level software includes the Linux kernelthat has been patched to improve boot performance. The userland softwarehas been trimmed to essentials, with management by Upstart, which canlaunch services in parallel, re-spawn crashed jobs, and defer servicesin the interest of faster booting. The Chrome OS user guide is describedin the Samsung Electronics Co., Ltd. presentation entitled: “Google™Chrome OS USER GUIDE” published 2011, which is incorporated in itsentirety for all purposes as if fully set forth herein.

RTOS. A Real-Time Operating System (RTOS) is an Operating System (OS)intended to serve real-time applications that process data as it comesin, typically without buffer delays. Processing time requirements(including any OS delay) are typically measured in tenths of seconds orshorter increments of time, and is a time bound system which has welldefined fixed time constraints. Processing is commonly to be done withinthe defined constraints, or the system will fail. They either are eventdriven or time sharing, where event driven systems switch between tasksbased on their priorities while time sharing systems switch the taskbased on clock interrupts. A key characteristic of an RTOS is the levelof its consistency concerning the amount of time it takes to accept andcomplete an application's task; the variability is jitter. A hardreal-time operating system has less jitter than a soft real-timeoperating system. The chief design goal is not high throughput, butrather a guarantee of a soft or hard performance category. An RTOS thatcan usually or generally meet a deadline is a soft real-time OS, but ifit can meet a deadline deterministically it is a hard real-time OS. AnRTOS has an advanced algorithm for scheduling, and includes a schedulerflexibility that enables a wider, computer-system orchestration ofprocess priorities. Key factors in a real-time OS are minimal interruptlatency and minimal thread switching latency; a real-time OS is valuedmore for how quickly or how predictably it can respond than for theamount of work it can perform in a given period of time.

Common designs of RTOS include event-driven, where tasks are switchedonly when an event of higher priority needs servicing; called preemptivepriority, or priority scheduling, and time-sharing, where task areswitched on a regular clocked interrupt, and on events; called roundrobin. Time sharing designs switch tasks more often than strictlyneeded, but give smoother multitasking, giving the illusion that aprocess or user has sole use of a machine. In typical designs, a taskhas three states: Running (executing on the CPU); Ready (ready to beexecuted); and Blocked (waiting for an event, I/O for example). Mosttasks are blocked or ready most of the time because generally only onetask can run at a time per CPU. The number of items in the ready queuecan vary greatly, depending on the number of tasks the system needs toperform and the type of scheduler that the system uses. On simplernon-preemptive but still multitasking systems, a task has to give up itstime on the CPU to other tasks, which can cause the ready queue to havea greater number of overall tasks in the ready to be executed state(resource starvation).

RTOS concepts and implementations are described in an Application NoteNo. RES05B00008-0100/Rec. 1.00 published January 2010 by RenesasTechnology Corp. entitled: “R8C Family—General RTOS Concepts”, in JAJATechnology Review article published February 2007 [1535-5535/$32.00] byThe Association for Laboratory Automation[doi:10.1016/j.jala.2006.10.016] entitled: “An Overview of Real-TimeOperating Systems”, and in Chapter 2 entitled: “Basic Concepts of RealTime Operating Systems” of a book published 2009[ISBN—978-1-4020-9435-4] by Springer Science+Business Media B.V.entitled: “Hardware-Dependent Software—Principles and Practice”, whichare all incorporated in their entirety for all purposes as if fully setforth herein.

QNX. One example of RTOS is QNX, which is a commercial Unix-likereal-time operating system, aimed primarily at the embedded systemsmarket. QNX was one of the first commercially successful microkerneloperating systems and is used in a variety of devices including cars andmobile phones. As a microkernel-based OS, QNX is based on the idea ofrunning most of the operating system kernel in the form of a number ofsmall tasks, known as Resource Managers. In the case of QNX, the use ofa microkernel allows users (developers) to turn off any functionalitythey do not require without having to change the OS itself; instead,those services will simply not run.

FreeRTOS. FreeRTOS™ is a free and open-source Real-Time Operating systemdeveloped by Real Time Engineers Ltd., designed to fit on small embeddedsystems and implements only a very minimalist set of functions: verybasic handle of tasks and memory management, and just sufficient APIconcerning synchronization. Its features include characteristics such aspreemptive tasks, support for multiple microcontroller architectures, asmall footprint (4.3 Kbytes on an ARM7 after compilation), written in C,and compiled with various C compilers. It also allows an unlimitednumber of tasks to run at the same time, and no limitation about theirpriorities as long as used hardware can afford it.

FreeRTOS™ provides methods for multiple threads or tasks, mutexes,semaphores and software timers. A tick-less mode is provided for lowpower applications, and thread priorities are supported. Four schemes ofmemory allocation are provided: allocate only; allocate and free with avery simple, fast, algorithm; a more complex but fast allocate and freealgorithm with memory coalescence; and C library allocate and free withsome mutual exclusion protection. While the emphasis is on compactnessand speed of execution, a command line interface and POSIX-like IOabstraction add-ons are supported. FreeRTOS™ implements multiple threadsby having the host program call a thread tick method at regular shortintervals.

The thread tick method switches tasks depending on priority and around-robin scheduling scheme. The usual interval is 1/1000 of a secondto 1/100 of a second, via an interrupt from a hardware timer, but thisinterval is often changed to suit a particular application. FreeRTOS™ isdescribed in a paper by Nicolas Melot (downloaded July 2015) entitled:“Study of an operating system: FreeRTOS—Operating systems for embeddeddevices”, in a paper (dated Sep. 23, 2013) by Dr. Richard Wall entitled:“Carebot PIC32 MX7ck implementation of Free RTOS”, FreeRTOS™ modules aredescribed in web pages entitled: “FreeRTOS™ Modules” published in thewww.freertos.org web-site dated 26 Nov. 2006, and FreeRTOS kernel isdescribed in a paper published 1 Apr. 2007 by Rich Goyette of CarletonUniversity as part of ‘SYSC5701: Operating System Methods for Real-TimeApplications’, entitled: “An Analysis and Description of the InnerWorkings of the FreeRTOS Kernel”, which are all incorporated in theirentirety for all purposes as if fully set forth herein.

SafeRTOS. SafeRTOS was constructed as a complementary offering toFreeRTOS, with common functionality but with a uniquely designedsafety-critical implementation. When the FreeRTOS functional model wassubjected to a full HAZOP, weakness with respect to user misuse andhardware failure within the functional model and API were identified andresolved. Both SafeRTOS and FreeRTOS share the same schedulingalgorithm, have similar APIs, and are otherwise very similar, but theywere developed with differing objectives. SafeRTOS was developed solelyin the C language to meet requirements for certification to IEC61508.SafeRTOS is known for its ability to reside solely in the on-chip readonly memory of a microcontroller for standards compliance. Whenimplemented in hardware memory, SafeRTOS code can only be utilized inits original configuration, so certification testing of systems usingthis OS need not re-test this portion of their designs during thefunctional safety certification process.

VxWorks. VxWorks is an RTOS developed as proprietary software anddesigned for use in embedded systems requiring real-time, deterministicperformance and, in many cases, safety and security certification, forindustries, such as aerospace and defense, medical devices, industrialequipment, robotics, energy, transportation, network infrastructure,automotive, and consumer electronics. VxWorks supports Intelarchitecture, POWER architecture, and ARM architectures. The VxWorks maybe used in multicore asymmetric multiprocessing (AMP), symmetricmultiprocessing (SMP), and mixed modes and multi-OS (via Type 1hypervisor) designs on 32- and 64-bit processors. VxWorks comes with thekernel, middleware, board support packages, Wind River Workbenchdevelopment suite and complementary third-party software and hardwaretechnologies. In its latest release, VxWorks 7, the RTOS has beenre-engineered for modularity and upgradeability so the OS kernel isseparate from middleware, applications and other packages. Scalability,security, safety, connectivity, and graphics have been improved toaddress Internet of Things (IoT) needs.

μC/OS. Micro-Controller Operating Systems (MicroC/OS, stylized as μC/OS)is a real-time operating system (RTOS) that is a priority-basedpreemptive real-time kernel for microprocessors, written mostly in theprogramming language C, and is intended for use in embedded systems.MicroC/OS allows defining several functions in C, each of which canexecute as an independent thread or task. Each task runs at a differentpriority, and runs as if it owns the central processing unit (CPU).Lower priority tasks can be preempted by higher priority tasks at anytime. Higher priority tasks use operating system (OS) services (such asa delay or event) to allow lower priority tasks to execute. OS servicesare provided for managing tasks and memory, communicating between tasks,and timing.

Operating systems: An Operating System (OS) is software that managescomputer hardware resources and provides common services for computerprograms. The operating system is an essential component of any systemsoftware in a computer system, and most application programs usuallyrequire an operating system to function. For hardware functions such asinput and output and memory allocation, the operating system acts as anintermediary between programs and the computer hardware, although theapplication code is usually executed directly by the hardware and willfrequently make a system call to an OS function or be interrupted by it.Common features typically supported by operating systems include processmanagement, interrupts handling, memory management, file system, devicedrivers, networking (such as TCP/IP and UDP), and Input/Output (I/O)handling. Examples of popular modern operating systems include Android,BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBMz/OS.

Process management. The operating system provides an interface betweenan application program and the computer hardware, so that an applicationprogram can interact with the hardware only by obeying rules andprocedures programmed into the operating system. The operating system isalso a set of services which simplify development and execution ofapplication programs. Executing an application program involves thecreation of a process by the operating system kernel which assignsmemory space and other resources, establishes a priority for the processin multi-tasking systems, loads program binary code into memory, andinitiates execution of the application program which then interacts withthe user and with hardware devices. The OS must allocate resources toprocesses, enable processes to share and exchange information, protectthe resources of each process from other processes, and enablesynchronization among processes. The OS maintains a data structure foreach process, which describes the state and resource ownership of thatprocess and enables the OS to exert control over each process.

In many modern operating systems, there can be more than one instance ofa program loaded in memory at the same time; for example, more than oneuser could be executing the same program, each user having separatecopies of the program loaded into memory. With some programs, known asre-entrant type, it is possible to have one copy loaded into memory,while several users have shared access to it so that they each canexecute the same program-code. The processor at any instant can only beexecuting one instruction from one program but several processes can besustained over a period of time by assigning each process to theprocessor at intervals while the remainder becomes temporarily inactive.A number of processes being executed over a period of time instead of atthe same time is called concurrent execution. A multiprogramming ormultitasking OS is a system executing many processes concurrently. Amultiprogramming requires that the processor be allocated to eachprocess for a period of time, and de-allocated at an appropriate moment.If the processor is de-allocated during the execution of a process, itmust be done in such a way that it can be restarted later as easily aspossible.

There are two typical ways for an OS to regain control of the processorduring a program's execution in order for the OS to performde-allocation or allocation: The process issues a system call (sometimescalled a software interrupt); for example, an I/O request occursrequesting to access a file on hard disk. Alternatively, a hardwareinterrupt occurs; for example, a key was pressed on the keyboard, or atimer runs out (used in pre-emptive multitasking). The stopping of oneprocess and starting (or restarting) of another process is called acontext switch or context change. In many modern operating systems,processes can consist of many sub-processes. This introduces the conceptof a thread. A thread may be viewed as a sub-process; that is, aseparate, independent sequence of execution within the code of oneprocess. Threads are becoming increasingly important in the design ofdistributed and client—server systems and in software run onmulti-processor systems.

Modes. Many contemporary processors incorporate a mode bit to define theexecution capability of a program in the processor. This bit can be setto a kernel mode or a user mode. A kernel mode is also commonly referredto as supervisor mode, monitor mode or ring 0. In kernel mode, theprocessor can execute every instruction in its hardware repertoire,whereas in user mode, it can only execute a subset of the instructions.Instructions that can be executed only in kernel mode are called kernel,privileged or protected instructions to distinguish them from the usermode instructions. For example, I/O instructions are privileged. So, ifan application program executes in user mode, it cannot perform its ownI/O, and must request the OS to perform I/O on its behalf. The systemmay logically extend the mode bit to define areas of memory to be usedwhen the processor is in kernel mode versus user mode. If the mode bitis set to kernel mode, the process executing in the processor can accesseither the kernel or user partition of the memory. However, if user modeis set, the process can reference only the user memory space, hence twoclasses of memory are defined, the user space and the system space (orkernel, supervisor or protected space). In general, the mode bit extendsthe operating system's protection rights, and is set by the user modetrap instruction, also called a supervisor call instruction. Thisinstruction sets the mode bit, and branches to a fixed location in thesystem space. Since only the system code is loaded in the system space,only the system code can be invoked via a trap. When the OS hascompleted the supervisor call, it resets the mode bit to user mode priorto the return.

Computer operating systems provide different levels of access toresources, and these hierarchical protection domains are often referredto as ‘protection rings’, and are used to protect data and functionalityfrom faults (by improving fault tolerance) and malicious behaviour (byproviding computer security). A protection ring is one of two or morehierarchical levels or layers of privilege within the architecture of acomputer system. These levels may be hardware-enforced by some CPUarchitectures that provide different CPU modes at the hardware ormicrocode level. Rings are arranged in a hierarchy from most privileged(most trusted, usually numbered zero) to least privileged (leasttrusted, usually with the highest ring number). On most operatingsystems, kernel mode or ‘Ring 0’ is the level with the most privilegesand interacts most directly with the physical hardware such as the CPUand memory. Special gates between rings are provided to allow an outerring to access an inner ring's resources in a predefined manner, asopposed to allowing arbitrary usage. Correctly gating access betweenrings can improve security by preventing programs from one ring orprivilege level from misusing resources intended for programs inanother. For example, spyware running as a user program in Ring 3 shouldbe prevented from turning on a web camera without informing the user,since hardware access should be a Ring 1 function reserved for devicedrivers. Programs such as web browsers running in higher numbered ringsmust request access to the network, a resource restricted to a lowernumbered ring.

Kernel. With the aid of the firmware and device drivers, the kernelprovides the most basic level of control over all of the computer'shardware devices. It manages memory access for programs in the RAM, itdetermines which programs get access to which hardware resources, itsets up or resets the CPU's operating states for optimal operation atall times, and it organizes the data for long-term non-volatile storagewith file systems on such media as disks, tapes, flash memory, etc. Thepart of the system executing in kernel supervisor state is called thekernel, or nucleus, of the operating system. The kernel operates astrusted software, meaning that when it was designed and implemented, itwas intended to implement protection mechanisms that could not becovertly changed through the actions of untrusted software executing inuser space. Extensions to the OS execute in user mode, so the OS doesnot rely on the correctness of those parts of the system software forcorrect operation of the OS. Hence, a fundamental design decision forany function to be incorporated into the OS is whether it needs to beimplemented in the kernel. If it is implemented in the kernel, it willexecute in kernel (supervisor) space, and have access to other parts ofthe kernel. It will also be trusted software by the other parts of thekernel. If the function is implemented to execute in user mode, it willhave no access to kernel data structures.

There are two techniques by which a program executing in user mode canrequest the kernel's services, namely ‘System call’ and ‘Messagepassing’. Operating systems are typically with one or the other of thesetwo facilities, but commonly not both. Assuming that a user processwishes to invoke a particular target system function, in the system callapproach, the user process uses the trap instruction, so the system callshould appear to be an ordinary procedure call to the applicationprogram; the OS provides a library of user functions with namescorresponding to each actual system call. Each of these stub functionscontains a trap to the OS function, and when the application programcalls the stub, it executes the trap instruction, which switches the CPUto kernel mode, and then branches (indirectly through an OS table), tothe entry point of the function which is to be invoked. When thefunction completes, it switches the processor to user mode and thenreturns control to the user process; thus simulating a normal procedurereturn. In the message passing approach, the user process constructs amessage, that describes the desired service, and then it uses a trustedsend function to pass the message to a trusted OS process. The sendfunction serves the same purpose as the trap; that is, it carefullychecks the message, switches the processor to kernel mode, and thendelivers the message to a process that implements the target functions.Meanwhile, the user process waits for the result of the service requestwith a message receive operation. When the OS process completes theoperation, it sends a message back to the user process.

Interrupts handling. Interrupts are central to operating systems, asthey provide an efficient way for the operating system to interact withand react to its environment. Interrupts are typically handled by theoperating system's kernel, and provide a computer with a way ofautomatically saving local register contexts, and running specific codein response to events. When an interrupt is received, the computer'shardware automatically suspends whatever program is currently running,saves its status, and runs computer code previously associated with theinterrupt. When a hardware device triggers an interrupt, the operatingsystem's kernel decides how to deal with this event, generally byrunning some processing code. The amount of code being run depends onthe priority of the interrupt, and the processing of hardware interruptsis executed by a device driver, which may be either part of theoperating system's kernel, part of another program, or both. Devicedrivers may then relay information to a running program by variousmeans. A program may also trigger an interrupt to the operating system.For example, if a program wishes to access a hardware (such as aperipheral), it may interrupt the operating system's kernel, whichcauses control to be passed back to the kernel. The kernel will thenprocess the request. If a program wishes additional resources (or wishesto shed resources) such as memory, it will trigger an interrupt to getthe kernel's attention. Each interrupt has its own interrupt handler.The number of hardware interrupts is limited by the number of interruptrequest (IRQ) lines to the processor, but there may be hundreds ofdifferent software interrupts. Interrupts are a commonly used techniquefor computer multitasking, especially in real-time computing systems,which are commonly referred to as interrupt-driven systems.

Memory management. A multiprogramming operating system kernel isresponsible for managing all system memory which is currently in use byprograms, ensuring that a program does not interfere with memory alreadyin use by another program. Since programs time share, each program musthave independent access to memory. Memory protection enables the kernelto limit a process' access to the computer's memory. Various methods ofmemory protection exist, including memory segmentation and paging. Inboth segmentation and paging, certain protected mode registers specifyto the CPU what memory address it should allow a running program toaccess. Attempts to access other addresses will trigger an interruptwhich will cause the CPU to re-enter supervisor mode, placing the kernelin charge. This is called a segmentation violation (or Seg-V), and thekernel will generally resort to terminating the offending program, andwill report the error.

Memory management further provides ways to dynamically allocate portionsof memory to programs at their request, and free it for reuse when nolonger needed. This is critical for any advanced computer system wheremore than a single process might be underway at any time. Severalmethods have been devised that increase the effectiveness of memorymanagement. Virtual memory systems separate the memory addresses used bya process from actual physical addresses, allowing separation ofprocesses and increasing the effectively available amount of RAM usingpaging or swapping to secondary storage. The quality of the virtualmemory manager can have an extensive effect on overall systemperformance.

File system. Commonly a file system (or filesystem) is used to controlhow data is stored and retrieved. By separating the data into individualpieces, and giving each piece a name, the information is easilyseparated and identified, where each piece of data is called a “file”.The structure and logic rules used to manage the groups of informationand their names is called a “file system”. There are many differentkinds of file systems. Each one has a different structure and logic,properties of speed, flexibility, security, size and more. Some filesystems have been designed to be used for specific applications. Forexample, the ISO 9660 file system is designed specifically for opticaldiscs. File systems can be used on many different kinds of storagedevices. Some file systems are used on local data storage devices;others provide file access via a network protocol (for example, NFS,SMB, or 9P clients). Some file systems are “virtual”, in that the“files” supplied are computed on request (e.g. procfs) or are merely amapping into a different file system used as a backing store. The filesystem manages access to both the content of files and the metadataabout those files. It is responsible for arranging storage space;reliability, efficiency, and tuning with regard to the physical storagemedium are important design considerations.

A disk file system takes advantages of the ability of disk storage mediato randomly address data in a short amount of time. Additionalconsiderations include the speed of accessing data following thatinitially requested and the anticipation that the following data mayalso be requested. This permits multiple users (or processes) access tovarious data on the disk without regard to the sequential location ofthe data. Examples include FAT (FAT12, FAT16, FAT32), exFAT, NTFS, HFSand HFS+, HPFS, UFS, ext2, ext3, ext4, XFS, btrfs, ISO 9660, Files-11,Veritas File System, VMFS, ZFS, ReiserFS and UDF. Some disk file systemsare journaling file systems or versioning file systems.

TMPFS. TMPFS (or tmpfs) is a common name for a temporary file storagefacility on many Unix-like operating systems. While intended to appearas a mounted file system, it is stored in volatile memory instead of anon-volatile storage device. A similar construction is a RAM disk, whichappears as a virtual disk drive and hosts a disk file system. The tmpfsis typically a file system based on SunOS virtual memory resources,which does not use traditional non-volatile media to store file data;instead, tmpfs files exist solely in virtual memory maintained by theUNIX kernel. Because tmpfs file systems do not use dedicated physicalmemory for file data, but instead use VM system resources andfacilities, they can take advantage of kernel resource managementpolicies. Tmpfs is designed primarily as a performance enhancement toallow short-lived files to be written and accessed without generatingdisk or network I/O. Tmpfs maximizes file manipulation speed whilepreserving UNIX file semantics. It does not require dedicated disk spacefor files and has no negative performance impact. The tmpfs is describedin a Sun Microsystem Inc. paper entitled: “tmpfs: A Virtual Memory FileSystem” by Peter Snyder, downloaded on July 2014, which is incorporatedin its entirety for all purposes as if fully set forth herein.

Device drivers. A device driver is a specific type of computer softwaredeveloped to allow interaction with hardware devices. Typically, thisconstitutes an interface for communicating with the device, through thespecific computer bus or communications subsystem that the hardware isconnected to, providing commands to and/or receiving data from thedevice, and on the other end, the requisite interfaces to the operatingsystem and software applications. It is a specialized hardware-dependentcomputer program which is also operating system specific that enablesanother program, typically an operating system or applications softwarepackage or computer program running under the operating system kernel,to interact transparently with a hardware device, and usually providesthe requisite interrupt handling necessary for any necessaryasynchronous time-dependent hardware interfacing needs.

Networking. Most operating systems support a variety of networkingprotocols, hardware, and applications for using them, allowing computersrunning dissimilar operating systems to participate in a common network,for sharing resources such as computing, files, printers, and scanners,using either wired or wireless connections. Networking can essentiallyallow a computer's operating system to access the resources of a remotecomputer, to support the same functions as it could if those resourceswere connected directly to the local computer. This includes everythingfrom simple communication, to using networked file systems, or sharinganother computer's graphics or sound hardware. Some network servicesallow the resources of a computer to be accessed transparently, such asSSH, which allows networked users direct access to a computer's commandline interface. A client/server networking allows a program on acomputer, called a client, to connect via a network to another computer,called a server. Servers offer (or host) various services to othernetwork computers and users. These services are usually provided throughports or numbered access points beyond the server's network address.Each port number is usually associated with a maximum of one runningprogram, which is responsible for handling requests to that port. Adaemon, being a user program, can in turn access the local hardwareresources of that computer by passing requests to the operating systemkernel.

Input/Output (I/O) handling. An input/output (or I/O) is thecommunication between an information processing system (such as acomputer) and the outside world, possibly a human or other informationprocessing system. The inputs are typically the signals or data receivedby the system, and the outputs are the signals or data sent from it. I/Odevices may be used by a person (or other system) to communicate with acomputer. For instance, a keyboard or a mouse may be an input device fora computer, while monitors and printers are considered output devicesfor a computer. Devices for communication between computers, such asmodems and network cards, typically serve for both input and output.

User interface. Every computer that is to be operated by a human beingrequires a user interface, usually referred to as a ‘shell’, and isessential if human interaction is to be supported. The user interfaceviews the directory structure and requests services from the operatingsystem that will acquire data from input hardware devices, such as akeyboard, mouse or credit card reader, and requests operating systemservices to display prompts, status messages and such on output hardwaredevices, such as a video monitor or printer. The two most common formsof a user interface have historically been the command-line interface,where computer commands are typed out line-by-line, and the GraphicalUser Interface (GUI), where a visual environment (most commonly a WIMP)is present. Typically the GUI is integrated into the kernel, allowingthe GUI to be more responsive by reducing the number of context switchesrequired for the GUI to perform its output functions.

WDM. The Windows Driver Model (WDM), also known as the Win32 DriverModel, is a standard model defining a framework for device driversspecified by Microsoft, providing unified driver models. The WDM modelis based on WDM drivers that are layered in a complex hierarchy andcommunicate with each other via I/O Request Packets (IRPs). The WDM wasintroduced with Windows 98 and Windows 2000 to replace VxD which wasused on older versions of Windows such as Windows 95 and Windows 3.1, aswell as the Windows NT Driver Model, and WDM drivers are usable on allof Microsoft's operating systems of Windows 95 and later. The WDM isdescribed in the publication entitled: “Microsoft Windows Driver Model(WDM)”, by Mohamad (Hani) Atassy, submitted to Dr. Dennis R. Hafermanndated Jan. 28, 2002, and in publication entitled: “A Comparison of theLinux and Windows Device Driver Architecture”, by Melekam Tsegaye andRicahrd Foss, both from Rhodes University, South-Africa, downloaded fromthe Internet on July 2014, both are incorporated in their entirety forall purposes as if fully set forth herein.

A general schematic view of the WDM architecture 930 is shown on FIG. 3. In the example shown, three applications designated as application #1931 a, application #2 931 b, and application #3 931 c, are accessingthree peripheral hardware devices, designated as peripheral #1 939 a,peripheral #2 939 b, and peripheral #3 939 c. The model involves threelayers. The lower layer is the hardware layer 930 c, which includes thehardware devices and peripherals, accessed by a processor (such as aprocessor 27) via a hardware bus 930 d, which may correspond to aninternal bus 13 shown in FIG. 1 . The highest layer is a ‘user space’layer 930 a, corresponding to the user mode and to the higher ‘ring’layers such as Ring 3, and is relating to the space is the memory areawhere application software and some drivers execute. The kernel of theoperating system provides the services as part of a ‘kernel space’ layer930 b, serving as an intermediate layer between the user space layer 930a and the hardware layer 930 c. The kernel space 930 b operates in ahighly privileged hierarchical protection domain, and is strictlyreserved for running privileged kernel, kernel extensions, and mostdevice drivers, and is typically corresponding to the kernel mode and tothe ‘ring-0’ layer (in x86 processors). The kernel mode may be supportedby the processor hardware, or may be supported by a code segment level.

The user mode applications (such as application #1 931 a, application #2931 b, and application #3 931 c) access the kernel space 930 b by theinvoking of system calls respectively denoted as connections 932 a, 932b and 932 c. Typically, such system calls are processed viaintermediating entity known as Windows API, such as a Win32 API 933,which access the kernel space 930 b via a standard messaging 934. TheWin32 API 933 is an example of a Windows API (informally WinAPI), whichis Microsoft's core set of Application Programming Interfaces (APIs)available in the Microsoft Windows operating systems. Almost all Windowsprograms interact with the Windows API; on the Windows NT line ofoperating systems, a small number (such as programs started early in theWindows startup process) uses the Native API. Supporting for developersis in the form of the Windows Software Development Kit (SDK), providingdocumentation and tools necessary to build software based upon theWindows API and associated Windows interfaces. The Win32 API 933 is the32-bit API for modern versions of Windows, and consists of functionsimplemented, as with Win16, in system DLLs. The core DLLs of the Win32include the kernel32.dll, user32.dll, and gdi32.dll. The Win32 API isdescribed in the tutorial entitled: “Welcome to Version 2.0 of the Win32API Tutorial” by Prof. M. Saeed, published by Brook Miles, downloadedfrom the Internet on July 2014, which is incorporated in its entiretyfor all purposes as if fully set forth herein.

System calls provide an essential interface between a process and theoperating system. A system call is how a program requests a service froman operating system's kernel. This may include hardware related services(e.g., accessing the hard disk), creating and executing new processes,and communicating with integral kernel services (such as scheduling). Asystem call is typically processed in the kernel mode, which isaccomplished by changing the processor execution mode to a moreprivileged one. The hardware sees the world in terms of the executionmode according to the processor status register, and processes are anabstraction provided by the operating system. A system call does notrequire a context switch to another process, it is processed in thecontext of whichever process invoked it. The system calls are oftenexecuted via traps or interrupts; that automatically puts the CPU intosome required privilege level, and then passes control to the kernel,which determines whether the calling program should be granted therequested service. If the service is granted, the kernel executes aspecific set of instructions over which the calling program has nodirect control, returns the privilege level to that of the callingprogram, and then returns control to the calling program. Implementingsystem calls requires a control transfer, which involves some sort ofarchitecture-specific feature.

System calls can be roughly grouped into five major categories: Processcontrol, such as load, execute, create/terminate process, get/setprocess attributes, wait for time, wait event, and signal event; filemanagement, such as request/release device, create/delete file,open/close file, read/write/reposition file, and get/set fileattributes; device management, such as read/write/reposition device,get/set device attributes, and logically attach/detach devices;information maintenance, such as get/set time or date, get/set systemdata, and get/set process, file, or device attributes; and communicationsuch as create, delete communication connection, transfer statusinformation, and attach or detach remote devices.

The system calls are commonly handled by an I/O manager 935 b, whichallows devices to communicate with user-mode subsystems. It translatesuser-mode read and write commands into read or write IRPs which itpasses to device drivers. It accepts file system I/O requests andtranslates them into device specific calls, and can incorporatelow-level device drivers that directly manipulate hardware to eitherread input or write output. It also includes a cache manager to improvedisk performance by caching read requests and write to the disk in thebackground. The I/O manager 935 b may interface a power manager 935 c,which deals with power events (power-off, stand-by, hibernate, etc.) andnotifies affected drivers with special IRPs (Power IRPs).

A PnP manager 935 a handles ‘Plug and Play’ and supports devicedetection and installation at boot time. It also has the responsibilityto stop and start devices on demand, which can happen when a bus (suchas USB or FireWire) gains a new device and needs to have a device driverloaded to support it. The PnP manager 935 a may be partly implemented inuser mode, in the Plug and Play Service, which handles the often complextasks of installing the appropriate drivers, notifying services andapplications of the arrival of new devices, and displaying GUI to theuser.

I/O Request Packets (IRPs) are kernel mode structures that are used tocommunicate with each other and with the operating system. They are datastructures that describe I/O requests, to a driver, all of theseparameters (such as buffer address, buffer size, I/O function type,etc.) are passed via a single pointer to this persistent data structure.The IRP with all of its parameters can be put on a queue if the I/Orequest cannot be performed immediately. I/O completion is reported backto the I/O manager by passing its address to a routine for that purpose,IoCompleteRequest. The IRP may be repurposed as a special kernel APCobject if such is required to report completion of the I/O to therequesting thread. IRPs are typically created by the I/O Manager inresponse to I/O requests from user mode. However, IRPs are sometimescreated by the plug-and-play manager, power manager, and other systemcomponents, and can also be created by drivers and then passed to otherdrivers.

The WDM uses kernel-mode device drivers to enable it to interact withhardware devices, where each of the drivers has well defined systemroutines and internal routines that it exports to the rest of theoperating system. DriverEntry is the first routine called after a driveris loaded, and is responsible for initializing the driver. All devicesare seen by user mode code as a file object in the I/O manager, thoughto the I/O manager itself the devices are seen as device objects, whichit defines as either file, device or driver objects. The drivers may beaggregated as a driver stack 936, including kernel mode drivers in threelevels: highest level drivers 936 a, intermediate drivers 936 b, and lowlevel drivers 936 c. The highest level drivers 936 a, such as filesystem drivers for FAT and NTFS, rely on the intermediate drivers 936 b,which consist of function drivers or main driver for a device, that areoptionally sandwiched between lower and higher level filter drivers. Thehighest level drivers typically know how files are represented on disk,but not the details of how to actually fetch the data, the intermediatelevel drivers process the requests from the highest level driver bybreaking down a large request into a series of small chunks. Thefunction driver commonly possesses the details relating to how thehardware of the peripheral works, typically relies on a bus driver, or adriver that services a bus controller, adapter, or bridge, which canhave an optional bus filter driver that sits between itself and thefunction driver. For example, a PCI bus driver detects the PCI-slotplugged card or hardware, and determines the VO-mapped or thememory-mapped connection with the host. Intermediate drivers 936 b relyon the low level drivers 936 c to function. The lowest level drivers 936c are either legacy device drivers that control a device directly, orcan be a PnP hardware bus. These lower level drivers 936 c directlycontrol hardware and do not rely on any other drivers. The I/O manager935 b communicate with the high-level driver 936 a using IRP 937 a, thehigh-level driver 936 a communicate with the intermediate level driver936 b using IRP 937 b, the intermediate level driver 936 b communicatewith the low-level driver 936 c using IRP 937 c, and the low-leveldriver 936 c communicate with a HAL 938 using IRP 937 d.

WDM drivers can be classified into the following types and sub-types:Device function drivers, bus drivers, and filter drivers. A functiondriver is the main driver for a device. A function driver is typicallywritten by the device vendor and is required (unless the device is beingused in raw mode). A function driver can service one or more devices.Miniport drivers are a type of function drivers for interfaces such asUSB, audio, SCSI and network adapters. They are hardware specific, butthe control access to the hardware is through a specific bus classdriver. Class drivers are a type of function drivers and can be thoughtof as built-in framework drivers that miniport and other class driverscan be built on top of. The class drivers provide interfaces betweendifferent levels of the WDM architecture. Common functionality betweendifferent classes of drivers can be written into the class driver andused by other class and miniport drivers. The lower edge of the classdriver will have its interface exposed to the miniport driver, while theupper edge of top level class drivers is operating system specific.Class drivers can be dynamically loaded and unloaded at will. They cando class specific functions that are not hardware or bus-specific (withthe exception of bus-type class drivers) and in fact sometimes only doclass specific functions such as enumeration.

A bus driver services a bus controller, adapter, or bridge. Microsoftprovides bus drivers for most common buses, such as Advancedconfiguration and Power Interface (ACPI), Peripheral ComponentInterconnect (PCI), PnPISA, SCSI, Universal Serial Bus (USB), andFireWire. A bus driver can service more than one bus if there is morethan one bus of the same type on the machine. The ACPI bus driverinteracts with the ACPI BIOS to enumerate the devices in the system andcontrol their power use, the PCI bus driver (such as pci.sys) enumeratesand configures devices connected via the PCI bus, the FireWire and theUSB bus driver respectively enumerates and controls devices connectedvia the IEEE 1394 high speed bus and the USB. The stream class driverprovides a basic processing supporting high bandwidth, time critical,and video and audio data related hardware, and uses minidrivers forinterfacing the actual hardware, and hard-disk, floppies, CDs, and DVDsare interfaces using SCSI and CDROM/DVD class driver. The Human InputDevice (HID) provides an abstract view of input devices, and the StillImage Architecture (SIA) class driver is used to obtain content from ascanner and a still camera, using minidrivers. For example, accessing ahard disk (such as HDD 25 c) involves a file system driver as high-leveldriver, a volume manager driver as intermediate level driver, and a diskdriver as a low-level driver.

Filter drivers are optional drivers that add value to or modify thebehavior of a device and may be non-device drivers. A filter driver canalso service one or more devices. Upper level filter drivers sit abovethe primary driver for the device (the function driver), while lowerlevel filter drivers sit below the function driver and above the busdriver. A driver service is a type of kernel-level filter driverimplemented as a Windows service that enables applications to work withdevices.

The Hardware Abstraction Layer 938, or HAL, is a layer between thephysical hardware layer 930 c of the computer and the rest of theoperating system. It was designed to hide differences in hardware andtherefore provide a consistent platform on which the kernel is run. TheHAL 938 includes hardware-specific code that controls I/O interfaces,interrupt controllers and multiple processors. Typically the particularhardware abstraction does not involve abstracting the instruction set,which generally falls under the wider concept of portability.Abstracting the instruction set, when necessary (such as for handlingthe several revisions to the x86 instruction set, or emulating a missingmath coprocessor), is performed by the kernel, or via platformvirtualization.

Linux is a Unix-like and mostly POSIX-compliant computer operatingsystem assembled under the model of free and open source softwaredevelopment and distribution. The defining component of Linux is theLinux kernel, an operating system kernel first released on 5 Oct. 1991by Linus Torvalds. Linux was originally developed as a free operatingsystem for Intel x86-based personal computers, but has since been portedto more computer hardware platforms than any other operating system.Linux also runs on embedded systems such as mobile phones, tabletcomputers, network routers, facility automation controls, televisions,and video game consoles. Android, which is a widely used operatingsystem for mobile devices, is built on top of the Linux kernel.Typically, Linux is packaged in a format known as a Linux distributionfor desktop and server use.

Linux distributions include the Linux kernel, supporting utilities andlibraries and usually a large amount of application software to fulfillthe distribution's intended use. A Linux-based system is a modularUnix-like operating system. Such a system uses a monolithic kernel, theLinux kernel, which handles process control, networking, and peripheraland file system access. Device drivers are either integrated directlywith the kernel or added as modules loaded while the system is running.Some components of an installed Linux system are a bootloader, forexample GNU GRUB or LILO, which is executed by the computer when it isfirst turned on, and loads the Linux kernel into memory; an initprogram, which is the first process launched by the Linux kernel, and isat the root of the process tree, and starts processes such as systemservices and login prompts (whether graphical or in terminal mode);Software libraries which contain code which can be used by runningprocesses; and user interface programs such as command shells orwindowing environments. A version of Linux is described, for example, inIBM Corporation (headquartered in Armonk, New-York, U.S.A.) publicationNo. SC34-2597-03 entitled: “Device Drivers, Features, and Commands onRed Hat Exterprise Linux 6.3”, downloaded from the Internet on July2014, which is incorporated in its entirety for all purposes as if fullyset forth herein.

The general schematic Linux driver architecture 950 is shown in FIG. 3 a, and the Linux kernel is further described in Wiley Publishing, Inc.publication entitled: “Professional Linux Kernel Architecture”, byWofgang Mauerer published 2008, and Linux programming is described inthe book entitled: “The Linux Kernel Module Programming Guide” ver.2.6.4 by Peter Jay Salzman, Michael Burian, and Ori Pomerantz, dated May18, 2007, and in the publication entitled: “A Comparison of the Linuxand Windows Device Driver Architecture”, by Melekam Tsegaye and RichardFoss, both from Rhodes University, South-Africa, downloaded from theInternet on July 2014, which are all incorporated in their entirety forall purposes as if fully set forth herein.

Similar to the WDM 930 shown in FIG. 3 , the Linux kernel involves a‘System Call Interface’ 953, receiving system calls 952 a, 952 b, and952 c from the respective applications such as an application #1 931 a,an application #2 931 b, and an application #3 931 c, and serves as thedenomination for the entirety of all implemented and available systemcalls in a kernel. The Linux kernel is based on a layered modules stack954, which may include three levels of modules, such as module #1 954 a,module #2 954 b, and module #3 954 c, where the module #1 954 acommunicate over connection 955 a with the system call interface 953,the module #2 954 b communicates with the module #1 954 a overconnection 955 b, the module #3 954 c communicates over the connection955 c with the module #2 954 b and over a connection 955 d with the HAL938.

Similar to the WDM 930 shown in FIG. 3 , the Linux kernel shown as thearrangement 950 in FIG. 3 a , is using the concept of layeredarchitecture of a modules stack 954, which may comprise module #1 954 a,module #2 954 b, and module #3 954 c, communicating using messagingmechanism, such as a connection 955 a between the system call interface953 and the module #1 954 a, a connection 955 b between the module #1954 a and the module #2 954 b, a connection 955 c between the module #2954 b and the module #3 954 c, and a connection 955 d between the module#3 954 c and the HAL 938.

The modules in the modules stack 954, typically referred to as LoadableKernel Modules (or LKM), are object files that contain code to extendthe running Linux kernel, or so-called base kernel. LKMs are typicallyused to add support for new hardware and/or filesystems, or for addingsystem calls. When the functionality provided by a LKM is no longerrequired, it can be unloaded in order to free memory and otherresources. Loadable kernel modules in Linux are located in/lib/modulesand have had the extension ‘.ko’ (“kernel object”) since version 2.6(previous versions used the .o extension), and are loaded (and unloaded)by the modprobe command. The lsmod command lists the loaded kernelmodules. In emergency cases, when the system fails to boot (due to e.g.broken modules), specific modules can be enabled or disabled bymodifying the kernel boot parameters list (for example, if using GRUB,by pressing ‘e’ in the GRUB start menu, then editing the kernelparameter line). Linux allows disabling module loading via sysctloption/proc/sys/kernel/modules_disabled. An initramfs system may loadspecific modules needed for a machine at boot and then disable moduleloading.

Multicasting. A multitasking is a method where multiple tasks (alsoknown as processes or programs) are performed during the same period oftime, and executed concurrently (in overlapping time periods, new tasksstarting before others have ended) instead of sequentially (onecompleting before the next starts). The tasks share common processingresources, such as a CPU and main memory. Multitasking does notnecessarily mean that multiple tasks are being executed, exactly at thesame instant. In other words, multitasking does not imply parallelism,but it does mean that more than one task can be part-way throughexecution at the same time, and more than one task is advancing over agiven period of time.

In the case of a computer with a single CPU, only one task is said to berunning at any point in time, meaning that the CPU is actively executinginstructions for that task. Multitasking solves the problem byscheduling which task may be the one running at any given time, and whenanother waiting task gets its turn. The act of reassigning a CPU fromone task to another one is called a context switch. When contextswitches occur frequently enough, the illusion of parallelism isachieved. Even on computers with more than one CPU (calledmultiprocessor machines) or more than one core in a given CPU (calledmulticore machines), where more than one task can be executed at a giveninstant (one per CPU or core), multitasking allows many more tasks to berun than the number of available CPUs.

Operating systems may adopt one of many different scheduling strategies.In multiprogramming systems, the running task keeps running until itperforms an operation that requires waiting for an external event (e.g.reading from a tape) or until the computer's scheduler forcibly swapsthe running task out of the CPU. Multiprogramming systems are designedto maximize CPU usage. In time-sharing systems, the running task isrequired to relinquish the CPU, either voluntarily or by an externalevent such as a hardware interrupt. Time sharing systems are designed toallow several programs to execute simultaneously. In real-time systems,some waiting tasks are guaranteed to the CPU when an external eventoccurs. Real time systems are designed to control mechanical devicessuch as industrial robots, which require timely processing.

Multiprocessing. Multiprocessing is the use of two or more processors orCentral Processing Units (CPUs) within a single computer system,typically combined with the ability to allocate tasks between them. Inorder to process programs simultaneously, the multiple processorscommonly share main memory and peripherals. In a multiprocessing system,all CPUs may be equal, or some may be reserved for special purposes. Acombination of hardware and operating system software designconsiderations determine the symmetry (or lack thereof) in a givensystem. For example, hardware or software considerations may requirethat only one particular CPU respond to all hardware interrupts, whereasall other work in the system may be distributed equally among CPUs; orexecution of kernel-mode code may be restricted to only one particularCPU, whereas user-mode code may be executed in any combination ofprocessors. Systems that treat all CPUs equally are called symmetricmultiprocessing (SMP) systems. In systems where all CPUs are not equal,system resources may be divided in a number of ways, includingAsymmetric Multiprocessing (ASMP), Non-Uniform Memory Access (NUMA)multiprocessing, and clustered multiprocessing.

In multiprocessing, the processors are typically used to execute asingle sequence of instructions in multiple contexts(single-instruction, multiple-data or SIMD, often used in vectorprocessing), multiple sequences of instructions in a single context(multiple-instruction, single-data or MISD, used for redundancy infail-safe systems and sometimes applied to describe pipelined processorsor hyper-threading), or multiple sequences of instructions in multiplecontexts (multiple-instruction, multiple-data or MIMD). Tightly coupledmultiprocessor systems contain multiple CPUs that are connected at thebus level, and may have access to a central shared memory (SMP or UMA),or may participate in a memory hierarchy with both local and sharedmemory (NUMA). Chip multiprocessors, also known as multi-core computing,involves more than one processor placed on a single chip and can bethought of the most extreme form of tightly-coupled multiprocessing.Loosely coupled multiprocessor systems (often referred to as clusters)are based on multiple standalone single, or dual processor commoditycomputers interconnected via a high-speed communication system (GigabitEthernet is common). Tightly-coupled systems perform better and arephysically smaller than loosely-coupled systems, but have historicallyrequired greater initial investments and may depreciate rapidly. Nodesin a loosely-coupled system are usually inexpensive commodity computersand can be recycled as independent machines upon retirement from thecluster.

Filter driver. A filter driver is a Microsoft Windows compatible driverthat extends or modifies the function of peripheral devices, or supportsa specialized device in a personal computer, and commonly relates to adriver, program, or module that is inserted into the existing driverstack to perform some specific function, while not affecting the normalworking of the existing driver stack in any major way. Any number offilter drivers can be added to Windows, where upper-level filter driverssit above the primary driver for the device (the function driver), whilelower level filter drivers sit below the function driver and above a busdriver. Filter drivers may work on a certain brand of devices such as amouse or keyboard, or they may perform some operation on a class ofdevices, such as any mouse or any keyboard. A filter driver may bedeveloped using the guide entitled: “Filter Driver Development Guide”Version 1.0a by Microsoft Corporation, dated 2004, which is incorporatedin its entirety for all purposes as if fully set forth herein.

Hook. A hook (also known as a hook procedure or hook function) is amechanism by which an application can intercept events, such asmessages, mouse actions, and keystrokes, and generally refers to afunction provided by a software application that receives certain databefore the normal or intended recipient of the data. The hook functioncan thus examine or modify certain data before passing on the data. Thehook function allows a software application to examine, or modify databefore the data is passed to the intended recipient. A function thatintercepts a particular type of event is known as a hook procedure. Thehook procedure can act on each event it receives, and then modify ordiscard the event. The term ‘hooking’ is used herein to include, but notlimited to, a range of techniques used to alter or augment the behaviorof an operating system, applications, or other software components byintercepting function calls, messages, or events passed between softwarecomponents. A code that handles such intercepted function calls, eventsor messages is called a “hook”. Hooking is used for many purposes,including debugging and extending functionality.

Examples may include intercepting keyboard or mouse event messagesbefore they reach an application, or intercepting operating system callsin order to monitor behavior, or modify the function of an applicationor another component. It is also widely used in benchmarking programs,for example frame rate measuring in 3D games, where the output and inputare done through hooking. Hooking is described in the presentations byHigh-Tech Bridge SA and titled: “Userland Hooking in Windows” datedAugust 2011, and “Inline Hooking in Windows” dated September 2011, bothby Brian Mariani, and both incorporated in their entirety for allpurposes as if fully set forth herein.

Physical modification. A hooking may be achieved by physically modifyingan executable or library before an application is run through techniquesof reverse engineering. This is typically used to intercept functioncalls to either monitor or replace them entirely. For example, by usinga disassembler, the entry point of a function within a module can befound. It can then be altered to dynamically load some other librarymodule and then have it execute desired methods within that loadedlibrary. If applicable, altering an import table of an executable isanother related approach by which hooking can be achieved. This tablecan be modified to load any additional library modules as well aschanging what external code is invoked when a function is called by anapplication. An alternate method for achieving the function of hookingis by intercepting function calls through a wrapper library. Whencreating a wrapper, you make your own version of a library that anapplication loads, with all the same functionality of the originallibrary that it will replace, so all the functions that are accessible,are essentially the same between the original and the replacement. Thiswrapper library can be designed to call any of the functionality fromthe original library, or replace it with an entirely new set of logic.

Runtime modification. Operating systems and software may provide themeans to easily insert event hooks at runtime, as long as the processinserting the hook is granted enough permission to do so. MicrosoftWindows allows inserting hooks that can be used to process or modifysystem events and application events for dialogs, scrollbars, and menus,as well as other items. It also allows a hook to insert, remove,process, or modify keyboard and mouse events. Linux provides anotherexample where hooks can be used in a similar manner to process networkevents within the kernel through NetFilter. When such functionality isnot provided, a special form of hooking employs intercepting libraryfunction calls that are made by a process. Function hooking isimplemented by changing the very first few code instructions of thetarget function to jump to an injected code. Alternatively, on systemsusing the shared library concept, the interrupt vector table or theimport descriptor table can be modified in memory.

A hook chain is a list of pointers to special, application-definedcallback functions called hook procedures. When a message occurs that isassociated with a particular type of hook, the operating system passesthe message to each hook procedure referenced in the hook chain, oneafter the other. The action of a hook procedure can depend on the typeof hook involved. For example, the hook procedures for some types ofhooks can only monitor messages, while others can modify the messages,or stop their progress through the chain, restricting them from reachingthe next hook procedure, or a destination window.

Plug-in. A plug-in (or ‘plugin’, ‘extension’, or ‘add-on’/‘addon’) is asoftware component that adds a specific feature to an existing softwareapplication, such as enabling customization. The common examples are theplug-ins used in web browsers to add new features such as search-enginesor virus scanners, or the ability to utilize a new file type such as anew video format. An ‘Add-on’ (or ‘addon’) is the general term for whatenhances an application, and comprises snap-in, plug-in, theme, andskin. An extension add-on tailors the core features of an application byadding an optional module, whereas a plug-in add-on would tailor theouter layers of an application to personalize functionality. A theme ora skin add-on is a preset package containing additional or changedgraphical appearance details, achieved by the use of a Graphical UserInterface (GUI) that can be applied to a specific software and websitesto suit the purpose, topic, or tastes of different users to customizethe look and feel of a piece of computer software or an operating systemfront-end GUI (and window managers).

Typically, the host application provides services which the plug-in canuse, including a way for plug-ins to register themselves with the hostapplication, and protocol for the exchange of data with plug-ins.Plug-ins depend on the services provided by the host application and donot usually work by themselves. Conversely, the host applicationoperates independently of the plug-ins, making it possible for end-usersto add and update plug-ins dynamically without needing to make changesto the host application. The term ‘plug-in’ is used herein to include,but not limited to, a software extension, which is software that servesto extend the capabilities of, or data available to existing softwareapplication; it becomes included in the program. Therefore, afterintegration, extensions can be seen as part of the browser itself,tailored from a set of optional modules.

IPC. An Inter-Process Communication (IPC) (also be referred to asinter-thread communication and inter-application communication) is a setof methods for the exchange of data between multiple threads, in one ormore processes. IPC methods may use message passing, synchronization,shared memory, and Remote Procedure Calls (RPC). It provides anenvironment that allows process cooperation, and may be used forproviding information sharing, computational speedup, modularity,convenience, and privileged separation. In the Windows operating systemenvironment, the IPC provides mechanisms for facilitating communicationsand data sharing between processes or applications.

Common IPC methods include file sharing, where a record (or any otherinformation) stored on disk (or any other memory) can be accessed byname by any process; a signal which is an asynchronous notification sentto a process, or to a specific thread within the same process in orderto notify it of an event that occurred; a socket which is a data streamsent over a network interface, either to a different process on the samecomputer or on another computer, such as Internet sockets; a pipe (orpipeline) which is a two-way data stream interfaced through standardinput and output and is read character by character, commonly used inUnix-like computer operating systems; message queues which are anonymousdata stream similar to the pipe that stores and retrieves information inpackets, providing an asynchronous communications protocol; a semaphorewhich is a variable or abstract data type that is used for controllingaccess to a common resource; a shared memory which is a memory that maybe simultaneously accessed by multiple programs with an intent toprovide communication among them, or avoid redundant copies, such aswhere one process creates an area in RAM which other processes canaccess; and memory mapped file, where a file that is physically presenton-disk, but can also be a device, shared memory object, or otherresource that the operating system can reference through a filedescriptor. Few IPC mechanisms are described in Chapter 9 of the MarkoVuskovic publication ‘Operating Systems’, entitled: “INTERPROCESSCOMMUNICATION”, which is incorporated in its entirety for all purposesas if fully set forth herein.

The Windows operating system supports IPC mechanisms such as aclipboard, where the clipboard acts as a central depository for datasharing among applications, so when a user performs a cut or copyoperation in an application, the application puts the selected data onthe clipboard in one or more standard, or application-defined formats,and any other application can then retrieve the data from the clipboard,choosing from the available formats that it understands; using ComponentObject Model (COM), where applications that use Object Linking andEmbedding (OLE) manage compound documents can be used to call on otherapplications for data editing; Using Data Copy enabling an applicationto send information to another application using the WM_COPYDATAmessage; DDE protocol that enables applications to exchange data in avariety of formats; and mailslots providing one-way communication whereprocesses write messages to their mailslot.

Browser extension. A browser extension is a computer program thatextends the functionality of a web browser in some way. Extensions canbe created through the use of web technologies such as HTML, JavaScript,and CSS. Browser extensions can also improve the user interface of theweb browser without directly affecting the viewable content of a webpage, which can be achieved through a variety of add-ons, such astoolbars and plug-ins. The syntax for extensions may differ from browserto browser, or at least enough different that an extension working on abrowser does not work on another one.

Plug-ins add specific abilities into browsers using ApplicationProgramming Interfaces (APIs) allowing third parties to create plug-insthat interact with the browser. The original API was NPAPI, butsubsequently Google introduced the PPAPI interface in Chrome. Inaddition, plug-ins allow browser extensions to perform tasks such asblocking ads, creating a secure online connection, and addingapplications to a browser. Common browser plug-ins include the AdobeFlash Player, the QuickTime Player, and the Java plug-in, which canlaunch a user-activated Java applet on a web page, and the applet isthen executed within a Java Virtual Machine (JVM) in a process separatefrom the web browser itself.

Sockets. A socket (a.k.a. ‘network socket’) is an endpoint of an IPCflow across a computer network. In the case the communication is basedon IP (Internet Protocol), the network sockets are referred to asInternet sockets. A socket API is an application programming interface(API), usually provided by the operating system that allows applicationprograms to control and use network sockets. Internet socket APIs areusually based on the Berkeley sockets standard. A socket address is thecombination of an IP address and a port number, similar to one end of atelephone connection in the combination of a phone number and aparticular extension. Based on this address, internet sockets deliverincoming data packets to the appropriate application process or thread.Sockets are further described in a University of Toronto, Department ofComputer Science presentation entitled: “Tutorial on Socket Programming”by Amin Tootoonchian, downloaded on August 2014, and in the SASInstitute Inc. SHARE Session 5958 tutorial ‘C Socket ProgrammingTutorial’ entitled: “Writing Client/Server Programs in C Using Sockets(A Tutorial) Part I”, by Greg Granger, dated February of 1998, which areboth incorporated in their entirety for all purposes as if fully setforth herein.

An Internet socket is characterized by a unique combination of a Localsocket address (Local IP address and port number), remote socket address(used for established TCP sockets), and the used Protocol, typically atransport protocol (e.g., TCP, UDP, raw IP, or others). Within theoperating system and the application that created a socket, a socket isreferred to by a unique integer value called a socket descriptor. Theoperating system forwards the payload of incoming IP packets to thecorresponding application by extracting the socket address informationfrom the IP and transport protocol headers, and stripping the headersfrom the application data.

Several Internet socket types are available, such as Datagram sockets,also known as connectionless sockets, which use User Datagram Protocol(UDP), Stream sockets, also known as connection-oriented sockets, whichuse Transmission Control Protocol (TCP) or Stream Control TransmissionProtocol (SCTP), and Raw sockets (or Raw IP sockets), typicallyavailable in routers and other network equipment. Here the transportlayer is bypassed, and the packet headers are made accessible to theapplication. Other socket types are implemented over other transportprotocols, such as Systems Network Architecture (SNA). Communicatinglocal and remote sockets are called socket pairs. Each socket pair isdescribed by a unique 4-tuple consisting of source and destination IPaddresses and port numbers, i.e. of local and remote socket addresses.In the TCP case, each unique socket pair 4-tuple is assigned a socketnumber, while in the UDP case each unique local socket address isassigned a socket number.

The socket is primarily a concept used in the Transport Layer of theInternet model. Networking equipment such as routers and switches, donot require implementations of the Transport Layer, as they operate onthe Link Layer level (switches) or at the Internet Layer (routers).However, stateful network firewalls, network address translators, andproxy servers keep track of active socket pairs. Also in fair queuing,layer 3 switching and quality of service (QoS) support in routers,packet flows may be identified by extracting information about thesocket pairs. Raw sockets are typically available in network equipmentand are used for routing protocols such as IGRP and OSPF, and inInternet Control Message Protocol (ICMP).

Web browser. A web browser (commonly referred to as a browser) is asoftware application for retrieving, presenting, and traversinginformation resources on the World Wide Web. An information resource isidentified by a Uniform Resource Identifier (URI/URL) and may be part ofa web page, a web-page, an image, a video, or any other piece ofcontent. Hyperlinks present in resources enable users easily to navigatetheir browsers to related resources. Although browsers are primarilyintended to use the World Wide Web, they can also be used to accessinformation provided by web servers in private networks or files in filesystems. The primary purpose of a web browser is to bring informationresources to the user (“retrieval” or “fetching”), allowing them to viewthe information (“display”, “rendering”), and then access otherinformation (“navigation”, “following links”). Currently the major webbrowsers are known as Firefox, Internet Explorer, Google Chrome, Opera,and Safari.

The process begins when the user inputs a Uniform Resource Locator(URL), for example ‘http://en.wikipedia.org/’, into the browser. Theprefix of the URL, the Uniform Resource Identifier or URI, determineshow the URL will be interpreted. The most commonly used kind of URIstarts with http: and identifies a resource to be retrieved over theHypertext Transfer Protocol (HTTP). Many browsers also support a varietyof other prefixes, such as https: for HTTPS, ftp: for the File TransferProtocol, and file: for local files. Prefixes that the web browsercannot directly handle are often handed off to another applicationentirely. For example, mailto: URIs are usually passed to the user'sdefault e-mail application, and news: URIs are passed to the user'sdefault newsgroup reader. In the case of http, https, file, and others,once the resource has been retrieved the web browser will display it.HTML and associated content (image files, formatting information such asCSS, etc.) is passed to the browser's layout engine to be transformedfrom markup to an interactive document, a process known as “rendering”.Aside from HTML, web browsers can generally display any kind of contentthat can be part of a web page. Most browsers can display images, audio,video, and XML files, and often have plug-ins to support Flashapplications and Java applets. Upon encountering a file of anunsupported type or a file that is set up to be downloaded rather thandisplayed, the browser prompts the user to save the file to disk.Information resources may contain hyperlinks to other informationresources. Each link contains the URI of a resource to go to. When alink is clicked, the browser navigates to the resource indicated by thelink's target URI, and the process of bringing content to the userbegins again. The architecture of a web browser is described in thepublication entitled: “Architecture and evolution of the modern webbrowser” by Alan Grosskurth and Michael W. Godfrey of the University ofWaterloo in Canada, dated Jun. 20, 2006, which is incorporated in itsentirety for all purposes as if fully set forth herein.

A currently popular web browser is the Internet Explorer (formerlyMicrosoft Internet Explorer and Windows Internet Explorer, commonlyabbreviated IE or MSIE) from Microsoft Corporation, headquartered inRedmond, Wash., U.S.A., which is a series of graphical web browsersdeveloped by Microsoft and included as part of the Microsoft Windowsline of operating systems. The Internet Explorer 8 is described, forexample, in Microsoft 2009 publication entitled: “Step by Step Tutorialsfor Microsoft Internet Explorer 8 Accessibility Options”, which isincorporated in its entirety for all purposes as if fully set forthherein. Another popular web browser is the Google Chrome which is afreeware web browser developed by Google, headquartered in Googleplex,Mountain View, Calif., U.S.A. Google Chrome aims to be secure, fast,simple, and stable, providing strong application performance andJavaScript processing speed.

A mobile browser, also called a microbrowser, minibrowser, or WirelessInternet Browser (WIB), is a web browser designed for use on a mobiledevice such as a mobile phone or PDA. Mobile browsers are optimized soas to display Web content most effectively for small screens on portabledevices. Mobile browser software must be small and efficient toaccommodate the low memory capacity and low-bandwidth of wirelesshandheld devices. Some mobile browsers can handle more recenttechnologies like CSS 2.1, JavaScript, and Ajax. Websites designed foraccess from these browsers are referred to as wireless portals orcollectively as the Mobile Web. They may automatically create “mobile”versions of each page, for example this one

The mobile browser typically connects via cellular network, via WirelessLAN, or via other wireless networks, and are using standard HTTP overTCP/IP, and displays web pages written in HTML, XHTML Mobile Profile(WAP 2.0), or WML (which evolved from HDML). WML and HDML arestripped-down formats suitable for transmission across limitedbandwidth, and wireless data connection called WAP. WAP 2.0 specifiesXHTML Mobile Profile plus WAP CSS, subsets of the W3C's standard XHTMLand CSS with minor mobile extensions. Some mobile browsers arefull-featured Web browsers capable of HTML, CSS, ECMAScript, as well asmobile technologies such as WML, i-mode HTML, or cHTML. To accommodatesmall screens, some mobile browsers use Post-WIMP interfaces. An exampleof a mobile browser is Safari, which is a mobile web browser developedby Apple Inc. (headquartered in Apple Campus, Cupertino, Calif., U.S.A),included with the OS X and iOS operating systems, and described in Applepublication entitled: “Safari Web Content Guide”, dated March 2014,which is incorporated in its entirety for all purposes as if fully setforth herein.

Smartphone. A mobile phone (also known as a cellular phone, cell phone,smartphone, or hand phone) is a device which can make and receivetelephone calls over a radio link whilst moving around a wide geographicarea, by connecting to a cellular network provided by a mobile networkoperator. The calls are to and from the public telephone network, whichincludes other mobiles and fixed-line phones across the world. TheSmartphones are typically hand-held and may combine the functions of apersonal digital assistant (PDA), and may serve as portable mediaplayers and camera phones with high-resolution touch-screens, webbrowsers that can access, and properly display, standard web pagesrather than just mobile-optimized sites, GPS navigation, Wi-Fi, andmobile broadband access. In addition to telephony, the Smartphones maysupport a wide variety of other services such as text messaging, MMS,email, Internet access, short-range wireless communications (infrared,Bluetooth), business applications, gaming and photography.

An example of a contemporary smartphone is model iPhone 6 available fromApple Inc., headquartered in Cupertino, Calif., U.S.A. and described iniPhone 6 technical specification (retrieved October 2015 fromwww.apple.com/iphone-6/specs/), and in a User Guide dated 2015(019-00155/2015-06) by Apple Inc. entitled: “iPhone User Guide For iOS8.4 Software”, which are both incorporated in their entirety for allpurposes as if fully set forth herein. Another example of a smartphoneis Samsung Galaxy S6 available from Samsung Electronics headquartered inSuwon, South-Korea, described in the user manual numbered English (EU),March 2015 (Rev. 1.0) entitled: “SM-G925F SM-G925FQ SM-G9251 UserManual” and having features and specification described in “Galaxy S6Edge—Technical Specification” (retrieved October 2015 fromwww.samsung.com/us/explore/galaxy-s-6-features-and-specs), which areboth incorporated in their entirety for all purposes as if fully setforth herein.

A mobile operating system (also referred to as mobile OS), is anoperating system that operates a smartphone, tablet, PDA, or othermobile device. Modern mobile operating systems combine the features of apersonal computer operating system with other features, including atouchscreen, cellular, Bluetooth, Wi-Fi, GPS mobile navigation, camera,video camera, speech recognition, voice recorder, music player, nearfield communication and infrared blaster. Currently popular mobile OSare Android, Symbian, Apple iOS, BlackBerry, MeeGo, Windows Phone, andBada. Mobile devices with mobile communications capabilities (e.g.smartphones) typically contain two mobile operating systems—the mainuser-facing software platform is supplemented by a second low-levelproprietary real-time operating system which operates the radio andother hardware.

Android is an open source and Linux-based mobile operating system (OS)based on the Linux kernel that is currently offered by Google. With auser interface based on direct manipulation, Android is designedprimarily for touchscreen mobile devices such as smartphones and tabletcomputers, with specialized user interfaces for televisions (AndroidTV), cars (Android Auto), and wrist watches (Android Wear). The OS usestouch inputs that loosely correspond to real-world actions, such asswiping, tapping, pinching, and reverse pinching to manipulate on-screenobjects, and a virtual keyboard. Despite being primarily designed fortouchscreen input, it also has been used in game consoles, digitalcameras, and other electronics. The response to user input is designedto be immediate and provides a fluid touch interface, often using thevibration capabilities of the device to provide haptic feedback to theuser. Internal hardware such as accelerometers, gyroscopes and proximitysensors are used by some applications to respond to additional useractions, for example adjusting the screen from portrait to landscapedepending on how the device is oriented, or allowing the user to steer avehicle in a racing game by rotating the device, simulating control of asteering wheel.

Android devices boot to the homescreen, the primary navigation andinformation point on the device, which is similar to the desktop foundon PCs. Android homescreens are typically made up of app icons andwidgets; app icons launch the associated app, whereas widgets displaylive, auto-updating content such as the weather forecast, the user'semail inbox, or a news ticker directly on the homescreen. A homescreenmay be made up of several pages that the user can swipe back and forthbetween, though Android's homescreen interface is heavily customizable,allowing the user to adjust the look and feel of the device to theirtastes. Third-party apps available on Google Play and other app storescan extensively re-theme the homescreen, and even mimic the look ofother operating systems, such as Windows Phone. The Android OS isdescribed in a publication entitled: “Android Tutorial”, downloaded fromtutorialspoint.com on July 2014, which is incorporated in its entiretyfor all purposes as if fully set forth herein.

iOS (previously iPhone OS) from Apple Inc. (headquartered in Cupertino,Calif., U.S.A.) is a mobile operating system distributed exclusively forApple hardware. The user interface of the iOS is based on the concept ofdirect manipulation, using multi-touch gestures. Interface controlelements consist of sliders, switches, and buttons. Interaction with theOS includes gestures such as swipe, tap, pinch, and reverse pinch, allof which have specific definitions within the context of the iOSoperating system and its multi-touch interface. Internal accelerometersare used by some applications to respond to shaking the device (onecommon result is the undo command) or rotating it in three dimensions(one common result is switching from portrait to landscape mode). TheiOS is described in the publication entitled: “IOS Tutorial”, downloadedfrom tutorialspoint.com on July 2014, which is incorporated in itsentirety for all purposes as if fully set forth herein.

Geolocation. IP-based geolocation (commonly known as geolocation) is amapping of an IP address (or MAC address) to the real-world geographiclocation of a computing device or a mobile device connected to theInternet. The IP address based location data may include informationsuch as country, region, city, postal/zip code, latitude, longitude, orTimezone. Deeper data sets can determine other parameters such as domainname, connection speed, ISP, Language, proxies, company name, USDMA/MSA, NAICS codes, and home/business classification. The geolocationis further described in the publication entitled: “Towards Street-LevelClient-Independent IP Geolocation” by Yong Wang et al., downloaded fromthe Internet on July 2014, and in an Information Systems Audit andControl Association (ISACA) 2011 white paper entitled: “Geolocation:Risk, Issues and Strategies”, which are both incorporated in theirentirety for all purposes as if fully set forth herein. There are anumber of commercially available geolocation databases, such as aweb-site http://www.ip2location.com operated by Ip2location.comheadquartered in Penang, Malaysia, offering IP geolocation softwareapplications, and geolocation databases may be obtained from IpInfoDBoperating web-site http://ipinfodb.com, and by Max Mind, Inc., based inWaltham, Mass., U.S.A, operating the web-site www.maxmind.com/en/home.

Further, the W3C Geolocation API is an effort by the World Wide WebConsortium (W3C) to standardize an interface to retrieve thegeographical location information for a client-side device. It defines aset of objects, ECMA Script standard compliant, executing in the clientapplication, give the client's device location through the consulting ofLocation Information Servers, which are transparent for the ApplicationProgramming Interface (API). The most common sources of locationinformation are IP address, Wi-Fi and Bluetooth MAC address,radio-frequency identification (RFID), Wi-Fi connection location, ordevice Global Positioning System (GPS) and GSM/CDMA cell IDs. Thelocation is returned with a given accuracy depending on the bestlocation information source available. The W3C Recommendation for thegeolocation API specifications draft dated Oct. 24, 2013, is availablefrom the web-sitehttp://www.w3.org/TR/2013/REC-geolocation-API-20131024.Geolocation-based addressing is described in U.S. Pat. No. 7,929,535 toChen et al., entitled: “Geolocation-based Addressing Method for IPv6Addresses”, and in U.S. Pat. No. 6,236,652 to Preston et al., entitled:“Geo-spacial Internet Protocol Addressing”, and in U.S. PatentApplication Publication No. 2005/0018645 to Mustonen et al., entitled:“Utilization of Geographic Location Information in IP Addressing”, whichare all incorporated in their entirety for all purposes as if fully setforth herein.

Virtualization. The term virtualization typically refers to thetechnology that allows for the creation of software-based virtualmachines that can run multiple operating systems from a single physicalmachine. In one example, virtual machines can be used to consolidate theworkloads of several under-utilized servers to fewer machines, perhaps asingle machine (server consolidation), providing benefits (perceived orreal, but often cited by vendors) such as savings on hardware,environmental costs, management, and administration of the serverinfrastructure. Virtualization scheme allows for the creation ofsubstitutes for real resources, that is, substitutes that have the samefunctions and external interfaces as their counterparts, but that differin attributes, such as size, performance, and cost. These substitutesare called virtual resources, and their users are typically unaware ofthe substitution.

Virtualization is commonly applied to physical hardware resources bycombining multiple physical resources into shared pools from which usersreceive virtual resources. With virtualization, you can make onephysical resource look like multiple virtual resources. Virtualresources can have functions or features that are not available in theirunderlying physical resources. Virtualization can provide the benefitsof consolidation to reduce hardware cost, such as to efficiently accessand manage resources to reduce operations and systems management costswhile maintaining needed capacity, and to have a single server functionas multiple virtual servers. In addition, virtualization can provideoptimization of workloads, such as to respond dynamically to theapplication needs of its users, and to increase the use of existingresources by enabling dynamic sharing of resource pools. Further,virtualization may be used for IT flexibility and responsiveness, suchas by having a single, consolidated view of, and easy access to, allavailable resources in the network, regardless of location, and reducingthe management of your environment by providing emulation forcompatibility and improved interoperability.

Virtual machine (VM). Virtual machine is a representation of a realmachine using software that provides an operating environment which canrun or host a guest operating system. In one example, a virtual machinemay include a self-contained software emulation of a machine, which doesnot physically exist, but shares resources of an underlying physicalmachine. Like a physical computer, a virtual machine runs an operatingsystem and applications. Multiple virtual machines can operateconcurrently on a single host system. There are different kinds ofvirtual machines, each with different functions: System virtual machines(also termed full virtualization VMs) provide a substitute for a realmachine. They provide functionality needed to execute entire operatingsystems. A hypervisor uses native execution to share and managehardware, allowing for multiple environments which are isolated from oneanother, yet exist on the same physical machine. Modern hypervisors usehardware-assisted virtualization, virtualization-specific hardware,primarily from the host CPUs. Process virtual machines are designed toexecute computer programs in a platform-independent environment. Somevirtual machines, such as QEMU, are designed to also emulate differentarchitectures and allow execution of software applications and operatingsystems written for another CPU or architecture. Operating-system-levelvirtualization allows the resources of a computer to be partitioned viathe kernel's support for multiple isolated user space instances, whichare usually called containers and may look and feel like real machinesto the end users.

Guest Operating System. A guest operating system is an operating systemrunning in a virtual machine environment that would otherwise rundirectly on a separate physical system. Operating-system-levelvirtualization, also known as containerization, refers to an operatingsystem feature in which the kernel allows the existence of multipleisolated user-space instances. Such instances, called containers,partitions, Virtualization Engines (VEs) or jails (FreeBSD jail orchroot jail), may look like real computers from the point of view ofprograms running in them. A computer program running on an ordinaryoperating system can see all resources (connected devices, files andfolders, network shares, CPU power, quantifiable hardware capabilities)of that computer. However, programs running inside a container can onlysee the container's contents and devices assigned to the container. Inaddition to isolation mechanisms, the kernel often providesresource-management features to limit the impact of one container'sactivities on other containers. With operating-system-virtualization, orcontainerization, it is possible to run programs within containers, towhich only parts of these resources are allocated. A program expectingto see the whole computer, once run inside a container, can only see theallocated resources and believes them to be all that is available.Several containers can be created on each operating system, to each ofwhich a subset of the computer's resources is allocated. Each containermay contain any number of computer programs. These programs may runconcurrently or separately, even interact with each other.

Hypervisor. Hypervisor commonly refers to a thin layer of software thatgenerally provides virtual partitioning capabilities which runs directlyon hardware, but underneath higher-level virtualization services. Thehypervisor typically manages virtual machines, allowing them to interactdirectly with the underlying hardware. System virtualization createsmany virtual systems within a single physical system. Virtual systemsare independent operating environments that use virtual resources.System virtualization can be approached through hardware partitioning orhypervisor technology. Hardware partitioning subdivides a physicalserver into fractions, each of which can run an operating system. Thesefractions are typically created with coarse units of allocation, such aswhole processors or physical boards. This type of virtualization allowsfor hardware consolidation, but does not have the full benefits ofresource sharing and emulation offered by hypervisors. Hypervisors use athin layer of code in software or firmware to achieve fine-grained,dynamic resource sharing. Because hypervisors provide the greatest levelof flexibility in how virtual resources are defined and managed, theyare the primary technology for system virtualization.

Virtual Machine Monitor. A Virtual Machine Monitor (VMM) is computersoftware, firmware or hardware that creates and runs virtual machines. Acomputer on which a hypervisor runs one or more virtual machines iscalled a host machine, and each virtual machine is called a guestmachine. The hypervisor presents the guest operating systems with avirtual operating platform and manages the execution of the guestoperating systems. Multiple instances of a variety of operating systemsmay share the virtualized hardware resources: for example, Linux,Windows, and macOS instances can all run on a single physical x86machine. This contrasts with operating-system-level virtualization,where all instances (usually called containers) must share a singlekernel, though the guest operating systems can differ in user space,such as different Linux distributions with the same kernel. Typically, aVMM refers to a software that runs in a layer between a hypervisor orhost operating system and one or more virtual machines that provides thevirtual machines abstraction to the guest operating systems. With fullvirtualization, the VMM exports a virtual machine abstraction identicalto the physical machine, so the standard operating system can run justas they would on physical hardware.

Hardware virtualization or platform virtualization refers to thecreation of a virtual machine that acts like a real computer with anoperating system. Software executed on these virtual machines isseparated from the underlying hardware resources. In hardwarevirtualization, the host machine is the actual machine on which thevirtualization takes place, and the guest machine is the virtualmachine. The words host and guest are used to distinguish the softwarethat runs on the physical machine from the software that runs on thevirtual machine. The software or firmware that creates a virtual machineon the host hardware is called a hypervisor or Virtual Machine Manager.Different types of hardware virtualization include full-virtualization,where almost complete simulation of the actual hardware to allowsoftware, which typically consists of a guest operating system, to rununmodified, and Para-virtualization, where a hardware environment is notsimulated; however, the guest programs are executed in their ownisolated domains, as if they are running on a separate system. Guestprograms need to be specifically modified to run in this environment.

Hardware-assisted virtualization is a way of improving overallefficiency of virtualization. It involves CPUs that provide support forvirtualization in hardware, and other hardware components that helpimprove the performance of a guest environment. Hardware virtualizationcan be viewed as part of an overall trend in enterprise IT that includesautonomic computing, a scenario in which the IT environment will be ableto manage itself based on perceived activity, and utility computing, inwhich computer processing power is seen as a utility that clients canpay for only as needed. The usual goal of virtualization is tocentralize administrative tasks while improving scalability and overallhardware-resource utilization. With virtualization, several operatingsystems can be run in parallel on a single central processing unit(CPU). This parallelism tends to reduce overhead costs and differs frommultitasking, which involves running several programs on the same OS.Using virtualization, an enterprise can better manage updates and rapidchanges to the operating system and applications without disrupting theuser.

Server Virtualization. Server virtualization is a virtualizationtechnique that involves partitioning a physical server into a number ofsmall, virtual servers with the help of virtualization software. Inserver virtualization, each virtual server runs multiple operatingsystem instances at the same time. A Virtual Private Server (VPS) is avirtual machine sold as a service by an Internet hosting service, thatruns its own copy of an Operating System (OS), and customers may havesuperuser-level access to that operating system instance, so they caninstall almost any software that runs on that OS. For many purposes theyare functionally equivalent to a dedicated physical server, and beingsoftware-defined, are able to be much more easily created andconfigured. They are typically priced much lower than an equivalentphysical server. However, as they share the underlying physical hardwarewith other VPS's, performance may be lower, depending on the workload ofany other executing virtual machines. Dedicated Servers may also be moreefficient with CPU dependent processes such as hashing algorithms.

Application Virtualization. Application virtualization is softwaretechnology that encapsulates computer programs from the underlyingoperating system on which it is executed. A fully virtualizedapplication is not installed in the traditional sense, although it isstill executed as if it were. The application behaves at runtime like itis directly interfacing with the original operating system and all theresources managed by it, but can be isolated or sandboxed to varyingdegrees. Application virtualization is layered on top of othervirtualization technologies, allowing computing resources to bedistributed dynamically in real-time. In this context, the term“virtualization” commonly refers to the artifact being encapsulated(application), which is quite different from its meaning in hardwarevirtualization, where it refers to the artifact being abstracted(physical hardware).

Network Virtualization. Network Virtualization refers to the process ofcombining hardware and software network resources to create a singlepool of resources that make up a virtual network that can be accessedwithout regard to the physical component. Network virtualizationtypically involves combining hardware and software network resources andnetwork functionality into a single, software-based administrativeentity, a virtual network. Network virtualization involves platformvirtualization, often combined with resource virtualization. Networkvirtualization is categorized as either external virtualization,combining many networks or parts of networks into a virtual unit, orinternal virtualization, providing network-like functionality tosoftware containers on a single network server.

Storage Virtualization. Storage virtualization refers to the process ofconsolidating the physical storage from multiple network storage devicesso that it appears to be a single storage unit. Within the context of astorage system, there are two primary types of virtualization that canoccur: Block virtualization used in this context refers to theabstraction (separation) of logical storage (partition) from physicalstorage so that it may be accessed without regard to physical storage orheterogeneous structure. This separation allows the administrators ofthe storage system greater flexibility in how they manage storage forend users. File virtualization addresses the NAS challenges byeliminating the dependencies between the data accessed at the file leveland the location where the files are physically stored. This providesopportunities to optimize storage use and server consolidation and toperform non-disruptive file migrations.

Desktop Virtualization. Desktop virtualization refers to the process ofvirtualizing desktop computers using virtualization software, such thatthe desktop computer and the associated operating system andapplications are separated from the physical client device that is usedto access it. Desktop virtualization is software technology thatseparates the desktop environment and associated application softwarefrom the physical client device that is used to access it.

Desktop virtualization can be used in conjunction with applicationvirtualization and user profile management systems, now termed “uservirtualization,” to provide a comprehensive desktop environmentmanagement system. In this mode, all the components of the desktop arevirtualized, which allows for a highly flexible and much more securedesktop delivery model. In addition, this approach supports a morecomplete desktop disaster recovery strategy as all components areessentially saved in the data center and backed up through traditionalredundant maintenance systems. If a user's device or hardware is lost,the restore is straightforward and simple, because the components willbe present at login from another device. In addition, because no data issaved to the user's device, if that device is lost, there is much lesschance that any critical data can be retrieved and compromised. VirtualDesktop Infrastructure (VDI)—The practice of hosting a desktopenvironment within a virtual machine that runs on a centralized orremote server.

An example of a virtualization architecture 900 is shown in FIG. 3 b ,where three virtual machines are exemplified. A Virtual Machine (VM) #1910 a provides virtualization for the application 901 a that uses theguest OS 902 a, which in turn interfaces with the virtual hardware 903 athat emulates the actual hardware. Similarly, a Virtual Machine (VM) #2910 b provides virtualization for the application 901 b that uses theguest OS 902 b, which in turn interfaces with the virtual hardware 903 bthat emulates the associated actual hardware, and a Virtual Machine (VM)#3 910 c provides virtualization for the application 901 c that uses theguest OS 902 c, which in turn interfaces with the virtual hardware 903 cthat emulates the associated actual hardware. The abstraction layer isprovided by VMM 904, allowing of hardware-independence of operatingsystem and applications, provisioning on any single physical system, andmanaging the applications and the OSs as a single encapsulated unit.

A hosted architecture 900 a for virtualization is shown in FIG. 3 c ,where a wide range of actual host hardware 906 may be used byimplementing a host operating system 905 layer between the actualhardware 906 and the VMM 904. Such configuration relies on the host OS905 for device support and physical resource management. In contrast, abare-metal architecture 900 b is shown in FIG. 3 d , where a hypervisorlayer (in addition to, or as part of, the VMM 904) is used as the firstlayer, allowing the VMM 904 to have direct access to the hardwareresources, hence providing more efficient, and greater scalability,robustness, and performance.

Cloud computing and virtualization is described in a book entitled“Cloud Computing and Virtualization” authored by Dac-Nhuong Le (Facultyof Information Technology, Haiphong University, Haiphong, Vietnam),Raghvendra Kumar (Department of Computer Science and Engineering, LNCT,Jabalpur, India), Gia Nhu Nguyen (Graduate School, Duy Tan University,Da Nang, Vietnam), and Jyotir Moy Chatterjee (Department of ComputerScience and Engineering at GD-RCET, Bhilai, India), and published 2018by John Wiley & Sons, Inc. [ISBN 978-1-119-48790-6], which isincorporated in its entirety for all purposes as if fully set forthherein. The book describes the adoption of virtualization in datacenters creates the need for a new class of networks designed to supportelasticity of resource allocation, increasing mobile workloads and theshift to production of virtual workloads, requiring maximumavailability. Building a network that spans both physical servers andvirtual machines with consistent capabilities demands a newarchitectural approach to designing and building the IT infrastructure.Performance, elasticity, and logical addressing structures must beconsidered as well as the management of the physical and virtualnetworking infrastructure. Once deployed, a network that isvirtualization-ready can offer many revolutionary services over a commonshared infrastructure. Virtualization technologies from VMware, Citrixand Microsoft encapsulate existing applications and extract them fromthe physical hardware. Unlike physical machines, virtual machines arerepresented by a portable software image, which can be instantiated onphysical hardware at a moment's notice. With virtualization, comeselasticity where computer capacity can be scaled up or down on demand byadjusting the number of virtual machines actively executing on a givenphysical server. Additionally, virtual machines can be migrated while inservice from one physical server to another.

Extending this further, virtualization creates “location freedom”enabling virtual machines to become portable across an ever-increasinggeographical distance. As cloud architectures and multi-tenancycapabilities continue to develop and mature, there is an economy ofscale that can be realized by aggregating resources across applications,business units, and separate corporations to a common shared, yetsegmented, infrastructure. Elasticity, mobility, automation, and densityof virtual machines demand new network architectures focusing on highperformance, addressing portability, and the innate understanding of thevirtual machine as the new building block of the data center. Consistentnetwork-supported and virtualization-driven policy and controls arenecessary for visibility to virtual machines' state and location as theyare created and moved across a virtualized infrastructure.

Virtualization technologies in data center environments are described ina eBook authored by Gustavo Alessandro Andrade Santana and published2014 by Cisco Systems, Inc. (Cisco Press) [ISBN-13: 978-1-58714-324-3]entitled: “Data Center Virtualization Fundamentals”, which isincorporated in its entirety for all purposes as if fully set forthherein. PowerVM technology for virtualization is described in IBMRedBook entitled: “IBM PowerVM Virtualization—Introduction andConfiguration” published by IBM Corporation June 2013, andvirtualization basics is described in a paper by IBM Corporationpublished 2009 entitled: “Power Systems—Introduction to virtualization”,which are both incorporated in their entirety for all purposes as iffully set forth herein.

FIG. 1 shows a block diagram that illustrates a system 10 including acomputer system 11 and an associated Internet 113 connection. Suchconfiguration is typically used for computers (hosts) connected to theInternet 113 and executing a server or a client (or a combination)software. The system 11 may be used as a portable electronic device suchas a notebook/laptop computer, a media player (e.g., MP3 based or videoplayer), a desktop computer, a laptop computer, a cellular phone, aPersonal Digital Assistant (PDA), an image processing device (e.g., adigital camera or video recorder), and/or any other handheld or fixedlocation computing devices, or a combination of any of these devices.Note that while FIG. 1 illustrates various components of a computersystem, it is not intended to represent any particular architecture ormanner of interconnecting the components; as such details are notgermane. It will also be appreciated that network computers, handheldcomputers, cell phones and other data processing systems which havefewer components or perhaps more components may also be used. Thecomputer system of FIG. 1 may, for example, be an Apple Macintoshcomputer or Power Book, or an IBM compatible PC. The computer system 11includes a bus 13, an interconnect, or other communication mechanism forcommunicating information, and the processor 27, commonly in the form ofan integrated circuit, coupled to the bus 13 for processing informationand for executing the computer executable instructions. Computer system11 also includes a main memory 25 a, such as a Random Access Memory(RAM) or other dynamic storage device, coupled to bus 13 for storinginformation and instructions to be executed by the processor 27. Mainmemory 25 a also may be used for storing temporary variables or otherintermediate information during execution of instructions to be executedby processor 27. The computer system 11 further includes a Read OnlyMemory (ROM) 25 b (or other non-volatile memory) or other static storagedevice coupled to the bus 13 for storing static information andinstructions for the processor 27. A storage device 25 c, such as amagnetic disk or optical disk, a Hard Disk Drive (HDD) for reading fromand writing to a hard disk, a magnetic disk drive for reading from andwriting to a magnetic disk, and/or an optical disk drive (such as DVD)for reading from and writing to a removable optical disk, is coupled tobus 13 for storing information and instructions. The hard disk drive,magnetic disk drive, and optical disk drive may be connected to thesystem bus by a hard disk drive interface, a magnetic disk driveinterface, and an optical disk drive interface, respectively. The drivesand their associated computer-readable media provide non-volatilestorage of computer readable instructions, data structures, programmodules and other data for the general purpose computing devices.Typically, the computer system 11 includes an Operating System (OS)stored in a non-volatile storage for managing the computer resources andprovides the applications and programs with an access to the computerresources and interfaces. An operating system commonly processes systemdata and user input, and responds by allocating and managing tasks andinternal system resources, such as controlling and allocating memory,prioritizing system requests, controlling input and output devices,facilitating networking and managing files. Non-limiting examples ofoperating systems are Microsoft Windows, Mac OS X, and Linux.

The term “processor” is used herein to include, but not limited to, anyintegrated circuit or other electronic device (or collection of devices)capable of performing an operation on at least one instruction,including, without limitation, Reduced Instruction Set Core (RISC)processors, CISC microprocessors, Microcontroller Units (MCUs),CISC-based Central Processing Units (CPUs), and Digital SignalProcessors (DSPs). The hardware of such devices may be integrated onto asingle substrate (e.g., silicon “die”), or distributed among two or moresubstrates. Furthermore, various functional aspects of the processor maybe implemented solely as software or firmware associated with theprocessor.

The computer system 11 may be coupled via the bus 13 to a display 17,such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), a flatscreen monitor, a touch screen monitor or similar means for displayingtext and graphical data to a user. The display may be connected via avideo adapter for supporting the display. The display 17 allows a userto view, enter, and/or edit information that is relevant to theoperation of the system. An input device 18, including alphanumeric andother keys, is coupled to the bus 13 for communicating information andcommand selections to the processor 27. Another type of user inputdevice is a cursor control 19, such as a mouse, a trackball, or cursordirection keys for communicating direction information and commandselections to the processor 27 and for controlling cursor movement onthe display 17. This input device typically has two degrees of freedomin two axes, a first axis (e.g., x) and a second axis (e.g., y), thatallows the device to specify positions in a plane.

The computer system 11 may be used for implementing the methods andtechniques described herein. According to one embodiment, those methodsand techniques are performed by the computer system 11 in response tothe processor 27 executing one or more sequences of one or moreinstructions contained in a main memory 25 a. Such instructions may beread into the main memory 25 a from another computer-readable medium,such as the storage device 25 c. Execution of the sequences ofinstructions contained in the main memory 25 a causes the processor 27to perform the process steps described herein. In alternativeembodiments, hard-wired circuitry may be used in place of or incombination with software instructions to implement the arrangement.Thus, embodiments of the invention are not limited to any specificcombination of hardware circuitry and software.

The term “computer-readable medium” (or “machine-readable medium”) isused herein to include, but not limited to, any medium or any memory,that participates in providing instructions to a processor, (such as theprocessor 27) for execution, or any mechanism for storing ortransmitting information in a form readable by a machine (e.g., acomputer). Such a medium may store computer-executable instructions tobe executed by a processing element and/or control logic, and data whichis manipulated by a processing element and/or control logic, and maytake many forms, including but not limited to, non-volatile medium,volatile medium, and transmission medium. Transmission media includescoaxial cables, copper wire and fiber optics, including the wires thatcomprise the bus 13. Transmission media can also take the form ofacoustic or light waves, such as those generated during radio-wave andinfrared data communications, or other form of propagating signals(e.g., carrier waves, infrared signals, digital signals, etc.). Commonforms of computer-readable media include, for example, a floppy disk, aflexible disk, hard disk, magnetic tape, or any other magnetic medium, aCD-ROM, any other optical medium, punch-cards, paper-tape, any otherphysical medium with patterns of holes, a RAM, a PROM, and EPROM, aFLASH-EPROM, any other memory chip or cartridge, a carrier wave asdescribed hereinafter, or any other medium from which a computer canread.

Various forms of computer-readable media may be involved in carrying oneor more sequences of one or more instructions to the processor 27 forexecution. For example, the instructions may initially be carried on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to the computer system 11can receive the data on the telephone line and use an infraredtransmitter to convert the data to an infrared signal. An infrareddetector can receive the data carried in the infrared signal andappropriate circuitry can place the data on the bus 13. The bus 13carries the data to the main memory 25 a, from which the processor 27retrieves and executes the instructions. The instructions received bythe main memory 25 a may optionally be stored on the storage device 25 ceither before or after execution by the processor 27.

The computer system 11 commonly includes a communication interface 29coupled to the bus 13. The communication interface 29 provides a two-waydata communication coupling to a network link 28 that is connected to alocal network 14. For example, the communication interface 29 may be anIntegrated Services Digital Network (ISDN) card or a modem to provide adata communication connection to a corresponding type of telephone line.As another non-limiting example, the communication interface 29 may be alocal area network (LAN) card to provide a data communication connectionto a compatible LAN. For example, Ethernet based connection based onIEEE802.3 standard may be used, such as 10/100BaseT, 1000BaseT (gigabitEthernet), 10 gigabit Ethernet (10GE or 10 GbE or 10 GigE per IEEE Std.802.3ae-2002as standard), 40 Gigabit Ethernet (40 GbE), or 100 GigabitEthernet (100 GbE as per Ethernet standard IEEE P802.3ba). Thesetechnologies are described in Cisco Systems, Inc. Publication number1-587005-001-3 (June 1999), “Internetworking Technologies Handbook”,Chapter 7: “Ethernet Technologies”, pages 7-1 to 7-38, which isincorporated in its entirety for all purposes as if fully set forthherein. In such a case, the communication interface 29 typicallyincludes a LAN transceiver or a modem, such as Standard MicrosystemsCorporation (SMSC) LAN91C111 10/100 Ethernet transceiver, described in aStandard Microsystems Corporation (SMSC) data-sheet “LAN91C111 10/100Non-PCI Ethernet Single Chip MAC+PHY” Data-Sheet, Rev. 15 (Feb. 20,2004), which is incorporated in its entirety for all purposes as iffully set forth herein.

The Internet 113 is a global system of interconnected computer networksthat use the standardized Internet Protocol Suite (TCP/IP), includingTransmission Control Protocol (TCP) and the Internet Protocol (IP), toserve billions of users worldwide. It is a network of networks thatconsists of millions of private, public, academic, business, andgovernment networks, of local to global scope, that are linked by abroad array of electronic and optical networking technologies. TheInternet carries a vast range of information resources and services,such as the interlinked hypertext documents on the World Wide Web (WWW)and the infrastructure to support electronic mail. The Internet backbonerefers to the principal data routes between large, strategicallyinterconnected networks and core routers in the Internet. These dataroutes are hosted by commercial, government, academic and otherhigh-capacity network centers, the Internet exchange points and networkaccess points that interchange Internet traffic between the countries,continents and across the oceans of the world. Traffic interchangebetween Internet service providers (often Tier 1 networks) participatingin the Internet backbone exchange traffic by privately negotiatedinterconnection agreements, primarily governed by the principle ofsettlement-free peering.

An Internet Service Provider (ISP) 12 is an organization that providesservices for accessing, using, or participating in the Internet 113.Internet Service Providers may be organized in various forms, such ascommercial, community-owned, non-profit, or otherwise privately owned.Internet services typically provided by ISPs include Internet access,Internet transit, domain name registration, web hosting, and colocation.Various ISP Structures are described in Chapter 2: “Structural Overviewof ISP Networks” of the book entitled: “Guide to Reliable InternetServices and Applications”, by Robert D. Doverspike, K. K. Ramakrishnan,and Chris Chase, published 2010 (ISBN: 978-1-84882-827-8), which isincorporated in its entirety for all purposes as if fully set forthherein.

A mailbox provider is an organization that provides services for hostingelectronic mail domains with access to storage for mailboxes. Itprovides email servers to send, receive, accept, and store email for endusers or other organizations. Internet hosting services provide email,web-hosting, or online storage services. Other services include virtualserver, cloud services, or physical server operation. A virtual ISP(VISP) is an operation that purchases services from another ISP,sometimes called a wholesale ISP in this context, which allow the VISP'scustomers to access the Internet using services and infrastructure ownedand operated by the wholesale ISP. It is akin to mobile virtual networkoperators and competitive local exchange carriers for voicecommunications. A Wireless Internet Service Provider (WISP) is anInternet service provider with a network based on wireless networking.Technology may include commonplace Wi-Fi wireless mesh networking, orproprietary equipment designed to operate over open 900 MHz, 2.4 GHz,4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies in the UHFband (including the MMDS frequency band) and LMDS.

ISPs may engage in peering, where multiple ISPs interconnect at peeringpoints or Internet exchange points (IXs), allowing routing of databetween each network, without charging one another for the datatransmitted—data that would otherwise have passed through a thirdupstream ISP, incurring charges from the upstream ISP. ISPs requiring noupstream and having only customers (end customers and/or peer ISPs), arereferred to as Tier 1 ISPs.

A multitasking is a method where multiple tasks (also known as processesor programs) are performed during the same period of time—they areexecuted concurrently (in overlapping time periods, new tasks startingbefore others have ended) instead of sequentially (one completing beforethe next starts). The tasks share common processing resources, such as aCPU and main memory. Multitasking does not necessarily mean thatmultiple tasks are executing at exactly the same instant. In otherwords, multitasking does not imply parallelism, but it does mean thatmore than one task can be part-way through execution at the same time,and more than one task is advancing over a given period of time.

In the case of a computer with a single CPU, only one task is running atany point in time, meaning that the CPU is actively executinginstructions for that task. Multitasking solves the problem byscheduling which task may be the one running at any given time, and whenanother waiting task gets a turn. The act of reassigning a CPU from onetask to another one is called a context switch. When context switchesoccur frequently enough, the illusion of parallelism is achieved. Evenon computers with more than one CPU (called multiprocessor machines) ormore than one core in a given CPU (called multicore machines), wheremore than one task can be executed at a given instant (one per CPU orcore), multitasking allows many more tasks to be run than there areCPUs.

Operating systems may adopt one of many different scheduling strategies.In multiprogramming systems, the running task keeps running until itperforms an operation that requires waiting for an external event (e.g.reading from a tape) or until the computer's scheduler forcibly swapsthe running task out of the CPU. Multiprogramming systems are designedto maximize CPU usage. In time-sharing systems, the running task isrequired to relinquish the CPU, either voluntarily or by an externalevent such as a hardware interrupt. Time sharing systems are designed toallow several programs to execute apparently simultaneously. Inreal-time systems, some waiting tasks are guaranteed to be given the CPUwhen an external event occurs. Real time systems are designed to controlmechanical devices such as industrial robots, which require timelyprocessing.

Encryption based mechanisms are commonly end-to-end processes involvingonly the sender and the receiver, where the sender encrypts the plaintext message by transforming it using an algorithm, making it unreadableto anyone, except the receiver which possesses special knowledge. Thedata is then sent to the receiver over a network such as the Internet,and when received the special knowledge enables the receiver to reversethe process (decrypt) to make the information readable as in theoriginal message. The encryption process commonly involves computingresources such as processing power, storage space and requires time forexecuting the encryption/decryption algorithm, which may delay thedelivery of the message.

Transport Layer Security (TLS) and its predecessor Secure Sockets Layer(SSL) are non-limiting examples of end-to-end cryptographic protocols,providing secured communication above the OSI Transport Layer, usingkeyed message authentication code and symmetric cryptography. Inclient/server applications, the TLS client and server negotiate astateful connection by using a handshake procedure, during which variousparameters are agreed upon, allowing a communication in a way designedto prevent eavesdropping and tampering. The TLS 1.2 is defined in RFC5246, and several versions of the protocol are in widespread use inapplications such as web browsing, electronic mail, Internet faxing,instant messaging and Voice-over-IP (VoIP). In application design, TLSis usually implemented on top of any of the Transport Layer protocols,encapsulating the application-specific protocols such as HTTP, FTP,SMTP, NNTP, and XMPP. Historically, it has been used primarily withreliable transport protocols such as the Transmission Control Protocol(TCP). However, it has also been implemented with datagram-orientedtransport protocols, such as the User Datagram Protocol (UDP) and theDatagram Congestion Control Protocol (DCCP), a usage which has beenstandardized independently using the term Datagram Transport LayerSecurity (DTLS). A prominent use of TLS is for securing World Wide Webtraffic carried by HTTP to form HTTPS. Notable applications areelectronic commerce and asset management. Increasingly, the Simple MailTransfer Protocol (SMTP) is also protected by TLS (RFC 3207). Theseapplications use public key certificates to verify the identity ofendpoints. Another Layer 4 (Transport Layer) and upper layersencryption-based communication protocols include SSH (Secure Shell) andSSL (Secure Socket Layer).

To provide the server name, RFC 4366 Transport Layer Security (TLS)Extensions allow clients to include a Server Name Indication extension(SNI) in the extended ClientHello message. This extension hints theserver immediately which name the client wishes to connect to, so theserver can select the appropriate certificate to send to the clients.

Layer 3 (Network Layer) and lower layer encryption based protocolsinclude IPsec, L2TP (Layer 2 Tunneling Protocol) over IPsec, andEthernet over IPsec. The IPsec is a protocol suite for securing IPcommunication by encrypting and authenticating each IP packet of acommunication session. The IPsec standard is currently based on RFC 4301and RFC 4309, and was originally described in RFCs 1825-1829, which arenow obsolete, and uses the Security Parameter Index (SPI, as per RFC2401) as an identification tag added to the header while using IPsec fortunneling the IP traffic. An IPsec overview is provided in CiscoSystems, Inc. document entitled: “An Introduction to IP Security (IPSec)Encryption”, which is incorporated in its entirety for all purposes asif fully set forth herein.

Two common approaches to cryptography are found in U.S. Pat. No.3,962,539 to Ehrsam et al., entitled “Product Block Cipher System forData Security”, and in U.S. Pat. No. 4,405,829 to Rivest et al.,entitled “Cryptographic Communications System and Method”, which areboth incorporated in their entirety for all purposes as if fully setforth herein. The Ehrsam patent discloses what is commonly known as theData Encryption Standard (DES), while the Rivest patent discloses whatis commonly known as the RSA algorithm (which stands for Rivest, Shamirand Adleman who first publicly described it), which is widely used inelectronic commerce protocols. The RSA involves using a public key and aprivate key. DES is based upon secret-key cryptography, also referred toas symmetric cryptography, and relies upon a 56-bit key for encryption.In this form of cryptography, the sender and receiver of cipher textboth possess identical secret keys, which are, in an ideal world,completely unique and unknown to the world outside of the sender andreceiver. By encoding plain text into cipher text using the secret key,the sender may send the cipher text to the receiver using any availablepublic or otherwise insecure communication system. The receiver, havingreceived the cipher text, decrypts it using the secret key to arrive atthe plain text.

SNI. Server Name Indication (SNI) is an extension to the TLS computernetworking protocol by which a client indicates which hostname it isattempting to connect to at the start of the handshaking process. Thisallows a server to present multiple certificates on the same IP addressand TCP port number and hence allows multiple secure (HTTPS) websites(or any other Service over TLS) to be served by the same IP addresswithout requiring all those sites to use the same certificate. It is theconceptual equivalent to HTTP/1.1 name-based virtual hosting, but forHTTPS. The desired hostname is not encrypted, so an eavesdropper can seewhich site is being requested.

SNI addresses this issue by having the client sends the name of thevirtual domain as part of the TLS negotiation. This enables the serverto select the correct virtual domain early and present the browser withthe certificate containing the correct name. Therefore, with clients andservers that implement SNI, a server with a single IP address can servea group of domain names for which it is impractical to get a commoncertificate. SNI was added to the IETF's Internet RFCs in June 2003through RFC 3546, Transport Layer Security (TLS) Extensions. The latestversion of the standard is RFC 6066. For an application program toimplement SNI, the TLS library it uses must implement it and theapplication must pass the hostname to the TLS library. Further, the TLSlibrary may either be included in the application program or be acomponent of the underlying operating system.

Proxy server. A proxy server is a server (a computer system or anapplication) that acts as an intermediary for requests from clientsseeking resources from other servers. A client connects to the proxyserver, requesting some service, such as a file, connection, web page,or other resource, available from a different server and the proxyserver evaluates the request as a way to simplify and control itscomplexity. Proxies may be used to add structure and encapsulation todistributed systems. Today, most proxies are web proxies, facilitatingaccess to content on the World Wide Web and providing anonymity. A proxyserver may reside on the user's local computer, or at various pointsbetween the user's computer and destination servers on the Internet. Aproxy server that passes requests and responses unmodified is usuallycalled a gateway or sometimes a tunneling proxy. A forward proxy is anInternet-facing proxy used to retrieve from a wide range of sources (inmost cases anywhere on the Internet). Forward proxies are proxies inwhich the client server names the target server to connect to, and areable to retrieve from a wide range of sources (in most cases anywhere onthe Internet). An open proxy is a forwarding proxy server that isaccessible by any Internet user, while browsing the Web or using otherInternet services. There are varying degrees of anonymity, however, aswell as a number of methods of ‘tricking’ the client into revealingitself regardless of the proxy being used. Proxy server is furtherdescribed in IETF RFC 1919 (March 1996) “Classical versus Transparent IPProxies” and in IETF RFC 3143 (March 1996) “Known HTTP Proxy/CachingProblems” (June 2001), which are both incorporated in their entirety forall purposes as if fully set forth herein.

A reverse proxy (or surrogate) is a proxy server that appears to clientsto be an ordinary server. Requests are forwarded to one or more proxyservers which handle the request. The response from the proxy server isreturned as if it came directly from the original server, leaving theclient no knowledge of the origin servers. Reverse proxies are installedin the neighborhood of one or more web servers. All traffic coming fromthe Internet and with a destination of one of the neighborhood's webservers goes through the proxy server. The use of “reverse” originatesin its counterpart “forward proxy” since the reverse proxy sits closerto the web server and serves only a restricted set of websites.

FIG. 5 shows a system 50 including two client devices, a client device#1 31 a and a client device #2 31 b, that may access the web servers(data servers) 22 a and 22 b. These network elements communicate witheach other using the Internet 113. An illustrative example of directfetching or content without any use of any intermediary device (such asa proxy server) is shown in a schematic messaging flow diagram 50 a inFIG. 5 a . As part of executing a web server application in the clientdevice #1 31 a, a request for content from the data server #1 22 a,typically by means of an URL request is identified. As a result, theclient device #1 31 a sends a ‘Content Request’ message 55 a over theInternet 113 (typically as an HTTP request) to the data server #1 22 a.The IP packets that form the ‘Content Request’ message 55 a include theIP of the data server #1 22 a in the ‘Destination IP Address’ field 16c, and the IP address of the requesting client device #1 31 a isincluded in the ‘Source IP Address’ field 16 d. As a result, the dataserver #1 22 a responds to the received request by sending the requestedcontent (such as a web page) as a ‘Send Content’ message 55 b over theInternet 113 (typically as an HTTP request) to the requesting clientdevice #1 31 a. The IP packets that form the ‘Send Content’ message 55 binclude the IP of the data server #1 22 a in the ‘Source IP Address’field 16 d, and the IP address of the requesting client device #1 31 ais included in the ‘Destination IP Address’ field 16 c.

Since the IP address of the requesting client device #1 31 a is includedin the packets that are received by the data server #1 22 a as part ofthe HTTP request in the ‘Content Request’ message 55 a over the Internet113, the data server #1 22 a is aware of the identity of the requestingclient #1 31 a, revealing its identity, and no anonymity is obtained.

An illustrative example of using a proxy server is shown in a schematicmessaging flow diagram 50 b in FIG. 5 b . A ‘Content Request’ message 54a is first sent from the client device #1 31 a to a proxy server 53,which responds by forwarding the request to the data server #1 22 ausing a ‘Content Request’ message 54 b. In turn the data server #1 22 areplies and sends the content in a ‘Send Content’ message 54 c to therequesting proxy server 53, which in turn forward the fetched content tothe asking client device #1 31 a using a ‘Send Content’ message 54 d.Hence, the client device #1 31 a received the requested content inresponse to the sent ‘Content Request’ message 54 a.

A main benefit of using the proxy server 53 relates to the anonymityobtained. While the ‘Content Request’ message 54 a typically includesthe IP address of the sending requesting client device #1 31 a (in the‘Source IP Address’ field 16 d), the request message that arrives aspart of the ‘Content Request’ message 54 b includes the IP address ofthe proxy server 53 in the ‘Source IP Address’ field 16 d of the packetsthat form the ‘Content Request’ message 54 b. Hence, the data server #122 a is only aware of the identity of the proxy server 53 as therequesting device, and the anonymity of the actual requesting client #131 a is reserved, while properly fetching the requested content.

A ‘transparent proxy’ is a proxy that does not modify the request orresponse beyond what is required for proxy authentication andidentification. Transparent proxy, also known as an intercepting proxy,inline proxy, or forced proxy, is a proxy that intercepts normalcommunication at the network layer without requiring any special clientconfiguration. Clients need not be aware of the existence of the proxy.A transparent proxy is normally located between the client and theInternet, with the proxy performing some of the functions of a gatewayor router. A ‘non-transparent proxy’ is a proxy that modifies therequest or response in order to provide some added service to the useragent, such as group annotation services, media type transformation,protocol reduction, or anonymity filtering. TCP Intercept is a trafficfiltering security feature that protects TCP servers from TCP SYN floodattacks, which are a type of denial-of-service attack. TCP Intercept isavailable for IP traffic only. Intercepting proxies are commonly used inbusinesses to enforce acceptable use policy, and to ease administrativeoverheads, since no client browser configuration is required. Thissecond reason however is mitigated by features such as Active Directorygroup policy, or DHCP and automatic proxy detection. Interceptingproxies are also commonly used by ISPs in some countries to saveupstream bandwidth and improve customer response times by caching.

An ‘open proxy’ is used for forwarding requests from and to anywhere onthe Internet, and is a forwarding proxy server that is accessible by anyInternet user. An ‘anonymous proxy’ reveals its identity as a proxyserver, but does not disclose the originating IP address of the client.While this type of server may be easily discovered, it may be beneficialfor some users for hiding their originating IP address. A ‘transparentproxy’ does not only identifies itself as a proxy server, but with thesupport of HTTP header fields such as X-Forwarded-For, the originatingIP address may be retrieved as well. The main benefit of using this typeof server is its ability to cache a website for faster retrieval.

A ‘reverse proxy’ is taking requests from the Internet and forwardingthem to servers in an internal network, while those making requestsconnect to the proxy and may not be aware of the internal network. Areverse proxy (or surrogate) is a proxy server that appears to clientsto be an ordinary server. Reverse proxies forward requests to one ormore ordinary servers which handle the request. The response from theproxy server is returned as if it came directly from the originalserver, leaving the client with no knowledge of the original server.Reverse proxies are installed in the neighborhood of one or more webservers. All traffic coming from the Internet and with a destination ofone of the neighborhood's web servers goes through the proxy server. Theuse of “reverse” originates in its counterpart “forward proxy” since thereverse proxy sits closer to the web server and serves only a restrictedset of websites. Reverse proxy servers typically support or provideEncryption/SSL acceleration—when secure web sites are created, theSecure Sockets Layer (SSL) encryption is often not done by the webserver itself, but by a reverse proxy that is equipped with SSLacceleration hardware. Furthermore, a host can provide a single “SSLproxy” to provide SSL encryption for an arbitrary number of hosts;removing the need for a separate SSL Server Certificate for each host,with the downside that all hosts behind the SSL proxy have to share acommon DNS name or IP address for SSL connections. Further, reverseproxy servers typically support or provide load balancing—the reverseproxy can distribute the load to several web servers, each web serverserving its own application area. In such a case, the reverse proxy mayneed to rewrite the URLs in each web page (translation from externallyknown URLs to the internal locations), and serve/cache static content—areverse proxy can offload the web servers by caching static content likepictures and other static graphical content. Further, the proxy servercan optimize and compress the content to speed up the load time, and mayfurther support or provides Spoon feeding, where reduced resource usageis caused by slow clients on the web servers by caching the content theweb server sent and slowly “spoon feeding” it to the client, whichbenefits dynamically generated pages. Further, reverse proxy serverstypically support or provide security, where the proxy server is anadditional layer of defense and can protect against some OS and WebServer specific attacks, and Extranet Publishing—where a reverse proxyserver facing the Internet can be used to communicate to a firewallserver internal to an organization, providing extranet access to somefunctions while keeping the servers behind the firewalls. If used inthis way, security measures should be considered to protect the rest ofyour infrastructure in case this server is compromised, as its webapplication is exposed to attack from the Internet.

A ‘translation proxy’ is a proxy server that is used to localize awebsite experience for different markets. Traffic from global audienceis routed through the translation proxy to the source website, and asvisitors browse the proxied site, requests go back to the source sitewhere pages are rendered. Original language content in the response isreplaced by the translated content as it passes back through the proxy.The translations used in a translation proxy can be either machinetranslation, human translation, or a combination of machine and humantranslation. Different translation proxy implementations have differentcapabilities. Some allow further customization of the source site forlocal audience such as excluding the source content or substituting thesource content with the original local content. A ‘SOCKS proxy’ forwardsarbitrary data after a connection phase, and is similar to HTTP CONNECTin web proxies.

A ‘CGI web proxy’ accepts target URLs using a Web form in the user'sbrowser window, processes the request, and returns the results to theuser's browser. Consequently, it can be used on a device or network thatdoes not allow “true” proxy settings to be changed. Typically CGIproxies are powered by one of CGIProxy (written in the Perl language),Glype (written in the PHP language), or PHProxy (written in the PHPlanguage). Some CGI proxies were set up for purposes such as makingwebsites more accessible to disabled people, but have since been shutdown due to excessive traffic, usually caused by a third partyadvertising the service as a means to bypass local filtering. Since manyof these users do not care about the collateral damage they are causing,it became necessary for organizations to hide their proxies, disclosingthe URLs only to those who take the trouble to contact the organizationand demonstrate a genuine need.

A ‘suffix proxy’ allows a user to access web content by appending thename of the proxy server to the URL of the requested content (e.g.“en.wikipedia.org.SuffixProxy.com”). Suffix proxy servers are easier touse than regular proxy servers but they do not offer high levels ofanonymity and their primary use is for bypassing web filters.

An ‘I2P anonymous proxy’ is part of the I2P anonymous network (‘I2P’),that is a proxy network aiming at online anonymity. It implements garlicrouting, which is an enhancement of Tor's onion routing. I2P is fullydistributed and works by encrypting all communications in various layersand relaying them through a network of routers run by volunteers invarious locations. By keeping the source of the information hidden, I2Poffers censorship resistance. The goals of I2P are to protect users'personal freedom, privacy, and ability to conduct confidential business.Each user of I2P runs an I2P router on their computer (node). The I2Prouter takes care of finding other peers and building anonymizingtunnels through them. I2P provides proxies for all protocols, such asHTTP, IRC, and SOCKS. The Onion Router (Tor) is a system intended toprovide online anonymity. Tor client software routes Internet trafficthrough a worldwide volunteer network of servers for concealing a usercomputer location or usage from someone conducting network surveillanceor traffic analysis. Using Tor makes tracing Internet activity moredifficult, and is intended to protect users' personal freedom, privacy.“Onion routing” refers to the layered nature of the encryption service:The original data are encrypted and re-encrypted multiple times, thensent through successive Tor relays, each one of which decrypts a “layer”of encryption before passing the data on to the next relay andultimately the destination. This reduces the possibility of the originaldata being unscrambled or understood in transit. A ‘DNS proxy server’takes DNS queries from a (usually local) network and forwards them to anInternet Domain Name Server. It may also cache DNS records.

Squid is an open source caching proxy for the Web, allowing for usingless bandwidth on your Internet connection when surfing the Web,reducing the amount of time web pages take to load, protecting the hostson your internal network by proxying their web traffic, collectingstatistics about web traffic on your network, preventing users fromvisiting inappropriate web sites at work or school, ensuring that onlyauthorized users can surf the Internet, enhancing your user's privacy byfiltering sensitive information from web requests, reducing the load onyour own web server(s), and converting encrypted (HTTPS) requests on oneside, to unencrypted (HTTP). Squid's job is to be both a proxy and acache. As a proxy, Squid is an intermediary in a web transaction. Itaccepts a request from a client, processes that request, and thenforwards the request to the origin server. The request may be logged,rejected, and even modified before forwarding. As a cache, Squid storesrecently retrieved web content for possible reuse later. Subsequentrequests for the same content may be served from the cache, rather thancontacting the origin server again. You can disable the caching part ofSquid if you like, but the proxying part is essential. Squid isdescribed in a book by Wessels entitled: “Squid. The Definitive Guide”published by O'Reilly Media; 1st Ed. [ISBN-10: 9780596001629, ISBN-13:978-0596001629, (Jan. 1, 2004)], which is incorporated in its entiretyfor all purposes as if fully set forth herein.

Web proxy servers are described in a book by Luotonen entitled: “WebProxy Servers” published by Prentice Hall; 1st Ed. [ISBN-10: 0136806120,ISBN-13: 978-0136806127, (Dec. 30, 1997)], which is incorporated in itsentirety for all purposes as if fully set forth herein. An overview ofproxies and reports their status is provided in a paper by Luotonen etal. entitled: “World-Wide Web proxies”, published Computer Networks andISDN Systems 27, 147-154 (Elsevier Science B.V.) (1994), which isincorporated in its entirety for all purposes as if fully set forthherein. A WWW proxy server, proxy for short, provides access to the Webfor people on closed subnets who can only access the Internet through afirewall machine. The hypertext server developed at CERN, cern_httpd, iscapable of running as a proxy, providing seamless external access toHTTP, Gopher, WAIS and FTP. ccm_httpd has had gateway features for along time, but only this spring they were extended to support all themethods in the HTTP protocol used by WWW clients. Clients do not loseany functionality by going through a proxy, except special processingthey may have done for non-native Web protocols such as Gopher and FTP.A brand new feature is caching performed by the proxy, resulting inshorter response times after the first document fetch. This makesproxies useful even to the people who do have full Internet access anddo not really need the proxy just to get out of their local subnet.

An example of an open proxies is ProxyList.net, a web site thatmaintained a list of links to open proxies, as described inProxyList.net and as captured by the Wayback Machine (web.archive.org),on Jul. 17, 2011, which is incorporated in its entirety for all purposesas if fully set forth herein. VIP72 is a website that sells itsregistered users access to anonymizing proxies, that is described in aprintout that comprises a numbered sequence the representingapproximately second-by-second screen dumps of the video of VIP72YouTube web page bearing a publication date of Sep. 22, 2011, athttps://www.youtube.com/watch?v=L0Hct2kSnn4, retrieved Nov. 21, 2019,and further described in VIP72 Scene Images extracted fromVIp72.com/nvpnnet, MPEG-4 video recording of “nVPN.net|Double yourSafety and use Socks5 +nVpn”, accessed fromhttps://www.youtube.com/watch?v=L0Hct2kSnn4, published Sep. 11, 2011, aswell as VIP72.com home page as of 2013 from Wayback Machine, which areall incorporated in their entirety for all purposes as if fully setforth herein.

A proxy server in a cloud-based proxy service is described in U.S.Patent Application Publication No. 2013/0080575 to Prince et al.entitled: “Distributing, transmission of requests across multiple ipaddresses of a proxy server in a cloud-based proxy service”, which isincorporated in its entirety for all purposes as if fully set forthherein. A first packet is received at a proxy server from a client andincludes a first incoming request for an action to be performed on anidentified resource. The first packet is received at the proxy server asa result of a DNS request for a domain corresponding to the identifiedresource resolving to an IP address of the proxy server. The proxyserver selects, based on at least in part on a set of parametersassociated with the first packet, one of multiple IP addresses for useas a source address for a second packet that carries an outgoing requestand transmits the second packet. The proxy server receives a thirdpacket that includes an incoming response from the destination originserver in response to the outgoing request and transmits a fourth packetto the client that includes an outgoing response lased on the incomingresponse.

Distributing transmission of requests across multiple IP addresses of aproxy server is described in U.S. Patent Application Publication No.2013/0080575 to Prince et al. entitled: “Distributing transmission ofrequests across multiple ip addresses of a proxy server in a cloud-basedproxy service”, which is incorporated in its entirety for all purposesas if fully set forth herein. A first packet is received at a proxyserver from a client and includes a first incoming request for an actionto be performed on an identified resource. The first packet is receivedat the proxy server as a result of a DNS request for a domaincorresponding to the identified resource resolving to an IP address ofthe proxy server. The proxy server selects, based on at least in part ona set of parameters associated with the first packet, one of multiple IPaddresses for use as a source IP address for a second packet thatcarries an outgoing request and transmits the second packet. The proxyserver receives a third packet that includes an incoming response fromthe destination origin server in response to the outgoing request andtransmits a fourth packet to the client that includes an outgoingresponse based on the incoming response.

Data Center (DC) Proxy server. While the arrangement 50 b shown in FIG.5 b provides some level of anonymity, such anonymity may be limited. Thedata server #1 22 a may identify that the IP address corresponding tothe received requests as part of the ‘Content Request’ 54 b from theproxy server 53 belong to a server or a proxy server, and may block thisIP address, obviating the access of the proxy server 53 to serve as anintermediate device for the client device #1 31 a. Further, particularlyif used frequently and by multiple client device, the data server #1 22a may detect the excessive load of requests from the proxy server 53,and may conclude that the IP address corresponding to the receivedrequests as part of the ‘Content Request’ 54 b from the proxy server 53does not identify a client device but rather an intermediate device, andmay then block this IP address, and will not respond to requests forcontent originating by this IP address.

An improved arrangement 50 c is shown in FIG. 5 c , using a Data Center(DC) proxy server 56. The DC proxy server 56 stores, or has access to, alist of IP addresses, such as the IP addresses list 58. The exemplary IPaddresses list 58 is exampled to include 6 IP addresses, shown as IP #158 a, IP #2 58 b, IP #3 58 c, IP #4 58 d, IP #5 58 e, and IP #6 58 f.While exampled regarding 6 IP addresses, any number of IP addresses maybe equally used. The IP addresses in the list 58 serves as IP addresses‘bank’, and upon receiving a request for a content (such as a URL) froma client device, the DC proxy server 56 selects one of the IP addresses(such as randomly or any other load balancing technique), and use theselected IP address for requesting the content from the web server.Since many IP addresses are used, the web server, such as the dataserver #1 22 a, cannot easily identify the requests origin to be asingle device, and the traffic seems to be originated from a legitimatepool of client devices.

For example, upon receiving the ‘Content Request’ message 54 a from theclient device #1 31 a by the DC proxy server 56, it responds byselecting an IP address from the list 58, such as the IP #3 58 c, andthen forwarding the request to the data server #1 22 a using the IP #358 c as the originating IP address source 16 d as part of the ‘ContentRequest’ message 54 b. In turn the data server #1 22 a replies and sendsthe content in the ‘Send Content’ message 54 c to the requesting DCproxy server 56, which in turn forward the fetched content to the askingclient device #1 31 a using the ‘Send Content’ message 54 d. Hence, theclient device #1 31 a received the requested content in response to thesent ‘Content Request’ message 54 a, however the data server #1 22 a isonly aware of the IP #3 58 c identity, and is not aware of the clientdevice #1 31 a identity (IP address).

In a case where the client device #1 31 a requests another content fromthe data server #1 22 a, it sends another ‘Content Request’ message 57 ato the DC proxy server 56. Upon receiving the ‘Content Request’ message57 a from the client device #1 31 a by the DC proxy server 56, itresponds by selecting another IP address from the list 58, such as theIP #6 58 f, and then forwarding the request to the data server #1 22 ausing the IP #6 58 f as the originating IP address source 16 d as partof another ‘Content Request’ message 57 b. In turn the data server #1 22a replies and sends the content in the ‘Send Content’ message 57 c tothe requesting DC proxy server 56, which in turn forward the fetchedcontent to the asking client device #1 31 a using another ‘Send Content’message 57 d. Hence, the client device #1 31 a received the additionalrequested content in response to the sent ‘Content Request’ message 57a, however the data server #1 22 a is only aware of the IP #6 58 fidentity, and is not aware of the client device #1 31 a identity (IPaddress). Further, the data server #1 22 a receives the requests fromtwo different IP addresses IP #3 58 c and IP #6 58 f, and is not awarethat both requests were sent from the same originating device.

Typically DC proxy servers are offered as a service by variouscorporations, and not by an ISP. When you visit a website, the webserver will detect the credentials of the DC proxy instead of youractual information. DC proxy server services are typically a cheap,fast, and stable way to provide anonymity, and preventing blocking by aweb server. Typical DC proxy server service provide high performance andbandwidth up 1000 MB/s speed, the proxy IP addresses used may be staticor dynamically changed, and have presence in multiple countriesworldwide. Using DC proxies are typically used to hide user realidentity or IP from the Internet. Comparison of performance of variouscommercially available DC proxy server services (referred to as VPNservices) is described a test report by of a test commissioned byAnchorFree and performed by AV-TEST GmbH (dated Jun. 15, 2018),entitled: “VPN Comparative Test”, which is incorporated in its entiretyfor all purposes as if fully set forth herein. The report presentsevaluation assesses AnchorFree's Hotspot Shield Elite, Avast SecureLine,Avira Phantom VPN Pro, Cisco VPN, ExpressVPN, F-Secure FREEDOME VPN,KeepSolid's VPN Unlimited, London Trust Media's Private Internet Access,NordVPN, Pulse VPN, Symantec's Norton WiFi Privacy and Tunnel Bear. Theevaluation was based on usability, privacy and security, performance,and functionality.

Random. Randomness is commonly implemented by using random numbers,defined as a sequence of numbers or symbols that lack any pattern andthus appear random, are often generated by a random number generator.Randomness for security is also described in IETF RFC 1750 “RandomnessRecommendations for Security” (December 1994), which is incorporated inits entirety for all purposes as if fully set forth herein. A randomnumber generator (having either analog or digital output) can behardware based, using a physical process such as thermal noise, shotnoise, nuclear decaying radiation, photoelectric effect or other quantumphenomena. Alternatively, or in addition, the generation of the randomnumbers can be software based, using a processor executing an algorithmfor generating pseudo-random numbers which approximates the propertiesof random numbers.

The term ‘random’ herein is intended to cover not only pure random,non-deterministically and non-predicted generated signals, but alsopseudo-random, deterministic signals such as the output of ashift-register arrangement provided with a feedback circuit as used togenerate pseudo-random binary signals or as scramblers, and chaoticsignals, and where a randomness factor may be used.

A digital random signal generator (known as random number generator)wherein numbers in binary form replaces the analog voltage value outputmay be used for any randomness. One approach to random number generationis based on using linear feedback shift registers. An example of randomnumber generators is disclosed in U.S. Pat. No. 7,124,157 to Ilkakeentitled: “Random Number Generator”, in U.S. Pat. No. 4,905,176 toSchulz entitled: “Random Number Generator Circuit”, in U.S. Pat. No.4,853,884 to Brown et al. entitled: “Random Number Generator withDigital Feedback” and in U.S. Pat. No. 7,145,933 to Szajnowski entitled:“Method and Apparatus for generating Random signals”, which areincorporated in its entirety for all purposes as if fully set forthherein.

A digital random signal generator may be based on ‘True Random NumberGeneration IC RPG100/RPG100B’ available from FDK Corporation anddescribed in the data sheet ‘Physical Random number generatorRPG100.RPG100B’ REV. 08 publication number HM-RAE106-0812, which isincorporated in its entirety for all purposes as if fully set forthherein. The digital random signal generator can be hardware based,generating random numbers from a natural physical process or phenomenon,such as the thermal noise of semiconductor which has no periodicity.Typically, such hardware random number generators are based onmicroscopic phenomena such as thermal noise, shot noise, nucleardecaying radiation, photoelectric effect or other quantum phenomena, andtypically contain a transducer to convert some aspect of the physicalphenomenon to an electrical signal, an amplifier and other electronic tobring the output into a signal that can be converted into a digitalrepresentation by an analog to digital converter. In the case wheredigitized serial random number signals are generated, the output isconverted to parallel, such as 8 bits data, with 256 values of randomnumbers (values from 0 to 255). Alternatively, a digital random signalgenerator may be software (or firmware) based, such as pseudo-randomnumber generators. Such generators include a processor for executingsoftware that includes an algorithm for generating numbers, whichapproximates the properties of random numbers. The random signalgenerator (either analog or digital) may output a signal having uniformdistribution, in which there is a substantially or purely equalprobability of a signal falling between two defined limits, having noappearance outside these limits. However, Gaussian and otherdistribution may be equally used.

Man-In-The-Middle (MITM) Attack. MITM attack is a type of unauthorizedaccess in which a node or other agent redirects, alter, or otherwiseintercepts communications between two other nodes within the computingenvironment. Such MITM attacks can go unnoticed for long periods of timewhich, in turn, allow the attackers to obtain sensitive and damaginginformation such as payment credentials and the like. Further, a MITMattack is a form of active wiretapping attack in which the attackerintercepts and selectively modifies communicated data to masquerade asone or more of the entities involved in a communication association.Typically in a man-in-the-middle attack (MITM), the attacker secretlyrelays and possibly alters the communications between two parties whobelieve that they are directly communicating with each other. Oneexample of a MITM attack is active eavesdropping, in which the attackermakes independent connections with the victims and relays messagesbetween them to make them believe they are talking directly to eachother over a private connection, when in fact the entire conversation iscontrolled by the attacker. The attacker must be able to intercept allrelevant messages passing between the two victims and inject new ones.

Internet censorship. Internet censorship is the control or suppressionof what can be accessed, published, or viewed on the Internet enacted byregulators, or on their own initiative. Individuals and organizationsmay engage in self-censorship for moral, religious, or business reasons,to conform to societal norms, due to intimidation, or out of fear oflegal or other consequences. The extent of Internet censorship varies ona country-to-country basis. While most democratic countries havemoderate Internet censorship, other countries go as far as to limit theaccess of information such as news and suppress discussion amongcitizens. Internet censorship also occurs in response to or inanticipation of events such as elections, protests, and riots. Anexample is the increased censorship due to the events of the ArabSpring. Other types of censorship include the use of copyrights,defamation, harassment, and obscene material claims as a way to suppresscontent.

Blocking and filtering can be based on relatively static blacklists orbe determined more dynamically based on a real-time examination of theinformation being exchanged. Blacklists may be produced manually orautomatically and are often not available to non-customers of theblocking software. Blocking or filtering can be done at a centralizednational level, at a decentralized sub-national level, or at aninstitutional level, for example in libraries, universities or Internetcafes. Blocking and filtering may also vary within a country acrossdifferent ISPs. Countries may filter sensitive content on an ongoingbasis and/or introduce temporary filtering during key time periods suchas elections. In some cases the censoring authorities maysurreptitiously block content to mislead the public into believing thatcensorship has not been applied. This is achieved by returning a fake“Not Found” error message when an attempt is made to access a blockedwebsite.

Internet Protocol (IP) address blocking: Access to a certain IP addressis denied. If the target Web site is hosted in a shared hosting server,all websites on the same server will be blocked. This affects IP-basedprotocols such as HTTP, FTP and POP. A typical circumvention method isto find proxies that have access to the target websites, but proxies maybe jammed or blocked, and some Web sites, such as Wikipedia (whenediting), also block proxies. Some large websites such as Google haveallocated additional IP addresses to circumvent the block, but later theblock was extended to cover the new addresses. Due to challenges withgeolocation, geo-blocking is normally implemented via IP addressblocking.

Domain name system (DNS) filtering and redirection: Blocked domain namesare not resolved, or an incorrect IP address is returned via DNShijacking or other means. This affects all IP-based protocols such asHTTP, FTP and POP. A typical circumvention method is to find analternative DNS resolver that resolves domain names correctly, butdomain name servers are subject to blockage as well, especially IPaddress blocking. Another workaround is to bypass DNS if the IP addressis obtainable from other sources and is not itself blocked. Examples aremodifying the Hosts file or typing the IP address instead of the domainname as part of a URL given to a Web browser.

Uniform Resource Locator (URL) filtering: URL strings are scanned fortarget keywords regardless of the domain name specified in the URL. Thisaffects the HTTP protocol. Typical circumvention methods are to useescaped characters in the URL, or to use encrypted protocols such as VPNand TLS/SSL.

Packet filtering: Terminate TCP packet transmissions when a certainnumber of controversial keywords are detected. This affects allTCP-based protocols such as HTTP, FTP and POP, but Search engine resultspages are more likely to be censored. Typical circumvention methods areto use encrypted connections—such as VPN and TLS/SSL—to escape the HTMLcontent, or by reducing the TCP/IP stack's MTU/MSS to reduce the amountof text contained in a given packet.

Connection reset: If a previous TCP connection is blocked by the filter,future connection attempts from both sides can also be blocked for somevariable amount of time. Depending on the location of the block, otherusers or websites may also be blocked, if the communication is routedthrough the blocking location. A circumvention method is to ignore thereset packet sent by the firewall.

Network disconnection: A technically simpler method of Internetcensorship is to completely cut off all routers, either by software orby hardware (turning off machines, pulling out cables). A circumventionmethod could be to use a satellite ISP to access Internet.

Portal censorship and search result removal: Major portals, includingsearch engines, may exclude web sites that they would ordinarilyinclude. This renders a site invisible to people who do not know whereto find it. When a major portal does this, it has a similar effect ascensorship. Sometimes this exclusion is done to satisfy a legal or otherrequirement, other times it is purely at the discretion of the portal.For example, Google.de and Google.fr remove Neo-Nazi and other listingsin compliance with German and French law.

Computer network attacks: Denial-of-service attacks and attacks thatdeface opposition websites can produce the same result as other blockingtechniques, preventing or limiting access to certain websites or otheronline services, although only for a limited period of time. Thistechnique might be used during the lead up to an election or some othersensitive period. It is more frequently used by non-state actors seekingto disrupt services.

Geoblocking. Geoblocking is a method of preventing users in a particularcountry from accessing content (because of licensing or otherrequirements). If the user attempting to access the content provides anIPv6 address the network may attempt to obtain an IPv4 address from theIPv6 address and associate a geolocation with the user to accuratelyapply geoblocking. Other examples include using the attribute of theIPv4 address from the IPv6 address to select a default language for auser, assist in locating a user for law enforcement or emergencyresponse purposes, and the like. Geo-blocking or geoblocking istechnology that restricts access to Internet content based upon theuser's geographical location. In a geo-blocking scheme, the user'slocation is determined using geolocation techniques, such as checkingthe user's IP address against a blacklist or whitelist, accounts, andmeasuring the end-to-end delay of a network connection to estimate thephysical location of the user. The result of this check is used todetermine whether the system will approve or deny access to the websiteor to particular content. The geolocation may also be used to modify thecontent provided, for example, the currency in which goods are quoted,the price or the range of goods that are available, besides otheraspects.

Tunneling. Computer networks may use a tunneling protocol where onenetwork protocol (the delivery protocol) encapsulates a differentpayload protocol. Tunneling enables the encapsulation of a packet fromone type of protocol within the datagram of a different protocol. Forexample, VPN uses PPTP to encapsulate IP packets over a public network,such as the Internet. A VPN solution based on Point-to-Point TunnelingProtocol (PPTP), Layer Two Tunneling Protocol (L2TP), or Secure SocketTunneling Protocol (SSTP) can be configured. By using tunneling apayload may be carried over an incompatible delivery-network, or providea secure path through an untrusted network. Typically, the deliveryprotocol operates at an equal or higher OSI layer than does the payloadprotocol. In one example of a network layer over a network layer,Generic Routing Encapsulation (GRE), a protocol running over IP (IPProtocol Number 47), often serves to carry IP packets, with RFC 1918private addresses, over the Internet using delivery packets with publicIP addresses. In this case, the delivery and payload protocols arecompatible, but the payload addresses are incompatible with those of thedelivery network. In contrast, an IP payload might believe it sees adata link layer delivery when it is carried inside the Layer 2 TunnelingProtocol (L2TP), which appears to the payload mechanism as a protocol ofthe data link layer. L2TP, however, actually runs over the transportlayer using User Datagram Protocol (UDP) over IP. The IP in the deliveryprotocol could run over any data-link protocol from IEEE 802.2 over IEEE802.3 (i.e., standards-based Ethernet) to the Point-to-Point Protocol(PPP) over a dialup modem link.

Tunneling protocols may use data encryption to transport insecurepayload protocols over a public network (such as the Internet), therebyproviding VPN functionality. IPsec has an end-to-end Transport Mode, butcan also operate in a tunneling mode through a trusted security gateway.HTTP tunneling is a technique by which communications performed usingvarious network protocols are encapsulated using the HTTP protocol, thenetwork protocols in question usually belonging to the TCP/IP family ofprotocols. The HTTP protocol therefore acts as a wrapper for a channelthat the network protocol being tunneled uses to communicate. An HTTPstream with its covert channel is termed an HTTP tunnel. HTTP tunnelsoftware consists of client-server HTTP tunneling applications thatintegrate with existing application software, permitting them to be usedin conditions of restricted network connectivity including firewallednetworks, networks behind proxy servers, and network addresstranslation.

Virtual Private Networks (VPNs) are point-to-point connections across aprivate or public network, such as the Internet. A VPN client typicallyuses special TCP/IP-based protocols, called tunneling protocols, to makea virtual call to a virtual port on a VPN server. In a typical VPNdeployment, a client initiates a virtual point-to-point connection to aremote access server over the Internet, then the remote access serveranswers the call, authenticates the caller, and transfers data betweenthe VPN client and the organization's private network. To emulate apoint-to-point link, data is encapsulated, or wrapped, with a header.The header provides routing information that enables the data totraverse the shared or public network to reach its endpoint. To emulatea private link, the data being sent is encrypted for confidentiality.Packets that are intercepted on the shared or public network areindecipherable without the encryption keys. The link in which theprivate data is encapsulated and encrypted is known as a VPN connection.Commonly two types of VPN connections are used, referred to as RemoteAccess VPN and Site-to-Site VPN. Popular VPN connections use PPTP,L2TP/IPsec, or SSTP protocols. The RFC 4026 provides ‘ProviderProvisioned Virtual Private Network (VPN) Terminology’, and RFC 2547provides a VPN method based on MPLS (Multiprotocol Label Switching) andBGP (Border Gateway Protocol).

Remote access VPN connections enable users working at home or on theroad to access a server on a private network using the infrastructureprovided by a public network, such as the Internet. From the user'sperspective, the VPN is a point-to-point connection between the computer(the VPN client) and an organization's server. The exact infrastructureof the shared or public network is irrelevant because it appearslogically as if the data is sent over a dedicated private link.

Site-to-site VPN connections (also known as router-to-router VPNconnections) enable organizations to have routed connections betweenseparate offices or with other organizations over a public network whilehelping to maintain secure communications. A routed VPN connectionacross the Internet logically operates as a dedicated wide area network(WAN) link. When networks are connected over the Internet, a routerforwards packets to another router across a VPN connection. To therouters, the VPN connection operates as a data-link layer link. Asite-to-site VPN connection connects two portions of a private network.The VPN server provides a routed connection to the network to which theVPN server is attached. The calling router (the VPN client)authenticates itself to the answering router (the VPN server), and, formutual authentication, the answering router authenticates itself to thecalling router. In the site-to site VPN connection, the packets sentfrom either router across the VPN connection typically do not originateat the routers.

There is a growing widespread use of the Internet for carryingmultimedia, such as a video and audio. Various audio services includeInternet-radio stations and VoIP (Voice-over-IP). Video services overthe Internet include video conferencing and IPTV (IP Television). Inmost cases, the multimedia service is a real-time (or near real-time)application, and thus sensitive to delays over the Internet. Inparticular, two-way services such a VoIP or other telephony services andvideo-conferencing are delay sensitive. In some cases, the delaysinduced by the encryption process, as well as the hardware/softwarecosts associated with the encryption, render encryption asnon-practical. Therefore, it is not easy to secure enough capacity ofthe Internet accessible by users to endure real-time communicationapplications such as Internet games, chatting, VoIP, and MoIP(Multimedia-over-IP), so there may be a data loss, delay or severejitter in the course of communication due to the property of an Internetprotocol, thereby causing inappropriate real-time video communication.The following chapters of the publication number 1-587005-001-3 by CiscoSystems, Inc. (July 1999), entitled: “Internetworking TechnologiesHandbook”, relate to multimedia carried over the Internet, and are allincorporated in their entirety for all purposes as if fully set forthherein: Chapter 18: “Multiservice Access Technologies” (pages 18-1 to18-10), and Chapter 19: “Voice/Data Integration Technologies” (pages19-1 to 19-30).

VoIP systems in widespread use today fall into three groups: systemsusing the ITU-T H.323 protocol, systems using the SIP protocol, andsystems that use proprietary protocols. H.323 is a standard forteleconferencing that was developed by the InternationalTelecommunications Union (ITU). It supports full multimedia, audio,video and data transmission between groups of two or more participants,and it is designed to support large networks. H.323 isnetwork-independent: it can be used over networks using transportprotocols other than TCP/IP. H.323 is still a very important protocol,but it has fallen out of use for consumer VoIP products due to the factthat it is difficult to make it work through firewalls that are designedto protect computers running many different applications. It is a systembest suited to large organizations that possess the technical skills toovercome these problems.

Session Initiation Protocol (SIP) is an Internet Engineering Task Force(IETF) standard signaling protocol for teleconferencing, telephony,presence and event notification and instant messaging. It provides amechanism for setting up and managing connections, but not fortransporting the audio or video data. It is probably now the most widelyused protocol for managing Internet telephony. Similar to the IETFprotocols, SIP is defined in a number of RFCs, principally RFC 3261. ASIP-based VoIP implementation may send the encoded voice data over thenetwork in a number of ways. Most implementations use a Real-timeTransport Protocol (RTP), which is defined in RFC 3550. Both SIP and RTPare implemented on UDP, which, as a connectionless protocol, can causedifficulties with certain types of routers and firewalls. Usable SIPphones therefore also need to use Simple Traversal of UDP over NAT(STUN), a protocol defined in RFC 3489 that allows a client behind a NATrouter to find out its external IP address and the type of NAT device.

FIG. 2 shows arrangement 20 of devices communicating over the Internet.Various devices such as a client #1 24 a, a client #2 24 b, a client #324 c, a client #4 24 d, and a client #5 24 e, may communicate over theInternet 113 for obtaining data from a data server #1 22 a and a dataserver #2 22 b. It is noted that the terms ‘Data Server’ and ‘Webserver’ are used herein interchangeably. In one example, the servers areHTTP servers, sometimes known as web servers. A method describing a moreefficient communication over the Internet is described in U.S. Pat. No.8,560,604 to Shribman et al., entitled: “System and Method for ProvidingFaster and More Efficient Data Communication” (hereinafter the “‘604patent’”), which is incorporated in its entirety for all purposes as iffully set forth herein. The method described in the '604 patent uses anacceleration server 23 for managing the traffic in the network, as shownin FIG. 2 . A splitting of a message or a content into slices, andtransferring each of the slices over a distinct data path is describedin U.S. Patent Application No. 2012/0166582 to Binder entitled: “Systemand Method for Routing-Based Internet Security”, which is incorporatedin its entirety for all purposes as if fully set forth herein.

The amount of data transferred in a given period in commonly referred toas ‘bandwidth’ (BW) or ‘bit-rate’, which is the number of bits that areconveyed or processed per unit of time. The bit rate is quantified usingthe bits per second unit (symbol bit/s or b/s), often in conjunctionwith an SI prefix such as kilo- (1 Kbit/s=1000 bit/s), mega- (1Mbit/s=1000 Kbit/s), giga- (1 Gbit/s=1000 Mbit/s) or tera- (1Tbit/s=1000 Gbit/s). The non-standard abbreviation bps is often used toreplace the standard symbol bit/s, so that, for example, “1 Mbps” (or 1Mb/s) is used to mean one million bits per second. One byte per second(1 B/s) corresponds to 8 bit/s.

Latency is typically defined as a time interval between the stimulationand the response, or, from a more general point of view, as a time delaybetween the cause and the effect of some physical change in the systembeing observed. Network-related latency, such as in a packet-switchednetwork, is measured either one-way (the time from the source sending apacket to the destination receiving it), or Round-Trip delay Time (RTT),referring to the one-way latency from source to destination plus theone-way latency from the destination back to the source, plus any delaysat the destination, such as processing or other delays. Round-triplatency can be measured from a single point. Latency limits totalbandwidth in reliable two-way communication systems as described by thebandwidth-delay product, which refers to the product of a data link'scapacity (in bits per second) and its end-to-end delay (in seconds). Theresult, an amount of data measured in bits (or bytes), is equivalent tothe maximum amount of data on the network circuit at any given time,i.e., data that has been transmitted but not yet acknowledged. Sometimesit is calculated as the data link's capacity multiplied by its roundtrip time. A network with a large bandwidth-delay product is commonlyknown as a Long Fat Network (LFN). As defined in IETF RFC 1072, anetwork is considered an LFN if its bandwidth-delay product issignificantly larger than 105 bits (12500 bytes).

The Round-trip Delay Time (RTD) or Round-Trip Time (RTT) is the lengthof time it takes for a signal to be sent and to be received andprocessed at the destination node, plus the length of time it takes foran acknowledgment of that signal to be received. This time delaytherefore includes the propagation times between the two points of asignal. The signal is generally a data packet, and the RTT is also knownas the ping time, and an internet user can determine the RTT by usingthe ping command. Network links with both a high bandwidth and a highRTT can have a very large amount of data (the bandwidth-delay product)“in flight” at any given time. Such “long fat pipes” require a specialprotocol design. One example is the TCP window scale option. The RTT wasoriginally estimated in TCP by:RTT=(α·Old_RTT)+((1−α)·New_Round_Trip_Sample), where α is a constantweighting factor (0≤α<1). Choosing a value a close to 1 makes theweighted average immune to changes that last a short time (e.g., asingle segment that encounters long delay). Choosing a value for α closeto 0 makes the weighted average response to changes in delay veryquickly. Once a new RTT is calculated, it is entered into the aboveequation to obtain an average RTT for that connection, and the procedurecontinues for every new calculation. The RTT may be measured asdescribed in IETF 1323, and may be estimated by using a method describedin IETF RFC 6323, which are both incorporated in their entirety for allpurposes as if fully set forth herein.

An estimation of RTT for messages using TCP may use Karn's Algorithm,described by Karn, Phil and Craig Partridge in ACM SIGCOMM '87—ComputerCommunication Review publication, entitled: “Improving Round-Trip TimeEstimates in Reliable Transport Protocols”, which is incorporated in itsentirety for all purposes as if fully set forth herein. The round triptime is estimated as the difference between the time that a segment wassent and the time that its acknowledgment was returned to the sender,but when packets are re-transmitted there is an ambiguity: theacknowledgment may be a response to the first transmission of thesegment or to a subsequent re-transmission. Karn's Algorithm ignoresre-transmitted segments when updating the round trip time estimate.Round trip time estimation is based only on unambiguous acknowledgments,which are acknowledgments for segments that were sent only once.

Many software platforms provide a service called ‘ping’ that can be usedto measure round-trip latency. Ping performs no packet processing; itmerely sends a response back when it receives a packet (i.e., performs ano-op), thus it is a first rough way of measuring latency. Ping operatesby sending Internet Control Message Protocol (ICMP) echo requestingpackets to the target host, and waiting for an ICMP response. Duringthis process it measures the time from transmission to reception(round-trip time) and records any packet loss. The results of the testare printed in a form of a statistical summary of the response packetsreceived, including the minimum, maximum, and the mean round-trip times,and sometimes the standard deviation of the mean.

The Transmission Control Protocol/Internet Protocol (TCP/IP) suitenormally used on the Internet has included an Internet Message ControlProtocol (ICMP) that is commonly used in echo testing or ping and traceroute applications. In general, the Internet standard ‘ping’ or ‘ICMPecho’ has a request/response format, wherein one device sends an ICMPecho request and another device responds to a received ICMP echo requestwith a transmitted ICMP echo response. Normally, IP devices are expectedto implement the ICMP as part of the support for IP, to be able to useICMP for testing. Internet RFC 792, entitled “Internet Control MessageProtocol: DARPA Internet Program Protocol Specification”, which isincorporated in its entirety for all purposes as if fully set forthherein, at least partially describes the behavior of ICMP. The ICMP echomessage has a type field, a code field, a checksum field, an identifierfield, a sequence number field, and a data field. According to RFC 79:“The data received in the echo message must be returned in the echoreply message”. Thus, an RFC compliant ping responders or an ICMP echoreply message responders are supposed to copy the received data field inan echo request message directly into the data field of the transmittedecho response message.

A newer version of ICMP known as ICMP version 6 or ICMPv6 as describedat least partially in RFCs 1885 and 2463, which are both entitled“Internet Control Message Protocol (ICMPv6) for the Internet ProtocolVersion 6 (IPv6) Specification”, which are both incorporated in theirentirety for all purposes as if fully set forth herein. According to RFC2463, “Every [IPv6] node MUST implement an ICMPv6 Echo responderfunction that receives Echo Requests and sends corresponding EchoReplies. An IPv6 node SHOULD also implement an application-layerinterface for sending Echo Requests and receiving Echo Replies, fordiagnostic purposes.”. Thus, responding to ICMP echo requests normallyis a necessary function in supporting IPv4 and/or IPv6 standards. TheICMPv6 RFCs 1885 and 2464 goes on to specify that the data field of anICMP echo response contains the “data from the invoking Echo Requestmessage.” Therefore, both ICMP and ICMP v6 associated with IPv4 andIPv6, respectively, specify that the data field in an ICMP echo replymessage is to essentially contain a copy of the data received in thecorresponding ICMP echo request message.

Moreover, the ICMP echo protocol is basically a two-way echo in whichone initiating device and/or process starts the communication bytransmitting an echo request message, which may be then received by anecho responder process. The echo responder process, generally located onanother device, receives the echo request message and responds with anecho reply back to the initiating process. Once the initiating deviceand/or process receives the response or times out waiting on theresponse, the two-way echo exchange of messages is complete. Althoughthe echo request and echo response normally are performed betweenprocesses on two different devices, one skilled in the art will be awarethat a device can ping its own IP address implying that the echo requestand echo responder reply processes are on the same device. In addition,the loopback address of network 127.0.0.0 in IPv4 can be used to allow adevice to the loopback outbound echo request messages back into thedevice own incoming echo request responder processes. IPv6 has aloopback functionality as well.

This copying of data exactly in the ICMP echo response is somewhatwasteful because the responder generally does not convey that much (ifany) information back to the ICMP echo request initiating device.Arguably the initiating device could compute bit error rate (BER)statistics on the transmitted versus the received data field in ICMPecho packets. However, such physical layer issues as BER statisticsnormally are not as relevant for network layer IP datagrams that alreadyinclude various error control code mechanisms. Arguably the devicerunning the responding process can communicate information to the devicerunning the initiating process by having the device running the originalresponding process initiate its own echo request and wait for an echoresponse from the original initiating device. Such a solution results infour packets, with a first echo request from a local device responded toby a first echo response from a remote device, and with a second echorequest from the remote device responded to by a second echo responsefrom the local device.

An identifier and/or sequence number in ping packets generally hasallowed the ping to be used by a device to determine the round-tripdelay from the time an ICMP echo request packet is sent to the timecorresponding to when an associated received ICMP echo request isreceived back at an initiating device. Furthermore, ping packetsgenerally convey little or no information about the type of the devicethat initiated the ping. Moreover, although IPv4 has Type of Service(ToS) fields in the IP datagram, these fields have become more importantas the services used over the Internet and networks using Internettechnology have grown from basic computer data communication to alsoinclude real-time applications such as voice and/or video. Various Typeof Service (ToS) in IPv4 and IPv6 have been used in implementing various(Quality of Service) QoS characteristics that are defined for differentclasses of service and/or Service Level Agreements (SLAs).

SDK. As used herein, the term Software Development Kit (SDK) refers to aspecific software package, software framework, hardware platform, or aset of development tools and the like at the time of establishment ofthe operating system software. Typically, an SDK includes a programmingpackage that enables a programmer to develop applications for a specificplatform, and may include one or more APIs, programming tools, anddocumentation. It may be as simple as the implementation of one or moreapplication programming interfaces (APIs) in the form of some librariesto interface to a particular programming language or to includesophisticated hardware that can communicate with a particular embeddedsystem. Common tools include debugging facilities and other utilities,often presented in an integrated development environment (IDE). SDKsalso frequently include sample code and supporting technical notes orother supporting documentation to help clarify points made by theprimary reference material. SDKs may have attached licenses that makethem unsuitable for building software intended to be developed under anincompatible license. For example, a proprietary SDK will probably beincompatible with free software development, while a GPL-licensed SDKcould be incompatible with proprietary software development. LGPL SDKsare typically safe for proprietary development.

A software engineer typically receives the SDK from the target systemdeveloper. Often the SDK can be downloaded directly via the Internet orvia SDKs marketplaces. Many SDKs are provided for free to encouragedevelopers to use the system or language. Sometimes this is used as amarketing tool. Freely offered SDKs may still be able to monetize, basedon user data taken from the apps, which may serve the interests of bigplayers in the ecosystem, for example the operating system. A SDK for anoperating system add-on (for instance, QuickTime for classic Mac OS) mayinclude the add-on software itself to be used for development purposes,albeit not necessarily for redistribution together with the developedproduct.

Heartbeat. A heartbeat is a periodic signal generated by hardware orsoftware to indicate normal operation or to synchronize other parts of asystem. Usually a heartbeat is sent between machines at a regularinterval of an order of seconds. If a heartbeat is not received for atime—usually a few heartbeat intervals—the machine that should have sentthe heartbeat is assumed to have failed. As used herein, a heartbeat isa periodic message, such as a ‘ping’, generated by devices connected tothe Internet to indicate being ‘online’ (connected to the Internet) andnormal operation, and if a heartbeat is not received for a time, thedevice is assumed to be ‘offline’ (not connected to the Internet). Aheartbeat protocol is generally used to negotiate and monitor theavailability of a resource, such as a floating IP address. Typically,when a heartbeat starts on a machine, it will perform an electionprocess with other machines on the network to determine which machine,if any, owns the resource. The IETF RFC 6520 describes Heartbeatoperation for the Transport Layer Security (TLS), and is incorporated inits entirety for all purposes as if fully set forth herein.

Users in the Internet may desire anonymity in order not to be identifiedas a publisher (sender), or reader (receiver), of information. Commonreasons include censorship at the local, organizational, or nationallevel, personal privacy preferences such as preventing tracking or datamining activities, the material or its distribution is consideredillegal or incriminating by possible eavesdroppers, the material may belegal but socially deplored, embarrassing, or problematic in theindividual's social world, and fear of retribution (againstwhistleblowers, unofficial leaks, and activists who do not believe inrestrictions on information nor knowledge). Full anonymity on theInternet, however, is not guaranteed since IP addresses can be tracked,allowing to identify the computer from which a certain post was made,albeit not the actual user. Anonymizing services, such as I2P—‘TheAnonymous Network’ or Tor, address the issue of IP tracking, as theirdistributed technology approach may grant a higher degree of securitythan centralized anonymizing services where a central point exists thatcould disclose one's identity. An anonymous web browsing refers tobrowsing the World Wide Web while hiding the user's IP address and anyother personally identifiable information from the websites that one isvisiting. There are many ways of accomplishing anonymous web browsing.Anonymous web browsing is generally useful to internet users who want toensure that their sessions cannot be monitored. For instance, it is usedto circumvent traffic monitoring by organizations that want to find outor control which web sites employees visit. Further, since someweb-sites response differently when approached from mobile devices,anonymity may allow for accessing such a web-site from a non-mobiledevice, posing as a mobile device.

WiFi. A device herein (such as the computer system 11) may consist of,be part of, or include, a Personal Computer (PC), a desktop computer, amobile computer, a laptop computer, a notebook computer, a tabletcomputer, a server computer, a handheld computer, a handheld device, aPersonal Digital Assistant (PDA) device, or a cellular handset.Alternatively or in addition, a device may consist of, be part of, orinclude, a handheld PDA device, an on-board device, an off-board device,a hybrid device, a vehicular device, a non-vehicular device, a mobiledevice, or a portable device. A network herein (such as the LAN 14), mayconsist of, be part of, or include, a wired or wireless network, a LocalArea Network (LAN), a Wireless LAN (WLAN), a Metropolitan Area Network(MAN), a Wireless MAN (WMAN), a Wide Area Network (WAN), a Wireless WAN(WWAN), a Personal Area Network (PAN), or a Wireless PAN (WPAN).Alternatively or in addition, a network herein may be operatingsubstantially in accordance with existing IEEE 802.11, 802.11a, 802.11b,802.11g, 802.11k, 802.11n, 802.11r, 802.16, 802.16d, 802.16e, 802.20,802.21 standards and/or future versions and/or derivatives of the abovestandards. Further, a network element (or a device) herein may consistof, be part of, or include, a cellular radio-telephone communicationsystem, a cellular telephone, a wireless telephone, a PersonalCommunication Systems (PCS) device, a PDA device which incorporates awireless communication device, or a mobile/portable Global PositioningSystem (GPS) device. The communication interface 29 may consist of, bepart of, or include, a transceiver or modem for communication with thenetwork, such as LAN 14. In the case of wired networks, thecommunication interface 29 connects to the network via a port 28 thatmay include a connector, and in the case of wireless network, thecommunication interface 29 connects to the network via the port 28 thatmay include an antenna.

The LAN 14 may be a Wireless LAN (WLAN) such as according to, or baseon, IEEE 802.11-2012, and the WLAN port may be a WLAN antenna and theWLAN transceiver may be a WLAN modem. The WLAN may be according to, orbase on, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE802.11ac. Commonly referred to as Wireless Local Area Network (WLAN),such communication makes use of the Industrial, Scientific and Medical(ISM) frequency spectrum. In the US, three of the bands within the ISMspectrum are the A-Band, 902-928 MHz; the B-Band, 2.4-2.484 GHz (a.k.a.2.4 GHz); and the C-Band, 5.725-5.875 GHz (a.k.a. 5 GHz). Overlappingand/or similar bands are used in different regions such as Europe andJapan. In order to allow interoperability between equipment manufacturedby different vendors, few WLAN standards have evolved, as part of theIEEE 802.11 standard group, branded as WiFi (www.wi-fi.org). The IEEE802.11b standard describes a communication using the 2.4 GHz frequencyband and supporting a communication rate of 11 Mb/s, IEEE 802.11a usesthe 5 GHz frequency band to carry 54 MB/s, and IEEE 802.11g uses the 2.4GHz band to support 54 Mb/s. The WiFi technology is further described ina publication entitled: “WiFi Technology” by Telecom RegulatoryAuthority, published on July 2003, which is incorporated in its entiretyfor all purposes as if fully set forth herein. The IEEE 802 defines anad-hoc connection between two or more devices without using a wirelessaccess point: the devices communicate directly when in range. An ad hocnetwork offers peer-to-peer layout and is commonly used in situationssuch as a quick data exchange or a multiplayer LAN game, because thesetup is easy and an access point is not required.

Image/video. Any content herein may consist of, be part of, or include,an image or a video content. A video content may be in a digital videoformat that may be based on one out of: TIFF (Tagged Image File Format),RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format),ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif(Exchangeable Image File Format), and DPOF (Digital Print Order Format)standards. A intraframe or interframe compression may be used, and thecompression may a lossy or a non-lossy (lossless) compression, that maybe based on a standard compression algorithm, which may be one or moreout of JPEG (Joint Photographic Experts Group) and MPEG (Moving PictureExperts Group), ITU-T H.261, ITU-T H.263, ITU-T H.264 and ITU-T CCIR601.

DHCP. The Dynamic Host Configuration Protocol (DHCP) is a standardizednetworking protocol used on Internet Protocol (IP) networks fordynamically distributing network configuration parameters, such as IPaddresses for interfaces and services. With DHCP, network elementsrequest IP addresses and networking parameters automatically from a DHCPserver, reducing the need for a network administrator or a user toconfigure these settings manually.

DHCP is typically used by network elements for requesting InternetProtocol parameters, such as an IP address from a network server, and isbased on the client-server model. When a network element connects to anetwork, its DHCP client software in the operating system sends abroadcast query requesting necessary information. Any DHCP server on thenetwork may service the request. The DHCP server manages a pool of IPaddresses and information about client configuration parameters such asdefault gateway, domain name, the name servers, and time servers. Onreceiving a request, the server may respond with specific informationfor each client, as previously configured by an administrator, or with aspecific address and any other information valid for the entire network,and the time period for which the allocation (lease) is valid. A hosttypically queries for this information immediately after booting, andperiodically thereafter before the expiration of the information. Whenan assignment is refreshed by the client computer, it initially requeststhe same parameter values, and may be assigned a new address from theserver, based on the assignment policies set by administrators.

Depending on implementation, the DHCP server may have three methods ofallocating IP-addresses: (a) Dynamic allocation, where a networkadministrator reserves a range of IP addresses for DHCP, and each clientcomputer on the LAN is configured to request an IP address from the DHCPserver during network initialization. The request-and-grant process usesa lease concept with a controllable time period, allowing the DHCPserver to reclaim (and then reallocate) IP addresses that are notrenewed. (b) Automatic allocation, where the DHCP server permanentlyassigns an IP address to a requesting client from the range defined bythe administrator. This is similar to dynamic allocation, but the DHCPserver keeps a table of past IP address assignments, so that it canpreferentially assign to a client the same IP address that the clientpreviously had. (c) Static allocation, where the DHCP server allocatesan IP address based on a preconfigured mapping to each client's MACaddress.

DHCP used for Internet Protocol version 4 (IPv4) is described in IETFRFC 2131, entitled “Dynamic Host Configuration Protocol”, and DHCP forIPv6 is described IETF RFC 3315, entitled: “Dynamic Host ConfigurationProtocol for IPv6 (DHCPv6)”, both incorporated in their entirety for allpurposes as if fully set forth herein. While both versions serve thesame purpose, the details of the protocol for IPv4 and IPv6 aresufficiently different that they may be considered separate protocols.For IPv6 operation, devices may alternatively use stateless addressauto-configuration. IPv4 hosts may also use link-local addressing toachieve operation restricted to the local network link.

The DHCP protocol employs a connectionless service model, using the UserDatagram Protocol (UDP). It is implemented with two UDP port numbers forits operations, which are the same as for the BOOTP protocol. The UDPport number 67 is the destination port of a server, and the UDP portnumber 68 is used by the client. DHCP operations fall into four phases:Server discovery, IP lease offer, IP request, and IP leaseacknowledgment. These stages are often abbreviated as DORA fordiscovery, offer, request, and acknowledgment. The DHCP protocoloperation begins with clients broadcasting a request. If the client andserver are on different subnets, a DHCP Helper or DHCP Relay Agent maybe used. Clients requesting renewal of an existing lease may communicatedirectly via an UDP unicast, since the client already has an establishedIP address at that point.

Gateway. The term ‘gateway’ is used herein to include, but not limitedto, a network element (or node) that is equipped for interfacing betweennetworks that uses different protocols. A gateway typically containscomponents such as protocol translators, impedance matching devices,rate converters, fault isolators, or signal translators, as necessary toprovide networking interoperability. A gateway may be a router or aproxy server that routes between networks, and may operate at anynetwork layer. In a network for an enterprise, a computer server actingas a gateway node is often also acting as a proxy server and a firewallserver. A gateway is often associated with both a router, which knowswhere to direct a given packet of data that arrives at the gateway, anda switch, which furnishes the actual path in and out of the gateway fora given packet.

A subnet mask is a mask used to determine what subnet belongs to an IPaddress. An IP address has two components, the network address and thehost address. For example, consider the IP address 150.215.017.009.Assuming this is part of a Class B network, the first two numbers(150.215) represent the Class B network address, and the second twonumbers (017.009) identify a particular host on this network. Asubnetting enables the network administrator to further divide the hostpart of the address into two or more subnets. In this case, a part ofthe host address is reserved to identify the particular subnet. On an IPnetwork, clients should automatically send IP packets with a destinationoutside a given subnet mask to a network gateway. A subnet mask definesthe IP range of a private network. For example, if a private network hasa base IP address of 192.168.0.0 and has a subnet mask of 255.255.255.0,then any data going to an IP address outside of 192.168.0.X will be sentto that network gateway. While forwarding an IP packet to anothernetwork, the gateway might or might not perform Network AddressTranslation (NAT).

Domain Name System (DNS) is a hierarchical distributed naming system forcomputers, services, or any resource connected to the Internet or aprivate network. It associates various information with domain namesassigned to each of the participating entities, and translates easilymemorized domain names to the numerical IP addresses needed for thepurpose of locating computer services and devices worldwide. The DNS isdescribed, for example, in the IETF RFC 3467 entitled: “Role of theDomain Name System (DNS)”, in the IETF RFC 6195 entitled: “Domain NameSystem (DNS) IANA Considerations”, and in the IETF RFC 1591 entitled:“Domain Name System Structure and Delegation”, which are incorporated intheir entirety for all purposes as if fully set forth herein.

VPN. Computer networks may use a tunneling protocol where one networkprotocol (the delivery protocol) encapsulates a different payloadprotocol. Tunneling enables the encapsulation of a packet from one typeof protocol within the datagram of a different protocol. For example,VPN uses PPTP to encapsulate IP packets over a public network, such asthe Internet. A VPN solution based on Point-to-Point Tunneling Protocol(PPTP), Layer Two Tunneling Protocol (L2TP), or Secure Socket TunnelingProtocol (SSTP) can be configured. By using tunneling a payload may becarried over an incompatible delivery-network, or provide a secure paththrough an untrusted network.

Typically, the delivery protocol operates at an equal or higher OSIlayer than does the payload protocol. In one example of a network layerover a network layer, Generic Routing Encapsulation (GRE), a protocolrunning over IP (IP Protocol Number 47), often serves to carry IPpackets, with RFC 1918 private addresses, over the Internet usingdelivery packets with public IP addresses. In this case, the deliveryand payload protocols are compatible, but the payload addresses areincompatible with those of the delivery network. In contrast, an IPpayload might believe it sees a data link layer delivery when it iscarried inside the Layer 2 Tunneling Protocol (L2TP), which appears tothe payload mechanism as a protocol of the data link layer. L2TP,however, actually runs over the transport layer using User DatagramProtocol (UDP) over IP. The IP in the delivery protocol could run overany data-link protocol from IEEE 802.2 over IEEE 802.3 (i.e.,standards-based Ethernet) to the Point-to-Point Protocol (PPP) over adialup modem link.

Tunneling protocols may use data encryption to transport insecurepayload protocols over a public network (such as the Internet), therebyproviding VPN functionality. IPsec has an end-to-end Transport Mode, butcan also operate in a tunneling mode through a trusted security gateway.HTTP tunneling is a technique by which communications performed usingvarious network protocols are encapsulated using the HTTP protocol, thenetwork protocols in question usually belonging to the TCP/IP family ofprotocols. The HTTP protocol therefore acts as a wrapper for a channelthat the network protocol being tunneled uses to communicate. The HTTPstream with its covert channel is termed an HTTP tunnel. HTTP tunnelsoftware consists of client-server HTTP tunneling applications thatintegrate with existing application software, permitting them to be usedin conditions of restricted network connectivity including firewallednetworks, networks behind proxy servers, and network addresstranslation.

Virtual Private Networks (VPNs) are point-to-point connections across aprivate or public network, such as the Internet. A VPN client typicallyuses special TCP/IP-based protocols, called tunneling protocols, to makea virtual call to a virtual port on a VPN server. In a typical VPNdeployment, a client initiates a virtual point-to-point connection to aremote access server over the Internet, and then the remote accessserver answers the call, authenticates the caller, and transfers databetween the VPN client and the organization's private network. Toemulate a point-to-point link, data is encapsulated, or wrapped, with aheader. The header provides routing information that enables the data totraverse the shared or public network to reach its endpoint. To emulatea private link, the data being sent is encrypted for confidentiality.Packets that are intercepted on the shared or public network areindecipherable without the encryption keys. The link in which theprivate data is encapsulated and encrypted is known as a VPN connection.

Commonly there are two types of VPN connections, referred to as RemoteAccess VPN and Site-to-Site VPN. Popular VPN connections use PPTP,L2TP/IPsec, or SSTP protocols. PPTP is described in IETF RFC 2637entitled: “Point-to-Point Tunneling Protocol (PPTP)”, L2TP is describedin IETF RFC 2661 entitled: “Layer Two Tunneling Protocol “L2TP””, whichare both incorporated in their entirety for all purposes as if fully setforth herein. VPN and VPN uses are described in Cisco Systems, Inc. 2001publication entitled: “IP Tunneling and VPNs”, and in Cisco Systems,Inc. 2001 handbook ‘Internetworking Technologies Handbook’ [No.1-58705-001-3] chapter 18 entitled: “Virtual Private Networks”, and inIBM Corporation Redbook series publications entitled: “A ComprehensiveGuide to Virtual Private Networks” including “Vol. I. IBM Firewall,Server and Client Solutions” [SG24-5201-00, June 1998], “Vol II. IBMNways Router Solutions” [SG24-5234-01, November 1999], and “Vol III.Cross-Platform Key and Policy Management” [SG24-5309-00, November 1999],which are all incorporated in their entirety for all purposes as iffully set forth herein.

VPN and its uses are further described in the IETF RFC 4026 entitled:“Provider Provisioned Virtual Private Network (VPN) Terminology” thatdescribes provider provisioned Virtual Private Network (VPN), in theIETF RFC 2764 entitled: “A Framework for IP Based Virtual PrivateNetworks” that describes a framework for Virtual Private Networks (VPNs)running across IP backbones, in the IETF RFC 3931 entitled: “Layer TwoTunneling Protocol—Version 3 (L2TPv3)”, and in the IETF RFC 2547entitled: “BGP/MPLS VPNs” that provides a VPN method based on MPLS(Multiprotocol Label Switching) and BGP (Border Gateway Protocol), whichare all incorporated in their entirety for all purposes as if fully setforth herein.

Remote access VPN connections enable users working at home or on theroad to access a server on a private network using the infrastructureprovided by a public network, such as the Internet. From the user'sperspective, the VPN is a point-to-point connection between the computer(the VPN client) and an organization's server. The exact infrastructureof the shared or public network is irrelevant because it appearslogically as if the data is sent over a dedicated private link.

Site-to-site VPN connections (also known as router-to-router VPNconnections) enable organizations to have routed connections betweenseparate offices, or with other organizations over a public networkwhile helping to maintain secure communications. A routed VPN connectionacross the Internet logically operates as a dedicated wide area network(WAN) link. When networks are connected over the Internet, a routerforwards packets to another router across a VPN connection. To therouters, the VPN connection operates as a data-link layer link. Asite-to-site VPN connection connects two portions of a private network.The VPN server provides a routed connection to the network to which theVPN server is attached. The calling router (the VPN client)authenticates itself to the answering router (the VPN server), and formutual authentication, the answering router authenticates itself to thecalling router. In the site-to site VPN connection, the packets sentfrom either router across the VPN connection typically do not originateat the routers.

Negotiating encryption keys may involve performing Internet Key Exchange(IKE or IKEv2) as part of establishing a session under the SecurityProtocol for the Internet (IPSec), as described in IETF RFC 2409entitled: “The Internet Key Exchange (IKE)”, and in RFC 4306 entitled:“Internet Key Exchange (IKEv2) Protocol”, which are both incorporated intheir entirety for all purposes as if fully set forth herein.Alternatively or in addition, negotiating encryption keys may involveperforming RSA Key Exchange or Diffie-Helman Key Exchange described inIETF RFC 2631 entitled: “Diffie-Hellman Key Agreement Method”, which isincorporated in its entirety for all purposes as if fully set forthherein, as part of establishing a session under the Secure Socket Layer(SSL) or Transport Layer Security (TLS) protocol.

Tunnel. As used herein, the term ‘tunnel’ includes an intermediaryprogram which is acting as a blind relay between two connections. Onceactive, a tunnel is not considered a party to the HTTP communication,though the tunnel may have been initiated by an HTTP request. The tunnelceases to exist when both ends of the relayed connections are closed.

Proxy. As used herein, the term ‘proxy’ includes an intermediary programwhich acts as both a server and a client for the purpose of makingrequests on behalf of other clients. Requests are serviced internally orby passing them on, with possible translation, to other servers. A proxyMUST implement both the client and server requirements of thisspecification. A “transparent proxy” is a proxy that does not modify therequest or response beyond what is required for proxy authentication andidentification. A “non-transparent proxy” is a proxy that modifies therequest or response in order to provide some added service to the useragent, such as group annotation services, media type transformation,protocol reduction, or anonymity filtering. Except where eithertransparent or non-transparent behavior is explicitly stated, an HTTPproxy requirements apply to both types of proxies, and is described inIETF RFC 2616, entitled: “Hypertext Transfer Protocol—HTTP/1.1”.

HTTP tunneling. HTTP tunneling is a technique by which communicationsperformed using various network protocols are encapsulated using theHTTP protocol, the network protocols in question usually belonging tothe TCP/IP family of protocols. The HTTP protocol therefore acts as awrapper for a channel that the network protocol being tunneled uses tocommunicate. The HTTP stream with its covert channel is termed an HTTPtunnel, and an HTTP tunnel software consists of client-server HTTPtunneling applications that integrate with existing applicationsoftware, permitting them to be used in conditions of restricted networkconnectivity including firewalled networks, networks behind proxyservers, and network address translation.

An HTTP tunnel is used most often as a means for communication fromnetwork locations with restricted connectivity—most often behind NATs,firewalls, or proxy servers, and most often with applications that lacknative support for communication in such conditions of restrictedconnectivity. Restricted connectivity in the form of blocked TCP/IPports, blocking traffic initiated from outside the network, or blockingof all network protocols except a few is a commonly used method to lockdown a network to secure it against internal and external threats.

HTTP CONNECT tunneling. A variation of HTTP tunneling when behind anHTTP proxy server is to use the “CONNECT” HTTP method. In thismechanism, the client asks an HTTP proxy server to forward the TCPconnection to the desired destination. The server then proceeds to makethe connection on behalf of the client. Once the connection has beenestablished by the server, the proxy server continues to proxy the TCPstream to and from the client. Note that only the initial connectionrequest is HTTP—after that, the server simply proxies the establishedTCP connection. This mechanism is how a client behind an HTTP proxy canaccess websites using SSL or TLS (i.e. HTTPS). Not all HTTP proxyservers support this feature, and even those that do may limit thebehavior (for example only allowing connections to the default HTTPSport 443, or blocking traffic which doesn't appear to be SSL).

HTTP tunneling without using CONNECT. In some networks, the use ofCONNECT method is restricted to some trusted sites. In such cases, anHTTP tunnel can still be implemented using only the usual HTTP methodsas POST, GET, PUT and DELETE. This is similar to the approach used inBidirectional-streams Over Synchronous HTTP (BOSH). In thisproof-of-concept program, the server runs outside the protected networkand acts as a special HTTP server. The client program is run on acomputer inside the protected network. Whenever any network traffic ispassed from the client, the client repackages the traffic data as anHTTP request and relays the data to the outside server, which extractsand executes the original network request for the client. The responseto the request, sent to the server, is then repackaged as an HTTPresponse and relayed back to the client. Since all traffic isencapsulated inside normal GET and POST requests and responses, thisapproach works through most proxies and firewalls.

SOCKS. Socket Secure (SOCKS) is an Internet protocol that performs atLayer 5 of the OSI model (the session layer, an intermediate layerbetween the presentation layer and the transport layer) that exchangesnetwork packets between a client and server through a proxy server.SOCKS5 additionally provides authentication so only authorized users mayaccess a server. Practically, a SOCKS server proxies TCP connections toan arbitrary IP address, and provides a means for UDP packets to beforwarded. SOCKS server accepts incoming client connection on TCP port1080. SOCKS is a de facto standard for circuit-level gateways, and isalso used as a circumvention tool, allowing traffic to bypass Internetfiltering to access content otherwise blocked, e.g., by governments,workplaces, schools, and country-specific web services. Client softwaremust have native SOCKS support in order to connect through SOCKS.

Further, the SOCKS protocol provides a framework for client-serverapplications in both the TCP and UDP domains to conveniently andsecurely use the services of a network firewall. The protocol isconceptually a “shim-layer” between the application layer and thetransport layer, and as such does not provide network-layer gatewayservices, such as forwarding of ICMP messages. SOCKS protocol typicallyrelays TCP sessions at a firewall host to allow application userstransparent access across the firewall. Because the protocol isindependent of application protocols, it can be (and has been) used formany different services, such as telnet, ftp, finger, whois, gopher,WWW, etc. Access control can be applied at the beginning of each TCPsession; thereafter the server simply relays the data between the clientand the application server, incurring minimum processing overhead. SinceSOCKS never has to know anything about the application protocol, itshould also be easy for it to accommodate applications which useencryption to protect their traffic from nosey snoopers.

SOCKS operates at a lower level than HTTP proxying: SOCKS uses ahandshake protocol to inform the proxy software about the connectionthat the client is trying to make, and then acts as transparently aspossible, whereas a regular proxy may interpret and rewrite headers(say, to employ another underlying protocol, such as FTP; however, anHTTP proxy simply forwards an HTTP request to the desired HTTP server).Though HTTP proxying has a different usage model in mind, the CONNECTmethod allows for forwarding TCP connections; however, SOCKS proxies canalso forward UDP traffic and work in reverse, while HTTP proxies cannot.HTTP proxies are traditionally more aware of the HTTP protocol,performing higher-level filtering (though that usually only applies toGET and POST methods, not the CONNECT method). SOCKS4a extends theSOCKS4 protocol to allow a client to specify a destination domain namerather than an IP address; this is useful when the client itself cannotresolve the destination host's domain name to an IP address.

The SOCKS5 protocol is defined in RFC 1928 dated March 1996 andentitled: “SOCKS Protocol Version 5”, which is incorporated in itsentirety for all purposes as if fully set forth herein. It is anextension of the SOCKS4 protocol; it offers more choices forauthentication and adds support for IPv6 and UDP, the latter of whichcan be used for DNS lookups. The protocol specification for SOCKSVersion 5 RFC 1929 dated March 1996 and entitled: “Username/PasswordAuthentication for SOCKS V5”, which is incorporated in its entirety forall purposes as if fully set forth herein, specifies a generalizedframework for the use of arbitrary authentication protocols in theinitial socks connection setup, and describes one of those protocols, asit fits into the SOCKS Version 5. RFC 1961 dated June 1996 entitled:“GSS-API Authentication Method for SOCKS Version 5”, which isincorporated in its entirety for all purposes as if fully set forthherein, provides the specification for the SOCKS V5 GSS-APIauthentication protocol, and defines a GSS-API-based encapsulation forprovision of integrity, authentication and optional confidentiality. RFC3089 dated April 2001 entitled: “A SOCKS-based IPv6/IPv4 GatewayMechanism”, which is incorporated in its entirety for all purposes as iffully set forth herein, describes a SOCKS-based IPv6/IPv4 gatewaymechanism that enables smooth heterogeneous communications between theIPv6 nodes and IPv4 nodes.

WebSocket. WebSocket is a computer communications protocol, providingfull-duplex communication channels over a single TCP connection. TheWebSocket Protocol enables two-way communication between a client thatruns untrusted code in a controlled environment to a remote host thathas opted-in to communications from that code. The security model usedfor this is the origin-based security model commonly used by webbrowsers. The protocol consists of an opening handshake followed bybasic message framing, layered over TCP. The goal of this technology isto provide a mechanism for browser-based applications that need two-waycommunication with servers that does not rely on opening multiple HTTPconnections (e.g., using XMLHttpRequest or <iframe>s and long polling).The WebSocket protocol is defined in RFC 6455 dated December 2011 andentitled: “The WebSocket Protocol”, which is incorporated in itsentirety for all purposes as if fully set forth herein.

While both WebSocket and HTTP protocols are located at layer 7 in theOSI model and, as such, depend on TCP at layer 4, and while WebSocket isdesigned to work over HTTP ports 80 and 443 as well as to support HTTPproxies and intermediaries, the protocols are different. Unlike HTTP,WebSocket provides full-duplex communication, and in addition, WebSocketenables streams of messages on top of TCP. TCP alone deals with streamsof bytes with no inherent concept of a message. To achievecompatibility, the WebSocket handshake uses the HTTP Upgrade header tochange from the HTTP protocol to the WebSocket protocol. The WebSocketprotocol enables interaction between a web client (e.g. a browser) and aweb server with lower overheads, facilitating real-time data transferfrom and to the server. This is made possible by providing astandardized way for the server to send content to the client withoutbeing first requested by the client, and allowing for messages to bepassed back and forth while keeping the connection open. In this way, atwo-way (bi-directional) ongoing conversation can take place between theclient and the server. The communications are done over TCP port number80 (or 443 in the case of TLS-encrypted connections), which is ofbenefit for those environments which block non-web Internet connectionsusing a firewall.

The WebSocket protocol specification defines ws (WebSocket) and wss(WebSocket Secure) as two new Uniform Resource Identifier (URI) schemesthat are used for unencrypted and encrypted connections, respectively.Apart from the scheme name and fragment (# is not supported), the restof the URI components are defined to use URI generic syntax. Usingbrowser developer tools, developers can inspect the WebSocket handshakeas well as the WebSocket frames. WebSocket protocol clientimplementations try to detect if the user agent is configured to use aproxy when connecting to destination host and port and, if it is, usesHTTP CONNECT method to set up a persistent tunnel.

While the WebSocket protocol itself is unaware of proxy servers andfirewalls, it features an HTTP-compatible handshake thus allowing HTTPservers to share their default HTTP and HTTPS ports (80 and 443) with aWebSocket gateway or server. The WebSocket protocol defines a ws:// andwss:// prefix to indicate a WebSocket and a WebSocket Secure connection,respectively. Both schemes use an HTTP upgrade mechanism to upgrade tothe WebSocket protocol. Some proxy servers are transparent and work finewith WebSocket; others will prevent WebSocket from working correctly,causing the connection to fail. In some cases, additional proxy serverconfiguration may be required, and certain proxy servers may need to beupgraded to support WebSocket. If unencrypted WebSocket traffic flowsthrough an explicit or a transparent proxy server without WebSocketssupport, the connection will likely fail.

Further, if an encrypted WebSocket connection is used, then the use ofTransport Layer Security (TLS) in the WebSocket Secure connectionensures that an HTTP CONNECT command is issued when the browser isconfigured to use an explicit proxy server. This sets up a tunnel, whichprovides low-level end-to-end TCP communication through the HTTP proxy,between the WebSocket Secure client and the WebSocket server. In thecase of transparent proxy servers, the browser is unaware of the proxyserver, so no HTTP CONNECT is sent. However, since the wire traffic isencrypted, intermediate transparent proxy servers may simply allow theencrypted traffic through, so there is a much better chance that theWebSocket connection will succeed if WebSocket Secure is used.

Firewall. As used herein, the term ‘firewall’ is a device that inspectsnetwork traffic passing through it, and may perform actions, such asdenying or permitting passage of the traffic based on a set of rules.Firewalls may be implemented as stand-alone network devices or, in somecases, integrated in a single network device, such as a router or switchthat performs other functions. For instance, a network switch mayperform firewall related functions as well as switching functions. Afirewall may be implemented using a hardware and/or software-based, andmay include all necessary subsystems that may control incoming andoutgoing network traffic based on an applied rule set. A firewall may beused to establish a barrier between a trusted, secure internal networkand another network, such as the Internet, that may not be secure andtrusted. Firewalls exist both as software to run on general purposehardware and as a hardware appliance. Many hardware-based firewallenvironments also offer other functionalities to the internal networkthat the firewall environments protect.

NAT Traversal. Network Address Translator (NAT) traversal is anetworking technique of establishing and maintaining Internet protocolconnections across gateways that implement network address translation(NAT). NAT traversal techniques are required for many networkapplications, such as peer-to-peer file sharing and Voice over IP. NATdevices are commonly used to alleviate IPv4 address exhaustion byallowing the use of private IP addresses on private networks behindrouters with a single public IP address facing the public Internet. Theinternal network devices communicate with hosts on the external networkby changing the source address of outgoing requests to that of the NATdevice and relaying replies back to the originating device. NATtraversal techniques usually bypass enterprise security policies.Enterprise security experts prefer techniques that explicitly cooperatewith NAT and firewalls, allowing NAT traversal while still enablingmarshalling at the NAT to enforce enterprise security policies. IETFstandards based on this security model are Realm-Specific IP (RSIP) andmiddlebox communications (MIDCOM).

Various NAT traversal techniques are available, such as WebSocket (ws)or WebSocket Secure (wss), Socket Secure (SOCKS) that uses proxy serversto relay traffic between networks or systems, Traversal Using Relaysaround NAT (TURN) that is a relay protocol designed specifically for NATtraversal, NAT hole punching is a general technique that exploits howNATs handle some protocols (for example, UDP, TCP, or ICMP) to allowpreviously blocked packets through the NAT, Session Traversal Utilitiesfor NAT (STUN) is a standardized set of methods and a network protocolfor NAT hole punching. It was designed for UDP but was also extended toTCP, Interactive Connectivity Establishment (ICE) is a complete protocolfor using STUN and/or TURN to do NAT traversal while picking the bestnetwork route available, UPnP Internet Gateway Device Protocol (IGDP) issupported by many small NAT gateways in home or small office settings.It allows a device on a network to ask the router to open a port,NAT-PMP is a protocol introduced by Apple as an alternative to IGDP, PCPis a successor of NAT-PMP, and Application-Level Gateway (ALG) is acomponent of a firewall or NAT that allows for configuring NAT traversalfilters.

IPsec virtual private network clients use NAT traversal in order to haveEncapsulating Security Payload packets traverse NAT. IPsec uses severalprotocols in its operation which must be enabled to traverse firewallsand network address translators: Internet Key Exchange (IKE)—UserDatagram Protocol (UDP) port 500, Encapsulating Security Payload(ESP)—IP protocol number 50, Authentication Header (AH)—IP protocolnumber 51, and IPsec NAT traversal—UDP port 4500, when NAT traversal isin use. Many routers provide explicit features, often called ‘IPsecPassthrough’. NAT traversal and IPsec may be used to enableopportunistic encryption of traffic between systems. NAT traversalallows systems behind NATs to request and establish secure connectionson demand.

NAT Traversal techniques, method, utilities and uses are described inthe IETF RFC 2663 (dated August 1999) entitled: “IP Network AddressTranslator (NAT) Terminology and Considerations”, in the IETF RFC 3715(dated March 2004) entitled: “IPsec-Network Address Translation (NAT)Compatibility Requirements”, in the IETF RFC 3947 (dated January 2005)entitled: “Negotiation of NAT-Traversal in the IKE”, in the IETF RFC5128 (dated March 2008) entitled: “State of Peer-to-Peer (P2P)Communication across Network Address Translators (NATs)”, in the IETFRFC 5245 (dated April 2010) entitled: “Interactive ConnectivityEstablishment (ICE): A Protocol for Network Address Translator (NAT)Traversal for Offer/Answer Protocols”, in the IETF RFC 5389 (datedOctober 2008) entitled: “Session Traversal Utilities for NAT (STUN)”,and in the IETF RFC 7350 (dated August 2014) entitled: “DatagramTransport Layer Security (DTLS) as Transport for Session TraversalUtilities for NAT (STUN)”, which are all incorporated in their entiretyfor all purposes as if fully set forth herein. One of the simplest butmost robust and practical NAT traversal techniques, commonly known as“hole punching”, is described in a paper by Bryan Ford (of MassachusettsInstitute of Technology), Pyda Srisuresh (of Caymas Systems, Inc.) andDan Kegel published 2008 and entitled: “Peer-to-Peer CommunicationAcross Network Address Translators”, which is incorporated in itsentirety for all purposes as if fully set forth herein. The paperdocuments and analyzes Hole punching for UDP communication, and how itcan be reliably used to set up peer-to-peer TCP streams as well. NATtraversal techniques in P2P networks are described in a paper datedJanuary 2008 by Huynh Cong Phuoc, Ray Hunt, and Andrew McKenzie (all ofUniversity of Canterbury, Chistchurch, New Zealand) entitled: “NATTraversal Techniques in Peer-to-Peer Networks”, which is incorporated inits entirety for all purposes as if fully set forth herein. InitiallyNetwork Address Translation (NAT) detection is categorized and both UDPand TCP traversal techniques are discussed. Methodologies such asRelaying, Connection Reversal, and Hole Punching are then analyzed.Finally the development of a testbed is described which can be used toevaluate NAT traversal techniques and to determine appropriateconfigurations in order to achieve P2P networking.

Sharding. Database systems with large data sets and high throughputapplications can challenge the capacity of a single server. High queryrates can exhaust the CPU capacity of the server, and larger data setsexceed the storage capacity of a single machine. Further, working setsizes larger than the system's RAM stress the I/O capacity of diskdrives. To address these issues of scales, database systems have twobasic approaches: vertical scaling and sharding. Vertical scaling addsmore CPU and storage resources to increase capacity. Scaling by addingcapacity has limitations: high performance systems with large numbers ofCPUs and large amount of RAM are disproportionately more expensive thansmaller systems. Additionally, cloud-based providers may only allowusers to provision smaller instances. As a result there is a practicalmaximum capability for vertical scaling. Sharding, or horizontalscaling, by contrast, divides the data set and distributes the data overmultiple servers, or shards. Each shard is an independent database, andcollectively, the shards make up a single logical database.

A database shard is a horizontal partition of data in a database orsearch engine, where each individual partition is referred to as a shardor database shard. Each shard is held on a separate database serverinstance, to spread load. Some data within a database remains present inall shards, but some appears only in a single shard. Each shard (orserver) acts as the single source for this subset of data. Horizontalpartitioning is a database design principle whereby rows of a databasetable are held separately, rather than being split into columns (whichis what normalization and vertical partitioning do, to differingextents). Each partition forms part of a shard, which may in turn belocated on a separate database server or physical location.

Since the tables are divided and distributed into multiple servers, thetotal number of rows in each table in each database is reduced. Thisreduces index size, which generally improves search performance. Adatabase shard can be placed on separate hardware, and multiple shardscan be placed on multiple machines. This enables a distribution of thedatabase over a large number of machines, greatly improving performance.In addition, if the database shard is based on some real-worldsegmentation of the data (e.g., European customers v. Americancustomers) then it may be possible to infer the appropriate shardmembership easily and automatically, and query only the relevant shard.

Horizontal partitioning splits one or more tables by row, usually withina single instance of a schema and a database server. It may offer anadvantage by reducing index size (and thus search effort) provided thatthere is some obvious, robust, implicit way to identify in whichpartition a particular row will be found, without first needing tosearch the index. Splitting shards across multiple isolated instancesrequires more than simple horizontal partitioning. The hoped-for gainsin efficiency would be lost, if querying the database required bothinstances to be queried, just to retrieve a simple dimension table.Beyond partitioning, sharding thus splits large partitionable tablesacross the servers, while smaller tables are replicated as completeunits.

Database sharding is described in a white paper published April 2017 byOracle Corporation (having a World Headquarters at 500 Oracle Parkway,Redwood Shores, Calif. 94065, USA) entitled: “Oracle Sharding: LinearScalability, Fault Isolation and Geo-distribution for Web-scale OLTPApplications”, and in an MongoDB Documentation Project paper dated Jan.12, 2015 (Release 2.8.0-rc3) entitled: “Sharding and MongoDB”, which areboth incorporated in their entirety for all purposes as if fully setforth herein.

Multihoming. Multihoming refers to the practice of connecting a host ora computer network to more than one network, in order to increasereliability or performance, or to reduce cost. While a typical host orend-user network is connected to just one network, in many circumstancesit can be useful to connect a host or network to multiple networks, inorder to increase reliability (if a single link fails, packets can stillbe routed through the remaining networks), to improve performance(depending on the destination, it may be more efficient to route throughone network or the other) and to decrease cost (depending on thedestination, it may be cheaper to route through one network or theother).

There are several different ways to perform multihoming. In hostmultihoming, a single host may be connected to multiple networks. Forexample, a mobile phone might be simultaneously connected to a WiFinetwork and a 3G network, and a desktop computer might be connected toboth a home network and a VPN. A multihomed host usually is assignedmultiple addresses, one per connected network. In classical multihominga network is connected to multiple providers, and uses its own range ofaddresses (typically from a Provider Independent (PI) range). Thenetwork's edge routers communicate with the providers using a dynamicrouting protocol, typically BGP, which announces the network's addressrange to all providers. If one of the links fail, the dynamic routingprotocol recognizes the failure within seconds or minutes, andreconfigures its routing tables to use the remaining links,transparently to the hosts. Classical multihoming is costly, since itrequires the use of address space that is accepted by all providers, apublic Autonomous System (AS) number, and a dynamic routing protocol.Since multihomed address space cannot be aggregated, it causes growth ofthe global routing table. In multihoming with multiple addressesapproach, the network is connected to multiple providers, and assignedmultiple address ranges, one for each provider. Hosts are assignedmultiple addresses, one for each provider. Multihoming with multipleaddresses is cheaper than classical multihoming, and can be used withoutany cooperation from the providers (e.g., in a home network) butrequires additional technology in order to perform routing: for incomingtraffic, hosts must be associated with multiple A or AAAA DNS records sothat they are reachable through all providers; and for outgoing traffic,a technique such as source-specific routing must be used to routepackets through the correct provider, and reasonable source addressselection policies must be implemented by hosts. Classical multihomingis the dominant technique for IPv4, and requires that a network have itsown public IP address range and a public Autonomous System (AS) number.It is also possible to implement multihoming for IPv4 using multiple NATgateways.

Both classical multihoming and multihoming with multiple addresses maybe used in IPv6. When using classical multihoming, the ProviderIndependent Address Space (PI) that is available in IPv6 may be used.This technique has the advantage of working like IPv4, supportingtraffic balancing across multiple providers, and maintaining existingTCP and UDP sessions through cut-overs. Multihoming with multipleaddresses may be implemented for IPv6, where for outgoing traffic, thehost uses either protocol agnostic (Multipath TCP, SCTP, etc.) or IPv6specific (e.g. SHIM6). The functional requirements and possiblesolutions for multihoming without the use of NAT in IPv6 for hosts andsmall IPv6 networks are described in the IETF RFC 7157 (dated March2014) entitled: “IPv6 Multihoming without Network Address Translation”,which is incorporated in its entirety for all purposes as if fully setforth herein.

DNS. Domain Name System (DNS) is a hierarchical distributed namingsystem for computers, services, or any resource connected to theInternet or a private network. It associates various information withdomain names assigned to each of the participating entities, andtranslates easily memorized domain names to the numerical IP addressesneeded for the purpose of locating computer services and devicesworldwide. The DNS is described, for example, in the IETF RFC 3467entitled: “Role of the Domain Name System (DNS)”, in the IETF RFC 6195entitled: “Domain Name System (DNS) LANA Considerations”, and in theIETF RFC 1591 entitled: “Domain Name System Structure and Delegation”,which are incorporated in their entirety for all purposes as if fullyset forth herein.

A system for resolving Domain Name System (DNS) queries that contains acommunication device for resolving DNS queries, wherein thecommunication device further contains a memory and a processor that isconfigured by the memory, a cache storage for use by the communicationdevice, and a network of authoritative domain name servers, where in aprocess of the communication device looking up a DNS request within thecache storage, if the communication device views an expired DNS entrywithin the cache storage, the communication device continues the processof looking up the DNS request in the cache storage while, in parallel,sending out a concurrent DNS request to an authoritative domain nameserver that the expired DNS entry belongs to, is described in U.S. Pat.No. 8,671,221 to the same inventors as this application, entitled:“Method and System for Increasing Speed of Domain Name System Resolutionwithin a Computing Device”, which is incorporated in its entirety forall purposes as if fully set forth herein.

Systems and methods of storing previously transmitted data and using itto reduce bandwidth usage and accelerate future communications, andusing algorithms to identify long compression history matches. A networkdevice that may improve compression efficiency and speed is described inU.S. Pat. No. 7,865,585 to Samuels et al., entitled: “Systems andMethods for Providing Dynamic Ad Hok Proxy-Cache Hierarchies”, which isincorporated in its entirety for all purposes as if fully set forthherein. Further, a method and system for accelerating the receipt ofdata in a client-to-client network described in U.S. Pat. No. 7,203,741to Marco et al., entitled: “Method and System for Accelerating Receiptof Data in a Client-to-Client Network”, which is incorporated in itsentirety for all purposes as if fully set forth herein.

WWAN. Any wireless network herein may be a Wireless Wide Area Network(WWAN) such as a wireless broadband network, and the WWAN port may be anantenna and the WWAN transceiver may be a wireless modem. The wirelessnetwork may be a satellite network, the antenna may be a satelliteantenna, and the wireless modem may be a satellite modem. The wirelessnetwork may be a WiMAX network such as according to, compatible with, orbased on, IEEE 802.16-2009, the antenna may be a WiMAX antenna, and thewireless modem may be a WiMAX modem. The wireless network may be acellular telephone network, the antenna may be a cellular antenna, andthe wireless modem may be a cellular modem. The cellular telephonenetwork may be a Third Generation (3G) network, and may use UMTS W-CDMA,UMTS HSPA, UMTS TDD, CDMA2000 1×RTT, CDMA2000 EV-DO, or GSMEDGE-Evolution. The cellular telephone network may be a FourthGeneration (4G) network and may use or be compatible with HSPA+, MobileWiMAX, LTE, LTE-Advanced, MBWA, or may be compatible with, or based on,IEEE 802.20-2008.

WLAN. Wireless Local Area Network (WLAN), is a popular wirelesstechnology that makes use of the Industrial, Scientific and Medical(ISM) frequency spectrum. In the US, three of the bands within the ISMspectrum are the A band, 902-928 MHz; the B band, 2.4-2.484 GHz (a.k.a.2.4 GHz); and the C band, 5.725-5.875 GHz (a.k.a. 5 GHz). Overlappingand/or similar bands are used in different regions such as Europe andJapan. In order to allow interoperability between equipment manufacturedby different vendors, few WLAN standards have evolved, as part of theIEEE 802.11 standard group, branded as WiFi (www.wi-fi.org). IEEE802.11b describes a communication using the 2.4 GHz frequency band andsupporting communication rate of 11 Mb/s, IEEE 802.11a uses the 5 GHzfrequency band to carry 54 MB/s and IEEE 802.11g uses the 2.4 GHz bandto support 54 Mb/s. The WiFi technology is further described in apublication entitled: “WiFi Technology” by Telecom Regulatory Authority,published on July 2003, which is incorporated in its entirety for allpurposes as if fully set forth herein. The IEEE 802 defines an ad-hocconnection between two or more devices without using a wireless accesspoint: the devices communicate directly when in range. An ad hoc networkoffers peer-to-peer layout and is commonly used in situations such as aquick data exchange or a multiplayer LAN game, because the setup is easyand an access point is not required.

A node/client with a WLAN interface is commonly referred to as STA(Wireless Station/Wireless client). The STA functionality may beembedded as part of the data unit, or alternatively be a dedicated unit,referred to as bridge, coupled to the data unit. While STAs maycommunicate without any additional hardware (ad-hoc mode), such networkusually involves Wireless Access Point (a.k.a. WAP or AP) as a mediationdevice. The WAP implements the Basic Stations Set (BSS) and/or ad-hocmode based on Independent BSS (IBSS). STA, client, bridge and WAP willbe collectively referred to hereon as WLAN unit. Bandwidth allocationfor IEEE 802.11g wireless in the U.S. allows multiple communicationsessions to take place simultaneously, where eleven overlapping channelsare defined spaced 5 MHz apart, spanning from 2412 MHz as the centerfrequency for channel number 1, via channel 2 centered at 2417 MHz and2457 MHz as the center frequency for channel number 10, up to channel 11centered at 2462 MHz. Each channel bandwidth is 22 MHz, symmetrically(+/−11 MHz) located around the center frequency. In the transmissionpath, first the baseband signal (IF) is generated based on the data tobe transmitted, using 256 QAM (Quadrature Amplitude Modulation) basedOFDM (Orthogonal Frequency Division Multiplexing) modulation technique,resulting a 22 MHz (single channel wide) frequency band signal. Thesignal is then up converted to the 2.4 GHz (RF) and placed in the centerfrequency of required channel, and transmitted to the air via theantenna. Similarly, the receiving path comprises a received channel inthe RF spectrum, down converted to the baseband (IF) wherein the data isthen extracted.

In order to support multiple devices and using a permanent solution, aWireless Access Point (WAP) is typically used. A Wireless Access Point(WAP, or Access Point—AP) is a device that allows wireless devices toconnect to a wired network using Wi-Fi, or related standards. The WAPusually connects to a router (via a wired network) as a standalonedevice, but can also be an integral component of the router itself.Using Wireless Access Point (AP) allows users to add devices that accessthe network with little or no cables. A WAP normally connects directlyto a wired Ethernet connection, and the AP then provides wirelessconnections using radio frequency links for other devices to utilizethat wired connection. Most APs support the connection of multiplewireless devices to one wired connection. Wireless access typicallyinvolves special security considerations, since any device within arange of the WAP can attach to the network. The most common solution iswireless traffic encryption. Modern access points come with built-inencryption such as Wired Equivalent Privacy (WEP) and Wi-Fi ProtectedAccess (WPA), typically used with a password or a passphrase.Authentication in general, and a WAP authentication in particular, isused as the basis for authorization, which determines whether aprivilege may be granted to a particular user or process, privacy, whichkeeps information from becoming known to non-participants, andnon-repudiation, which is the inability to deny having done somethingthat was authorized to be done based on the authentication. Anauthentication in general, and a WAP authentication in particular, mayuse an authentication server that provides a network service thatapplications may use to authenticate the credentials, usually accountnames and passwords of their users. When a client submits a valid set ofcredentials, it receives a cryptographic ticket that it can subsequentlybe used to access various services. Authentication algorithms includepasswords, Kerberos, and public key encryption.

Prior art technologies for data networking may be based on singlecarrier modulation techniques, such as AM (Amplitude Modulation), FM(Frequency Modulation), and PM (Phase Modulation), as well as bitencoding techniques such as QAM (Quadrature Amplitude Modulation) andQPSK (Quadrature Phase Shift Keying). Spread spectrum technologies, toinclude both DSSS (Direct Sequence Spread Spectrum) and FHSS (FrequencyHopping Spread Spectrum) are known in the art. Spread spectrum commonlyemploys Multi-Carrier Modulation (MCM) such as OFDM (OrthogonalFrequency Division Multiplexing). OFDM and other spread spectrum arecommonly used in wireless communication systems, particularly in WLANnetworks.

BAN. A wireless network may be a Body Area Network (BAN) according to,compatible with, or based on, IEEE 802.15.6 standard, and communicatingdevices may comprise a BAN interface that may include a BAN port and aBAN transceiver. The BAN may be a Wireless BAN (WBAN), and the BAN portmay be an antenna and the BAN transceiver may be a WBAN modem.

Bluetooth. Bluetooth is a wireless technology standard for exchangingdata over short distances (using short-wavelength UHF radio waves in theISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, andbuilding personal area networks (PANs). It can connect several devices,overcoming problems of synchronization. A Personal Area Network (PAN)may be according to, compatible with, or based on, Bluetooth™ or IEEE802.15.1-2005 standard. A Bluetooth controlled electrical appliance isdescribed in U.S. Patent Application No. 2014/0159877 to Huang entitled:“Bluetooth Controllable Electrical Appliance”, and an electric powersupply is described in U.S. Patent Application No. 2014/0070613 to Garbet al. entitled: “Electric Power Supply and Related Methods”, which areboth incorporated in their entirety for all purposes as if fully setforth herein. Any Personal Area Network (PAN) may be according to,compatible with, or based on, Bluetooth™ or IEEE 802.15.1-2005 standard.A Bluetooth controlled electrical appliance is described in U.S. PatentApplication No. 2014/0159877 to Huang entitled: “Bluetooth ControllableElectrical Appliance”, and an electric power supply is described in U.S.Patent Application No. 2014/0070613 to Garb et al. entitled: “ElectricPower Supply and Related Methods”, which are both incorporated in theirentirety for all purposes as if fully set forth herein.

Bluetooth operates at frequencies between 2402 and 2480 MHz, or 2400 and2483.5 MHz including guard bands 2 MHz wide at the bottom end and 3.5MHz wide at the top. This is in the globally unlicensed (but notunregulated) Industrial, Scientific and Medical (ISM) 2.4 GHzshort-range radio frequency band. Bluetooth uses a radio technologycalled frequency-hopping spread spectrum. Bluetooth divides transmitteddata into packets, and transmits each packet on one of 79 designatedBluetooth channels. Each channel has a bandwidth of 1 MHz. It usuallyperforms 800 hops per second, with Adaptive Frequency-Hopping (AFH)enabled. Bluetooth low energy uses 2 MHz spacing, which accommodates 40channels. Bluetooth is a packet-based protocol with a master-slavestructure. One master may communicate with up to seven slaves in apiconet. All devices share the master's clock. Packet exchange is basedon the basic clock, defined by the master, which ticks at 312.5 μsintervals. Two clock ticks make up a slot of 625 μs, and two slots makeup a slot pair of 1250 μs. In the simple case of single-slot packets themaster transmits in even slots and receives in odd slots. The slave,conversely, receives in even slots and transmits in odd slots. Packetsmay be 1, 3 or 5 slots long, but in all cases the master's transmissionbegins in even slots and the slave's in odd slots.

A master Bluetooth device can communicate with a maximum of sevendevices in a piconet (an ad-hoc computer network using Bluetoothtechnology), though not all devices reach this maximum. The devices canswitch roles, by agreement, and the slave can become the master (forexample, a headset initiating a connection to a phone necessarily beginsas master—as initiator of the connection—but may subsequently operate asslave). The Bluetooth Core Specification provides for the connection oftwo or more piconets to form a scatternet, in which certain devicessimultaneously play the master role in one piconet and the slave role inanother. At any given time, data can be transferred between the masterand one other device (except for the little-used broadcast mode). Themaster chooses which slave device to address; typically, it switchesrapidly from one device to another in a round-robin fashion. Since it isthe master that chooses which slave to address, whereas a slave issupposed to listen in each receive slot, being a master is a lighterburden than being a slave. Being a master of seven slaves is possible;being a slave of more than one master is difficult.

Bluetooth Low Energy. Bluetooth low energy (Bluetooth LE, BLE, marketedas Bluetooth Smart) is a wireless personal area network technologydesigned and marketed by the Bluetooth Special Interest Group (SIG)aimed at novel applications in the healthcare, fitness, beacons,security, and home entertainment industries. Compared to ClassicBluetooth, Bluetooth Smart is intended to provide considerably reducedpower consumption and cost while maintaining a similar communicationrange. Bluetooth low energy is described in a Bluetooth SIG publishedDec. 2, 2014 standard Covered Core Package version: 4.2, entitled:“Master Table of Contents & Compliance Requirements—Specification Volume0”, and in an article published 2012 in Sensors [ISSN 1424-8220] byCaries Gomez et al. [Sensors 2012, 12, 11734-11753;doi:10.3390/s120211734] entitled: “Overview and Evaluation of BluetoothLow Energy: An Emerging Low-Power Wireless Technology”, which are bothincorporated in their entirety for all purposes as if fully set forthherein.

Bluetooth Smart technology operates in the same spectrum range (the2.400 GHz-2.4835 GHz ISM band) as Classic Bluetooth technology, but usesa different set of channels. Instead of the Classic Bluetooth 79 1-MHzchannels, Bluetooth Smart has 40 2-MHz channels. Within a channel, datais transmitted using Gaussian frequency shift modulation, similar toClassic Bluetooth's Basic Rate scheme. The bit rate is 1 Mbit/s, and themaximum transmit power is 10 mW. Bluetooth Smart uses frequency hoppingto counteract narrowband interference problems. Classic Bluetooth alsouses frequency hopping but the details are different; as a result, whileboth FCC and ETSI classify Bluetooth technology as an FHSS scheme,Bluetooth Smart is classified as a system using digital modulationtechniques or a direct-sequence spread spectrum. All Bluetooth Smartdevices use the Generic Attribute Profile (GATT). The applicationprogramming interface offered by a Bluetooth Smart aware operatingsystem will typically be based around GATT concepts.

NFC. Any wireless communication herein may be partly or in full inaccordance with, compatible with, or based on, short-range communicationsuch as Near Field Communication (NFC), having a theoretical workingdistance of 20 centimeters and a practical working distance of about 4centimeters, and commonly used with mobile devices, such as smartphones.The NFC typically operates at 13.56 MHz as defined in IS O/IEC 18000-3air interface, and at data rates ranging from 106 Kbit/s to 424 Kbit/s.NFC commonly involves an initiator and a target; the initiator activelygenerates an RF field that may power a passive target. NFC peer-to-peercommunication is possible, provided both devices are powered.

The NFC typically supports passive and active modes of operation. Inpassive communication mode, the initiator device provides a carrierfield and the target device answers by modulating the existing field,and the target device may draw its operating power from theinitiator-provided electromagnetic field, thus making the target devicea transponder. In active communication mode, both devices typically havepower supplies, and both initiator and target devices communicate byalternately generating their own fields, where a device deactivates itsRF field while it is waiting for data. NFC typically usesAmplitude-Shift Keying (ASK), and employs two different schemes totransfer data. At the data transfer rate of 106 Kbit/s, a modifiedMiller coding with 100% modulation is used, while in all other cases,Manchester coding is used with a modulation ratio of 10%.

Cellular. Cellular telephone network may be according to, compatiblewith, or may be based on, a Third Generation (3G) network that uses UMTSW-CDMA, UMTS HSPA, UMTS TDD, CDMA2000 1×RTT, CDMA2000 EV-DO, or GSMEDGE-Evolution. The cellular telephone network may be a FourthGeneration (4G) network that uses HSPA+, Mobile WiMAX, LTE,LTE-Advanced, MBWA, or may be based on or compatible with IEEE802.20-2008.

Appliance. Home appliances are electrical and mechanical devices usingtechnology for household use, such as food handling, cleaning, clotheshandling, or environmental control. Appliances are commonly used inhousehold, institutional, commercial or industrial setting, foraccomplishing routine housekeeping tasks, and are typically electricallypowered. The appliance may be a major appliance, also known as “WhiteGoods”, which is commonly large, difficult to move, and generally tosome extent fixed in place (usually on the floor or mounted on a wall orceiling), and is electrically powered from the AC power (mains) grid.Non-limiting examples of major appliances are washing machines, clothesdryers, dehumidifiers, conventional ovens, stoves, refrigerators,freezers, air-conditioners, trash compactors, furnaces, dishwasher,water heaters, microwave ovens and induction cookers. The appliance maybe a small appliance, also known as “Brown Goods”, which is commonly asmall home appliance that is portable or semi-portable, and is typicallya tabletop or a coutertop type. Examples of small appliances aretelevision sets, CD and DVD players, HiFi and home cinema systems,telephone sets and answering machines, and beverage making devices suchas coffee-makers and iced-tea makers.

Some appliances main function is food storage, commonly refrigerationrelated appliances such as refrigerators and freezers. Other appliancesmain function is food preparation, such as conventional ovens (stoves)or microwave ovens, electric mixers, food processors, and electric foodblenders, as well as beverage makers such as coffee-makers and iced-teamakers. Few food related appliances, commonly found in a home kitchen,are illustrated in FIG. 4 , showing a dishwasher 41, a food processor42, a refrigerator 43, an oven 44, a mixer 45, and a microwave oven 46.Some appliances main function relates to cleaning, such as clothescleaning. Clothes cleaning appliances examples are washing/laundrymachines and clothes dryers. A vacuum cleaner is an appliance used tosuck up dust and dirt, usually from floors and other surfaces. Fewcleaning-related appliances are illustrated in FIG. 4 a , showing avacuum cleaner 47, a cloth dryer 48 and a washing machine 49, as well asa still digital camera 51 and a digital video camera 52. Some appliancesmain function relates to temperature control, such as heating andcooling. Air conditioners and heaters, as well as HVAC (Heating,Ventilation and Air Conditioning) systems, are commonly used for climatecontrol, usually for thermal comfort for occupants of buildings or otherenclosures. Similarly, water heaters are used for heating water.

Wearables. As used herein, the term “wearable device” (or “wearable”)includes a body-borne device (or item) designed or intended to be wornby a human. Such devices are typically comfortably worn on, and arecarried or transported by, the human body, and are commonly used tocreate constant, convenient, seamless, portable, and mostly hands-freeaccess to electronics and computers. The wearable devices may be indirect contact with the human body (such as by touching, or attachingto, the body skin), or may be releasably attachable to clothes or otheritems intended or designed to be worn on the human body. In general, thegoal of wearable technologies is to smoothly incorporate functional,portable electronics and computers into individuals' daily lives.Wearable devices may be releasably attached to the human body usingattaching means such as straps, buckles, belts, or clasps. Alternativelyor in addition, wearable devices may be shaped, structured, or having aform factor to be body releasably mountable or attachable, such as usingeye-glass frames or headphones. Further, wearable devices may be wornunder, with, or on top of, clothing.

Wearable devices may interact as sensors or actuators with an organ orpart of the human body, such as a head mounted wearable device mayinclude a screen suspended in front of a user's eye, without providingany aid to the user's vision. Examples of wearable devices includewatches, glasses, contact lenses, pedometers, chest straps, wrist-bands,head bands, arm bands, belt, head wear, hats, glasses, watches,sneakers, clothing, pads, e-textiles and smart fabrics, headbands,beanies, and caps, as well as jewelry such as rings, bracelets, andhearing aid-like devices that are designed to look like earrings. Awearable device may be structured, designed, or have a form factor thatis identical to, substantially similar to, or is at least in partsubstitute to, a traditional wearable item.

A wearable device may be a headwear that may be structured, designed, orhave a form factor that is identical to, substantially similar to, or isat least in part substitute to, any headwear item. The headwear may beattached to, or be in contact with, a head part, such as a face, nose,right nostril, left nostril, right cheek, left cheek, right eye, lefteye, right ear, or left ear, nose, mouth, lip, forehead, or chin. Awearable device may be structured, designed, or have a form factor thatis identical to, substantially similar to, or is at least in partsubstitute to, a bonnet, a cap, a crown, a fillet, a hair cover, a hat,a helmet, a hood, a mask, a turban, a veil, or a wig.

A headwear device may be an eyewear that may be structured, designed, orhave a form factor that is identical to, substantially similar to, or isat least in part substitute to, any eyewear item, such as glasses,sunglasses, a contact lens, a blindfold, or a goggle. A headwear devicemay be an earpiece that may be structured, designed, or have a formfactor that is identical to, substantially similar to, or is at least inpart substitute to, any earpiece item, such as a hearing aid, aheadphone, a headset, or an earplug.

A wearable device may be releasably or permanently attach to, or be partof, a clothing article such as a tie, sweater, jacket, or hat. Theattachment may use taping, gluing, pinning, enclosing, encapsulating, orany other method of attachment or integration known in the art.Furthermore, in some embodiments, there may be an attachment elementsuch as a pin or a latch and hook system, of portion thereof (with thecomplementary element on the item to which it is to be affixed) or clip.In a non-limiting example, the attachment element has a clip-like designto allow attachment to pockets, belts, watches, bracelets, broaches,rings, shoes, hats, bike handles, necklaces, ties, spectacles, collars,socks, bags, purses, wallets, or cords.

A wearable device may be releasably or permanently attach to, or be partof, a top underwear such as a bra, camisole, or undershirt, a bottomunderwear such as a diaper, panties, plastic pants, slip, thong,underpants, boxer briefs, boxer shorts, or briefs, or a full-bodyunderwear such as bodysuit, long underwear, playsuit, or teddy.Similarly, a wearable device may be releasably or permanently attach to,or be part of, a headwear such as a Baseball cap, Beret, Cap, Fedora,hat, helmet, hood, knit cap, toque, turban, or veil. Similarly, awearable device may be releasably or permanently attach to, or be partof, a footwear such as an athletic shoe, boot, court shoe, dress shoe,flip-flops, hosiery, sandal, shoe, spats, slipper, sock, or stocking.Further, a wearable device may be releasably or permanently attach to,or be part of, an accessory such as a bandana, belt, bow tie, coinpurse, cufflink, cummerbund, gaiters, glasses, gloves, headband,handbag, handkerchief, jewellery, muff, necktie, pocket protector,pocketwatch, sash, scarf, sunglasses, suspenders, umbrella, wallet, orwristwatch.

A wearable device may be releasably or permanently attach to, or be partof, an outwear such as an apron, blazer, British warm, cagoule, cape,chesterfield, coat, covert coat, cut-off, duffle coat, flight jacket,gilet, goggle jacket, guards coat, Harrington jacket, hoodie, jacket,leather jacket, mess jacket, opera coat, overcoat, parka, paletot, peacoat, poncho, raincoat, robe, safari jacket, shawl, shrug, ski suit,sleeved blanket, smoking jacket, sport coat, trench coat, ulster coat,waistcoat, or windbreaker. Similarly, a wearable device may bereleasably or permanently attach to, or be part of, a suit (or uniform)such as an academic dress, ball dress, black tie, boilersuit, cleanroomsuit, clerical clothing, court dress, gymslip, jumpsuit, kasaya, labcoat, military uniform, morning dress, onesie, pantsuit, red sea rig,romper suit, school uniform, scrubs, stroller, tuxedo, or white tie.Further, a wearable device may be releasably or permanently attach to,or be part of, a dress such as a ball gown, bouffant gown, coatdress,cocktail dress, debutante dress, formal wear, frock, evening gown, gown,house dress, jumper, little black dress, princess line, sheath dress,shirtdress, slip dress, strapless dress, sundress, wedding dress, orwrap dress. Furthermore, a wearable device may be releasably orpermanently attach to, or be part of, a skirt such as an A-line skirt,ballerina skirt, denim skirt, men's skirts, miniskirt, pencil skirt,prairie skirt, rah-rah skirt, sarong, Skort, tutu, or wrap. In oneexample, a wearable device may be releasably or permanently attach to,or be part of, a trousers (or shorts) such as bell-bottoms, bermudashorts, bondage pants, capri pants, cargo pants, chaps, cycling shorts,dress pants, high water pants, lowrise pants, Jeans, jodhpurs, leggings,overall, Palazzo pants, parachute pants, pedal pushers, phat pants,shorts, slim-fit pants, sweatpants, windpants, or yoga pants. In oneexample, a wearable device may be releasably or permanently attach to,or be part of, a top such as a blouse, crop top, dress shirt, guayabera,guernsey, halterneck, henley shirt, hoodie, jersey, polo shirt, shirt,sleeveless shirt, sweater, sweater vest, t-shirt, tube top, turtleneck,or twinset.

A wearable device may be structured, designed, or have a form factorthat is identical to, substantially similar to, or is at least in partsubstitute to, a fashion accessory. These accessories may be purelydecorative, or have a utility beyond aesthetics. Examples of theseaccessories include, but are not limited to, rings, bracelets,necklaces, watches, watch bands, purses, wallets, earrings, body rings,headbands, glasses, belts, ties, tie bars, tie tacks, wallets, shoes,pendants, charms and bobbles. For example, wearable devices may also beincorporated into pockets, steering wheels, keyboards, pens, and bicyclehandles.

In one example, the wearable device may be shaped as, or integratedwith, a device that includes an annular member defining an aperturetherethrough that is sized for receipt therein of a human body part. Thebody part may be part of a human hand such as upper arm, elbow, forearm,wrist (such as a wrist-band), or a finger (such as a ring).Alternatively or in addition, the body part may be part of a human heador neck, such as a forehead, ear, skull, or face. Alternatively or inaddition, the body part may be part of a human thorax or abdomen, suchas waist or hip. Alternatively or in addition, the body part may be partof a human leg or foot, such as thigh, calf, ankle, instep, knee, ortoe.

In one example, the wearable device may be shaped as, or integratedwith, a ring. The ring may comprise, consist essentially of or consistof a shank, which is the location that provides an opening for a finger,and a head, which comprises, consists essentially or consists ofornamental features of the ring and in some embodiments houses thesignaling assembly of the present device. The head may be of any shape,e.g., a regular sphere, truncated sphere, cube, rectangular prism,cylinder, triangular prism, cone, pyramid, barrel, truncated cone, domedcylinder, truncated cylinder, ellipsoid, regular polygon prism ortruncated three-dimensional polygon of e.g., 4-16 sides, such as atruncated pyramid (trapezoid), or combination thereof or it may be anirregular shape. Further, the head may comprise an upper face thatcontains and is configured to show one or more jewels and/or ornamentaldesigns.

A mobile communication device configured to be worn on an index fingerof a user's hand is described in U.S. Patent Application Publication No.2015/0373443 to Carroll entitled: “Finger-wearable mobile communicationdevice”, which is incorporated in its entirety for all purposes as iffully set forth herein. The device includes a case, a microphone, aswitch, and a power source. The microphone and the switch arestrategically located along a shape of the case so that as worn on theuser's index finger and when the switch is activated by the thumb of theuser's hand, the hand naturally cups about the microphone to form abarrier to ambient noise. Further, the microphone can readily be locatednear a corner of the user's mouth for optimal speech-receivingconditions and to provide more private audio input.

A user controls an external electronic device with a finger-ring-mountedtouchscreen is described in U.S. Patent Application Publication No.2015/0277559 to Vescovi et al. entitled: “Devices and Methods for a RingComputing Device”, which is incorporated in its entirety for allpurposes as if fully set forth herein. The device includes a computerprocessor, wireless transceiver, and rechargeable power source; the ringis worn on a first finger receives an input from a second finger,selects one of a plurality of touch events associated with the input,and wirelessly transmits a command associated with the touch event tothe external electronic device.

A mobile communication device that comprises a fashion accessory and asignaling assembly is described in U.S. Patent Application PublicationNo. 2015/0349556 to Mercando et al. entitled: “Mobile CommunicationDevices”, which is incorporated in its entirety for all purposes as iffully set forth herein. The signaling assembly may be configured toprovide sensory stimuli such as a flashing LED light and a vibration.These stimuli may vary depending on the signal received from a remotecommunication device or from gestures made by a user or from informationstored in the mobile communication device.

A wearable fitness-monitoring device is described in U.S. Pat. No.8,948,832 to Hong et al. entitled: “Wearable Heart Rate Monitor”, whichis incorporated in its entirety for all purposes as if fully set forthherein. The device including a motion sensor and a photoplethysmographic(PPG) sensor. The PPG sensor includes (i) a periodic light source, (ii)a photo detector, and (iii) circuitry determining a user's heart ratefrom an output of the photo detector. Some embodiments provide methodsfor operating a heart rate monitor of a wearable fitness-monitoringdevice to measure one or more characteristics of a heartbeat waveform.Some embodiments provide methods for operating the wearable fitnessmonitoring device in a low power state when the device determines thatthe device is not worn by a user. Some embodiments provide methods foroperating the wearable fitness-monitoring device in a normal power statewhen the device determines that the device is worn by a user.

A wearable device and method for processing mages to prolong batterylife are described in U.S. Pat. No. 8,957,988 to Wexler et al. entitled:“Apparatus for processing images to prolong battery life”, which isincorporated in its entirety for all purposes as if fully set forthherein. In one implementation, a wearable apparatus may include awearable image sensor configured to capture a plurality of images froman environment of a user. The wearable apparatus may also include atleast one processing device configured to, in a first processing-mode,process representations of the plurality of images to determine a valueof at least one capturing parameter for use in capturing at least onesubsequent image, and in a second processing-mode, process therepresentations of the plurality of images to extract information. Inaddition, the at least one processing device may operate in the firstprocessing-mode when the wearable apparatus is powered by a mobile powersource included in the wearable apparatus and may operate in the secondprocessing-mode when the wearable apparatus is powered by an externalpower source.

A wearable device may be used for notifying a person, such as by usingtactile, visual, or audible stimulus, as described for example in U.S.Patent Application No. 2015/0341901 to RYU et al. entitled: “Method andapparatus for providing notification”, which is incorporated in itsentirety for all purposes as if fully set forth herein, describing anelectronic device that includes: a transceiver configured to communicatewith at least one wearable device and receive, from the at least onewearable device, status information indicating whether the at least onewearable device is currently being worn; and a processor configured todetermine whether to send a notification request to the at least onewearable device based on the status information received by thetransceiver.

A communication device, system and method are described for example inU.S. Patent Application No. 2007/0052672 to Ritter et al. entitled:“Communication device, system and method”, which is incorporated in itsentirety for all purposes as if fully set forth herein. It is disclosescomprising a Virtual Retinal Display (VRD) in form of glasses (1), atleast one haptic sensor (12) mounted on the frame of the glasses orconnected by a short range communication interface (13) to the glasses(1), wherein it is possible to navigate by means of a cursor through animage displayed by the Virtual Retinal Display (VRD) with the at leastone haptic sensor (12). A central control unit controls (11) the VirtualRetinal Display (VRD) and the at least one haptic sensor (12). When theVirtual Retinal Display (VRD) is connected to an external device (2, 9)by a short range communication interface (13), the user can navigatethrough the content of the external device (2, 9) by easy use of thehaptic sensor (12).

Wearable communication devices, e.g. implemented in a watch, using shortrange communication to a cell phone, and facilitating natural andintuitive user interface with low-power implementation are described forexample in U.S. Patent Application No. 2014/0045547 to Singamsetty etal. entitled: “Wearable Communication Device and User Interface”, whichis incorporated in its entirety for all purposes as if fully set forthherein. The devices allow a user to easily access all features of thephone, all while a phone is nearby but not visible. Notification isperformed with vibration, an LED light and OLED text display of incomingcalls, texts, and calendar events. It allows communicating hands-free.This allows using the communication device as “remote control” for homedevices, etc. via voice and buttons. The device comprises interfacesmotion sensors such as accelerometers, magnetometer and gyroscope,infrared proximity sensors, vibrator motor, and/or voice recognition.Low power consumption is achieved by dynamical configuration of sensorparameters to support only the necessary sensor functions at any givenstate of the device.

A wearable electronic device that is configured to control and command avariety of wireless devices within its proximity is described in U.S.Pat. No. 7,605,714 to Thompson et al. entitled: “System and method forcommand and control of wireless devices using a wearable device”, whichis incorporated in its entirety for all purposes as if fully set forthherein. The wearable device dynamically generates a user interfacecorresponding to the services of a particular wireless device. Throughthe user interface, the wireless device surface content to a user andallows a user select interactions with the wireless devices using thewearable device.

An apparatus and method for the remote control and/or interaction-withelectronic-devices such as computers; home-entertainment-systems;media-centers; televisions; DVD-players; VCR-players; music systems;appliances; security systems; toys/games; and/or displays are describedin U.S. Pat. No. 8,508,472 to Wieder entitled: “Wearable remote controlwith a single control button”, which is incorporated in its entirety forall purposes as if fully set forth herein. A user may orient a pointer(e.g., laser pointer) to place a pointer-spot on/near object(s) on anactive-display(s); and/or a fixed-display(s); and/or on real-worldobject(s) within a display region or pointer-spot detection-region.Detectors, imager(s) and/or camera(s) may be connected/attached to thedisplay region and/or a structure that is connected/attached to displayregion. When the user initiates a “select”, the detectors/cameras maydetect the location of the pointer-spot within the display region.Corresponding to the user's selection(s); control action(s) may beperformed on the device(s) being controlled/interacted-with andadditional selection-menus may be optionally presented on anactive-display.

A hand-worn controller consisting of a housing having a central openingsized to permit the controller to be worn as ring on the index finger ofa human hand is described in U.S. Patent Application Publication No.2006/0164383 to Machin et al. entitled: “Remote controller ring for userinteraction”, which is incorporated in its entirety for all purposes asif fully set forth herein. A joystick lever projects outwardly from thehousing and is positioned to be manipulated by the user's thumb. Thejoystick operates on or more control devices, such as switches orpotentiometers, that produce control signals. A wireless communicationsdevice, such as a Bluetooth module, mounted in the housing transmitscommand signals to a remote utilization device, which are indicative ofthe motion or position of the joystick lever.

A wearable augmented reality computing apparatus with a display screen,a reflective device, a computing device and a head mounted harness tocontain these components is described in U.S. Patent ApplicationPublication No. 2012/0050144 to Morlock entitled: “Wearable augmentedreality computing apparatus”, which is incorporated in its entirety forall purposes as if fully set forth herein. The display device andreflective device are configured such that a user can see the reflectionfrom the display device superimposed on the view of reality. Anembodiment uses a switchable mirror as the reflective device. One usageof the apparatus is for vehicle or pedestrian navigation. The portabledisplay and general purpose computing device can be combined in a devicesuch as a smartphone. Additional components consist of orientationsensors and non-handheld input devices.

In one example, a wearable device may use, or may be based on, aprocessor or a microcontroller that is designed for wearableapplications, such as the CC2650 SimpleLink™ Multistandard Wireless MCUavailable from Texas Instruments Incorporated (headquartered in Dallas,Tex., U.S.A.) and described in a Texas Instrument 2015 publication#SWRT022 entitled: “SimpleLink™ Ultra-Low Power—Wireless MicrocontrollerPlatform”, and in a Texas Instrument 2015 datasheet #SWRS158A (publishedFebruary 2015, Revised October 2015) entitled: “CC2650 SimpleLink™Multistandard Wireless MCU”, which are both incorporated in theirentirety for all purposes as if fully set forth herein.

An example of a personal multimedia electronic device, and moreparticularly to a head-worn device such as an eyeglass frame, isdescribed in U.S. Patent Application No. 2010/0110368 to Chaum entitled:“System and apparatus for eyeglass appliance platform”, which isincorporated in its entirety for all purposes as if fully set forthherein. The device is having a plurality of interactiveelectrical/optical components. In one embodiment, a personal multimediaelectronic device includes an eyeglass frame having a side arm and anoptic frame; an output device for delivering an output to the wearer; aninput device for obtaining an input; and a processor comprising a set ofprogramming instructions for controlling the input device and the outputdevice. The output device is supported by the eyeglass frame and isselected from the group consisting of a speaker, a bone conductiontransmitter, an image projector, and a tactile actuator. The inputdevice is supported by the eyeglass frame and is selected from the groupconsisting of an audio sensor, a tactile sensor, a bone conductionsensor, an image sensor, a body sensor, an environmental sensor, aglobal positioning system receiver, and an eye tracker. In oneembodiment, the processor applies a user interface logic that determinesa state of the eyeglass device and determines the output in response tothe input and the state.

An example of an eyewear for a user is described in U.S. PatentApplication No. 2012/0050668 Howell et al. entitled: “Eyewear withtouch-sensitive input surface”, which is incorporated in its entiretyfor all purposes as if fully set forth herein. The eyewear includes aneyewear frame, electrical circuitry at least partially in the eyewearframe, and a touch sensitive input surface on the eyewear frameconfigured to provide an input to the electrical circuitry to perform afunction via touching the touch sensitive input surface. In anotherembodiment, the eyewear includes a switch with at least two operationalstates. The operational states of the switch can be configured to bechanged by sliding a finger across the touch sensitive input surface ofthe frame.

An example of a wearable computing device is described in U.S. PatentApplication No. 2013/0169513 to Heinrich et al. entitled: “Wearablecomputing device”, which is incorporated in its entirety for allpurposes as if fully set forth herein. The device includes a boneconduction transducer, an extension arm, a light pass hole, and aflexible touch pad input circuit. When a user wears the device, thetransducer contacts the user's head. A display is attached to a free endof an extension arm. The extension arm is pivotable such that a distancebetween the display and the user's eye is adjustable to provide thedisplay at an optimum position. The light pass hole may include a lightemitting diode and a flash. The touch pad input circuit may be adheredto at least one side arm, such that parting lines are not providedbetween edges of the circuit and the side arm.

Hash function. A hash function is any function that can be used to mapdata of arbitrary size to data of fixed size, and the values returned bya hash function are called hash values, hash codes, digests, or simplyhashes. One use is a data structure called a hash table, widely used incomputer software for rapid data lookup, where hash functions acceleratetable or database lookup by detecting duplicated records in a largefile. A cryptographic hash function allows one to easily verify thatsome input data maps to a given hash value, but if the input data isunknown, it is deliberately difficult to reconstruct it (or equivalentalternatives) by knowing the stored hash value. Hash functions mayinclude checksums, check digits, fingerprints, lossy compression,randomization functions, error-correcting codes, and ciphers. Hashfunctions are described in an article by Jun Wang, Wei Liu, SanjivKumar, and Shih-Fu Chang, Submitted on 17 Sep. 2015 to the PROCEEDINGSOF THE IEEE (http://arxiv.org/abs/1509.05472v1) entitled: “Learning toHash for Indexing Big Data—A Survey”, and in a book by Josef Pieprzykand Babak Sadeghiyan, published 1993 by Springer-Verlag [ISBN3-540-57500-6] entitled: “Design of Hashing Algorithms”, which are bothincorporated in their entirety for all purposes as if fully set forthherein. The concept of a hash table is a generalized idea of an arraywhere key does not have to be an integer. We can have a name as a key,or for that matter any object as the key. Hash functions are used inhash tables, to quickly locate a data record (e.g., a dictionarydefinition) given its search key (the headword). Specifically, the hashfunction is used to map the search key to a list; the index gives theplace in the hash table where the corresponding record should be stored.Hash tables, also, are used to implement associative arrays and dynamicsets. Typically, the domain of a hash function (the set of possiblekeys) is larger than its range (the number of different table indices),and so it will map several different keys to the same index which couldresult in collisions. So then, each slot of a hash table is associatedwith (implicitly or explicitly) a set of records, rather than a singlerecord. For this reason, each slot of a hash table is often called abucket, and hash values are also called bucket listing or a bucketindex.

Good hash functions are usually required to satisfy certain propertieslisted below. The exact requirements are dependent on the application.For example, a hash function well suited to indexing data will probablybe a poor choice for a cryptographic hash function. A hash proceduremust be deterministic—meaning that for a given input value it mustalways generate the same hash value. In other words, it must be afunction of the data to be hashed, in the mathematical sense of theterm. This requirement excludes hash functions that depend on externalvariable parameters, such as pseudo-random number generators or the timeof day. It also excludes functions that depend on the memory address ofthe object being hashed in cases that the address may change duringexecution, although sometimes rehashing of the item is possible. Thedeterminism is in the context of the reuse of the function. Further, agood hash function should map the expected inputs as evenly as possibleover its output range. That is, every hash value in the output rangeshould be generated with roughly the same probability. The reason forthis last requirement is that the cost of hashing-based methods goes upsharply as the number of collisions—pairs of inputs that are mapped tothe same hash value—increases. If some hash values are more likely tooccur than others, a larger fraction of the lookup operations will haveto search through a larger set of colliding table entries. Note thatthis criterion only requires the value to be uniformly distributed, notrandom in any sense. A good randomizing function is (barringcomputational efficiency concerns) generally a good choice as a hashfunction, but the converse need not be true. Hash tables often containonly a small subset of the valid inputs. For instance, a club membershiplist may contain only a hundred or so member names, out of the verylarge set of all possible names. In these cases, the uniformitycriterion should hold for almost all typical subsets of entries that maybe found in the table, not just for the global set of all possibleentries. When testing a hash function, the uniformity of thedistribution of hash values can be evaluated by the chi-squared test.

It is often desirable that the output of a hash function have fixedsize. If, for example, the output is constrained to 32-bit integervalues, the hash values can be used to index into an array. Such hashingis commonly used to accelerate data searches. On the other hand,cryptographic hash functions produce much larger hash values, in orderto ensure the computational complexity of brute-force inversion. Forexample, SHA-1, one of the most widely used cryptographic hashfunctions, produces a 160-bit value. Producing fixed-length output fromvariable length input can be accomplished by breaking the input datainto chunks of specific size. Hash functions used for data searches usesome arithmetic expression which iteratively processes chunks of theinput (such as the characters in a string) to produce the hash value. Incryptographic hash functions, these chunks are processed by a one-waycompression function, with the last chunk being padded if necessary. Inthis case, their size, which is called block size, is much bigger thanthe size of the hash value. For example, in SHA-1, the hash value is 160bits and the block size 512 bits.

Further, in many applications, the range of hash values may be differentfor each run of the program, or may change along the same run (forinstance, when a hash table needs to be expanded). In those situations,one needs a hash function which takes two parameters—the input data z,and the number n of allowed hash values. A common solution is to computea fixed hash function with a very large range (say, 0 to 232-1), dividethe result by n, and use the division's remainder. If n is itself apower of 2, this can be done by bit masking and bit shifting. When thisapproach is used, the hash function must be chosen so that the resulthas fairly uniform distribution between 0 and n−1, for any value of nthat may occur in the application. Depending on the function, theremainder may be uniform only for certain values of n, e.g., odd orprime numbers.

IETF RFC 4634 (dated July 2006) entitled: “US Secure Hash Algorithms(SHA and HMAC-SHA)”, which is incorporated in its entirety for allpurposes as if fully set forth herein, describes a suite of Secure HashAlgorithms (SHAs), including four beyond SHA-1, as part of a FederalInformation Processing Standard (FIPS), specifically SHA-224 (RFC 3874),SHA-256, SHA-384, and SHA-512. The purpose of this document is to makesource code performing these hash functions conveniently available tothe Internet community. The sample code supports input strings ofarbitrary bit length. SHA-1's sample code from RFC 3174 has also beenupdated to handle input strings of arbitrary bit length. Most of thetext herein was adapted by the authors from FIPS 180-2. IETF RFC 3874(dated September 2004) entitled: “A 224-bit One-way Hash Function:SHA-224”, which is incorporated in its entirety for all purposes as iffully set forth herein, describes a 224-bit one-way hash function,called SHA-224. The SHA-224 is based on SHA-256, but it uses a differentinitial value and the result is truncated to 224 bits.

A method for fetching a content from a web server to a client device isdisclosed, using tunnel devices serving as intermediate devices isdescribed in U.S. Pat. No. 9,241,044 to Shribman et al. entitled:“System and method for improving internet communication by usingintermediate nodes”, which is incorporated in its entirety for allpurposes as if fully set forth herein (hereinafter—“the '044 patent”).The client device accesses an acceleration server to receive a list ofavailable tunnel devices. The requested content is partitioned intoslices, and the client device sends a request for the slices to theavailable tunnel devices. The tunnel devices in turn fetch the slicesfrom the data server, and send the slices to the client device, wherethe content is reconstructed from the received slices. A client devicemay also serve as a tunnel device, serving as an intermediate device toother client devices. Similarly, a tunnel device may also serve as aclient device for fetching content from a data server. The selection oftunnel devices to be used by a client device may be in the accelerationserver, in the client device, or in both. The partition into slices maybe overlapping or non-overlapping, and the same slice (or the wholecontent) may be fetched via multiple tunnel devices.

In one example, the '044 patent describes an accessing to a data serveris improved by using an intermediate device referred to as a ‘tunnel’device that is executing a ‘tunnel’ flowchart. FIG. 5 shows a system 50including two client devices, a client device #1 31 a and a clientdevice #2 31 b, that may access the web servers (data servers) 22 a and22 b using one or more of a tunnel device #1 33 a, a tunnel device #2 33b, and a tunnel device #3 33 c, under the management and control of anacceleration server 32. These network elements communicate with eachother using the Internet 113.

A schematic messaging flow diagram 60 according to the '044 patentdescribing the client device #1 31 a related ‘content fetch’ flowchartand the tunnel device #1 33 a related flowchart is shown in FIG. 6 . A‘Content Request’ message 61 a is first sent from the client device #131 a to the selected tunnel device #1 33 a, which responds by forwardingthe request to the data server #1 22 a using a ‘Content Request’ message61 b. In turn the data server #1 22 a replies and sends the content in a‘Send Content’ message 61 c to the requesting tunnel device #1 33 a,which in turn forward the fetched content to the asking client device #131 a using a ‘Send Content’ message 61 d.

While accessing the data server #1 22 a was exampled above using thetunnel device #1 33 a as an intermediary device, the system and theclient #1 31 a may use multiple tunnel devices in order to fetch thecontent from the same data server #1 22 a. Two, three, four, or anyother number of tunnel devices, serving as intermediary devices havingthe same or similar role as the tunnel device #1 33 a, may be equallyused. In one example, three tunnel devices may be used, such as addingthe tunnel device #2 33 b and the tunnel device #3 33 c, shown in system50 in FIG. 5 .

In one example, three distinct data paths may be involved in the contentfetching. In addition to the messaging data path 60, a messaging flow 60a shown in FIG. 6 a describes the usage of the tunnel device #2 33 b asan intermediary device, relating to the client device #1 31 a ‘contentfetch’ related flowchart and the tunnel device #2 33 b relatedflowchart. A ‘Content Request’ message 62 a is first sent from theclient device #1 31 a to the selected tunnel device #2 33 b, whichresponds by forwarding the request to the data server #1 22 a using a‘Content Request’ message 62 b. In turn the data server #1 22 a repliesand sends the content in a ‘Send Content’ message 62 c to the requestingtunnel device #2 33 b, which in turn forward the fetched content to theasking client device #1 31 a using a ‘Send Content’ message 62 d.Similarly, a messaging flow 60 b shown in FIG. 6 b describes the usageof the tunnel device #3 33 c as an intermediary device, relating to theclient device #1 31 a associated with ‘content fetch’ in the respectiveflowchart and with the tunnel device #3 33 c in the flowchart. The‘Content Request’ message 65 a is first sent from the client device #131 a to the selected tunnel device #3 33 c, which responds by forwardingthe request to the data server #1 22 a using the ‘Content Request’message 65 b. In turn the data server #1 22 a replies and sends thecontent in the ‘Send Content’ message 65 c to the requesting tunneldevice #3 33 c, which in turn forward the fetched content to the askingclient device #1 31 a using the ‘Send Content’ message 65 d.

A system and a method for media streaming from multiple sources aredisclosed in U.S. Patent Application Publication No. 2016/0337426 toShribman et al. entitled: “System and Method for Streaming Content fromMultiple Servers”, which is incorporated in its entirety for allpurposes as if fully set forth herein. A content requesting clientdevice accesses a server to receive a list of available sources that mayinclude multiple Content Delivery Networks (CDNs) and independentservers. Based on a pre-set criteria, such as the source deliveryperformance and cost, the client device partitions the content intoparts, allocates a source to each part, and simultaneously receivesmedia streams of the content parts from the allocated sources. Theserver may be a Video-on-Demand (VOD) server, and the content may be asingle file of a video data, such as a movie. The delivery performanceof the used sources is measured during the streaming for updating thepartition or the allocation. The updated measured performance may bestored locally at the client device, or at a server for use by otherclients. The client actions may be implemented as a client-side script.

A method for fetching a content from a web server to a client deviceusing tunnel devices serving as intermediate devices is disclosed inPatent Cooperation Treaty (PCT) Publication WO 2019/043687 to Shribmanet al., entitled: “System and Method for Improving Content Fetching bySelecting Tunnel Devices”, which is incorporated in its entirety for allpurposes as if fully set forth herein. The tunnel device is selectedbased on an attribute, such as IP Geolocation. A tunnel bank serverstores a list of available tunnels that may be used, associated withvalues of various attribute types. The tunnel devices initiatecommunication with the tunnel bank server, and stays connected to it,for allowing a communication session initiated by the tunnel bankserver. Upon receiving a request from a client to a content and forspecific attribute types and values, a tunnel is selected by the tunnelbank server, and is used as a tunnel for retrieving the required contentfrom the web server, using standard protocol such as SOCKS, Web Socketor HTTP Proxy. The client only communicates with a super proxy serverthat manages the content fetching scheme.

An aggregation or combination of Content or Application DeliveryNetworks is described in U.S. Pat. No. 9,378,473 to Wolfe entitled:“Content and application delivery network aggregation”, which isincorporated in its entirety for all purposes as if fully set forthherein. The aggregation or combination is used to improve quality ofservice, including the delivery of content and media on a city, state,country and international basis. The aggregation is formed by combiningmultiple CDNs or ADNs so that a larger server and network footprint iscreated. The benefits of each CDN or ADN are aggregated to produce abetter CDN/ADN service to the customer and end users.

Systems and techniques for transparently intercepting and optimizingresource requests are described in U.S. Patent Application PublicationNo. 2015/0163087 to Conner et al. entitled: “Transparently interceptingand optimizing resource requests”, which is incorporated in its entiretyfor all purposes as if fully set forth herein. Some embodiments can senda request to a server. In response to the request, the embodiments canreceive a first script and at least a second script from the server,wherein the first script includes instructions for interceptinginvocations to a set of functions, and wherein the second scriptincludes at least one invocation to at least one function in the set offunctions. The first script can then be executed, thereby causingsubsequent invocations to each function in the set of functions to beintercepted by a corresponding resource optimization handler. Next, thesecond script can be executed. When the executing second script invokesa function in the set of functions, the invocation of the function canbe intercepted, and a resource optimization handler corresponding to thefunction can be invoked instead of invoking the function.

Web page. A web page (a.k.a. webpage) is a document that acts as a webresource on the World Wide Web. A web browser is typically used toretrieve and display web pages from the Internet, such as from a remoteweb server, by using Hypertext Transfer Protocol (HTTP) to make suchrequests to the web server. Typical web pages are hypertext documentsthat contain hyperlinks for browsing to other web pages. While the termweb page usually refers to what is visible, but may also refer to thecontents of the source code itself, which is usually a text filecontaining hypertext written in HTML or a comparable markup language.Most desktop web browsers include the ability to view the source code,but this ability may be missing or hidden on mobile browsers. Webbrowsers will frequently have to access multiple web resource elements,such as style sheets, scripts, and images, while presenting each webpage.

A website will typically contain a group of web pages that are linkedtogether, or have some other coherent method of navigation. The mostimportant web page on a website is the index page. Depending on the webserver settings, the index page can have any name, but the most commonnames are index.html and index.php. When a browser visits the homepageof a website or any URL pointing to a directory rather than a specificfile, the web server serves the index page. A static web page isdelivered exactly as stored, as HTML-formatted web content in the webserver's file system. In contrast, a dynamic web page is generated by aweb application, driven by server-side software, running on theclient-side (on the web browser), or both. Dynamic web pages help thebrowser (the client) to enhance the web page through user input to theserver.

As an information set, a web page typically contains numerous types ofinformation that may be visible, heard, or interacted with, by the enduser. Such perceived information may include textual information (withdiverse rendering variations), as well as non-textual information.Non-textual information may include static images (such as rastergraphics, typically JPEG, GIF, or PNG; or vector formats such as SVG orFlash), animated images (typically Animated GIF and SVG, but also Flash,Shockwave, or Java applet), audio (typically MP3, Ogg or variousproprietary formats), and video (such as in WMV (Windows), RM(RealMedia), FLV (Flash Video), MPG, or MOV (QuickTime) formats).Interactive information may include Interactive text (such as DHTML),interactive illustrations (that may range from “click to play” images togames, typically using script orchestration, Flash, Java applets, SVG,or Shockwave). Other interactive information may include buttons, whichare forms providing an alternative interface, typically for use withscript orchestration and DHTML, Hyperlinks, and forms. Internal,typically hidden, information may include Linked Files through Hyperlink(such as DOC, XLS, PDF, etc.), metadata (such as semanticmeta-information, Charset information, or Document Type Definition(DTD), Diagrammatic and style information (such as information aboutrendered items (like image size attributes) and visual specifications,as Cascading Style Sheets (CSS), and Scripts (usually JavaScript,complement interactivity, and functionality).

A static web page (sometimes called a flat page or a stationary page) isa web page that is delivered to the user's web browser exactly as storedin the web servers filesystem. Dynamic web pages are generated by a webapplication, typically drawing from a database to fill out a webtemplate, then delivering the constructed page to the user's browser. Aserver-side dynamic web page is a web page whose construction iscontrolled by an application server processing server-side scripts. Inserver-side scripting, parameters determine how the assembly of everynew web page proceeds, including the setting up of more client-sideprocessing. A client-side dynamic web page processes the web page usingHTML scripting running in the browser as it loads. JavaScript and otherscripting languages determine the way the HTML in the received page isparsed into the Document Object Model (DOM), which represents the loadedweb page. The same client-side techniques can then dynamically update orchange the DOM in the same way.

A dynamic web page is reloaded by the user or by a computer program tochange some variable content. The updating information could come fromthe server, or from changes made to that page's DOM. This may or may nottruncate the browsing history or create a saved version to go back to,but a dynamic web page update using Ajax technologies will neithercreate a page to go back to, nor truncate the web browsing historyforward of the displayed page. Using Ajax technologies the end user getsone dynamic page managed as a single page in the web browser while theactual web content rendered on that page can vary. The Ajax engine sitsonly on the browser requesting parts of its DOM, the DOM, for itsclient, from an application server.

Geolocation. IP-based geolocation (commonly known as geolocation) is amapping of an IP address (or MAC address) to the real-world geographiclocation of a computing device or a mobile device connected to theInternet. The IP address based location data may include informationsuch as country, region, city, postal/zip code, latitude, longitude, orTimezone. Deeper data sets can determine other parameters such as domainname, connection speed, ISP, language, proxies, company name, USDMA/MSA, NAICS codes, and home/business classification. The geolocationis further described in the publication entitled: “Towards Street—LevelClient-Independent IP Geolocation” by Yong Wang et al., downloaded fromthe Internet on July 2014, and in an Information Systems Audit andControl Association (ISACA) 2011 white-paper entitled: “Geolocation:Risk, Issues and Strategies”, which are both incorporated in theirentirety for all purposes as if fully set forth herein. There are anumber of commercially available geolocation databases, such as aweb-site http://www.ip2location.com operated by Ip2location.comheadquartered in Penang, Malaysia, offering IP geolocation softwareapplications, and geolocation databases may be obtained from IpInfoDBoperating web-site http://ipinfodb.com, and by Max Mind, Inc., based inWaltham, Mass., U.S.A, operating the web-sitehttps://www.maxmind.com/en/home. Determining the geographic location ofInternet hosts is described in an article published January 2007 by DoxaChatzopoulou and Marios Kokkodis, both of Computer Science andEngineering Department, UC Riverside, entitled: “IP Geolocation”, whichis incorporated in its entirety for all purposes as if fully set forthherein. Various techniques of IP geolocation are described in an article(ISSN: 0975-9646, downloaded from the Internet August 2017) byJayaprabha Bendale and Prof. J. Ratanaraj Kumar, both of G.S. MozeCollege of Engineering, Balewadi, Pune-45, University Of Pune, Pune,India, published in (IJCSIT) International Journal of Computer Scienceand Information Technologies, Vol. 5 (1), 2014, 436-440 and entitled:“Review of Different IP Geolocation Methods and Concepts”, which isincorporated in its entirety for all purposes as if fully set forthherein.

Further, the W3C Geolocation API is an effort by the World Wide WebConsortium (W3C) to standardize an interface to retrieve thegeographical location information for a client-side device. It defines aset of objects, ECMA Script standard compliant, that executing in theclient application give the client's device location through theconsulting of Location Information Servers, which are transparent forthe Application Programming Interface (API). The most common sources oflocation information are IP address, Wi-Fi and Bluetooth MAC address,radio-frequency identification (RFID), Wi-Fi connection location, ordevice Global Positioning System (GPS) and GSM/CDMA cell IDs. Thelocation is returned with a given accuracy depending on the bestlocation information source available. The W3C Recommendation for thegeolocation API specifications draft dated Oct. 24, 2013, is availablefrom the web-sitehttp://www.w3.org/TR/2013/REC-geolocation-API-20131024.Geolocation-based addressing is described in U.S. Pat. No. 7,929,535 toChen et al., entitled: “Geolocation-based Addressing Method for IPv6Addresses”, and in U.S. Pat. No. 6,236,652 to Preston et al., entitled:“Geo-spacial Internet Protocol Addressing”, and in U.S. PatentApplication Publication No. 2005/0018645 to Mustonen et al., entitled:“Utilization of Geographic Location Information in IP Addressing”, whichare all incorporated in their entirety for all purposes as if fully setforth herein.

Methods and systems for geolocation routing and simulation of networkconditions are disclosed in U.S. Pat. No. 9,660,895 Bennett entitled:“Geolocation routing and simulation of network conditions”, which isincorporated in its entirety for all purposes as if fully set forthherein. A network traffic profile is determined for a client device. Anetwork access server selects an endpoint server based on the locationof the selected endpoint server. The network access server routestraffic from the client device to an external server through theselected endpoint server. The network traffic from the client device tothe external server appears to originate from a network address of theselected endpoint server. Network conditions for the network traffic aresimulated based on the network traffic profile.

Techniques for anonymous Internet access are presented in U.S. Pat. No.8,302,161 to Burch et al. entitled: “Techniques for anonymous internetaccess”, which is incorporated in its entirety for all purposes as iffully set forth herein. Internet requests are intercepted within afirewalled environment before being routed over the Internet todestination sites. Each Internet requests is evaluated in view of policyand one or more anonymizers are selected in response to that evaluation.The Internet requests are then routed through the appropriateanonymizers for processing to the destination sites. A relationshipbetween an Internet Protocol (IP) address associated with the firewalledenvironment and IP addresses of the destination sites is masked andhidden via the anonymizers from Internet observers. Moreover, a securecommunication between the firewalled environment and the anonymizers ismaintained.

A method and apparatus for selectively using an anonymous proxy aredisclosed in U.S. Pat. No. 8,301,787 to Li entitled: “Selective use ofanonymous proxies”, which is incorporated in its entirety for allpurposes as if fully set forth herein. A user request for content isreceived. A determination is made as to whether the user requestsatisfies context criteria. When the user request satisfies the contextcriteria, the user request is forwarded to an anonymous proxy. When theuser request does not satisfy the context criteria, the request is sentdirectly to a content provider.

For use with a network having server sites capable of being browsed byusers based on identifiers received into the server sites and personalto the users, alternative proxy systems for providing substituteidentifiers to the server sites that allow the users to browse theserver sites anonymously via the proxy system, are presented in U.S.Pat. No. 5,961,593 to Gabber et al. entitled: “System and method forproviding anonymous personalized browsing by a proxy system in anetwork”, which is incorporated in its entirety for all purposes as iffully set forth herein. A central proxy system includescomputer-executable routines that process site-specific substituteidentifiers constructed from data specific to the users, that transmitsthe substitute identifiers to the server sites, that retransmitsbrowsing commands received from the users to the server sites, and thatremoves portions of the browsing commands that would identify the usersto the server sites. The foregoing functionality is performedconsistently by the central proxy system during subsequent visits to agiven server site as the same site specific substitute identifiers arereused. Consistent use of the site specific substitute identifiersenables the server site to recognize a returning user and, possibly,provide personalized service.

A device that receives, from a client device, a request for a resource,where the request provides an identifier of the client device, ispresented in U.S. Pat. No. 8,504,723 to Kohli entitled: “Routing proxyfor resource requests and resources”, which is incorporated in itsentirety for all purposes as if fully set forth herein. The deviceselects a target device for the resource, connects with the selectedtarget device, and provides a proxy of the request to the selectedtarget device, where the proxy of the request hides the identifier ofthe client device. The device receives the resource from the selectedtarget device, where the resource provides an identifier of the targetdevice. The device provides a proxy of the resource to the clientdevice, where the proxy of the resource hides the identifier of thetarget device.

A content distributing device that receives a request message to requestto transmit content is disclosed in in U.S. Patent ApplicationPublication No. 2013/0117413 to Kaneko et al. entitled: “Contentdistribution device, content playback device, content distributionsystem, method for controlling a content distribution device, controlprogram, and recording medium”, which is incorporated in its entiretyfor all purposes as if fully set forth herein. Then, in a case where adevice transmitted the request message is a relaying device forreceiving the content thus requested and possessing and transferring thecontent to another device, the content distributing device transmits thecontent thus requested to the relaying device, or, in a case where adevice transmitted the request message is a content playing device forplaying the content thus requested, the content distributing devicetransmits, to the content playing device, an instruction to acquire thecontent from a relaying device which has transmitted before the contentthus requested.

Various information object repository selection procedures fordetermining which of a number of information object repositories shouldservice a request for the information object are described in U.S. Pat.No. 7,565,450 to Garcia-Luna-Aceves et al. entitled: “System and methodfor using a mapping between client addresses and addresses of caches tosupport content delivery”, which is incorporated in its entirety for allpurposes as if fully set forth herein. The selection procedures includea direct cache selection process, a redirect cache selection process, aremote DNS cache selection process, or a local DNS cache selectionprocess. Different combinations of these procedures may also be used.For example different combination may be used depending on the type ofcontent being requested. The direct cache selection process may be usedfor information objects that will be immediately loaded without useraction, while any of the redirect cache selection process, the remoteDNS cache selection process and/or the local DNS cache selection processmay be used for information objects that will be loaded only after someuser action.

A client device that establishes a first tunnel connection or tunnel isdescribed in U.S. Pat. No. 7,673,048 to O'toole et al. entitled:“Methods and apparatus for establishing a computerized device tunnelconnection”, which is incorporated in its entirety for all purposes asif fully set forth herein. The client device establishes the firsttunnel connection or tunnel through a public network, with a firstgateway of a private network and establishes, through the tunnelconnection, a data connection with a destination device within theprivate network. The first gateway monitors or analyzes the geographiclocations of the gateways associated with the private network relativeto geographic location of the destination device associated with thedata connection. Based upon such the monitoring, the first gatewaytransmits information to the client device relating to establishment ofa second tunnel connection or tunnel with a second gateway of theprivate network. The client device establishes the second tunnelconnection with the second gateway and establishes a data connectionwith the destination device through the second gateway. By establishingthe second tunnel connection with the second gateway, the client deviceutilizes the bandwidth of the public network to exchange data with thedestination device, thereby decreasing data transmission costs to theprivate network and decreasing private network latency.

Embodiments of a peer-to-peer-based content sharing/distribution network(CDN) are described in U.S. Pat. No. 7,783,777 to Pabla et al. entitled:“Peer-to-peer content sharing/distribution networks”, which isincorporated in its entirety for all purposes as if fully set forthherein. In the embodiments, some peers are content publishers whileother peers are content consumers. When a consumer peer gets contentfrom a content publisher, the consumer peer may become a contentpublisher that may be accessed by other peers. If a peer desires aparticular content, the peer may get the content from a nearby contentpublisher, saving access to a central server. The more a content is indemand, the more likely it is to be replicated, and hence more likely tobe found by consumer peers on nearby content publisher peers. If acontent publisher peer does not have all of a requested content, therequesting peer may be redirected to another content publisher peer toobtain the missing content. Embodiments may be implemented inpeer-to-peer networks implemented according to a peer-to-peer platform.

A method of discovering a community relay node within a networkcommunity is described in U.S. Pat. No. 7,788,378 to Rao et al.entitled: “Apparatus and method for community relay node discovery”,which is incorporated in its entirety for all purposes as if fully setforth herein. In the method, the community relay node is operativelycoupled to an access-protected client and adapted to facilitatecommunication between the access-protected client and a requestingclient, includes receiving a request message from a requesting clientrelating to a request for a community relay node, associating therequest message with a serverless name resolution protocol name,selecting a community relay node from among a list of community relaynodes based on the serverless name resolution protocol name, wherein thelist of community relay nodes comprises at least one internet protocoladdress associated with a community relay node, and returning aninternet protocol address of the selected community relay node to therequesting client.

A method for reconstructing torrent content metadata, i.e. a torrentidentifier, a segment length and an amount of segments of a torrentcontent file, without access to the torrent content metafile, isdescribed in U.S. Pat. No. 8,719,430 to Van Ackere et al. entitled:“Method and device for reconstructing torrent content metadata”, whichis incorporated in its entirety for all purposes as if fully set forthherein. The method comprises the steps of: A. obtaining the torrentcontent identifier from torrent signaling from a client; B. obtaining atorrent content file size from the torrent signaling from the client; C.obtaining a tracker address from the torrent signaling from the client:D. obtaining a peer address from a tracker; E. contacting a peer via thepeer address; F. downloading sequential minimum size blocks of a fullsize segment from the peer in order to determine the segment length; G.calculating the amount of segments from the torrent content file sizeand the segment length.

A peer-to-peer communication system, in which a peer communicating witha tracker node on a local torrent can locate and download files that arenot currently available from other peers communicating on the localtorrent, is described in U.S. Pat. No. 8,838,811 to Chen et al.entitled: “Method and system for scalable content storage and delivery”,which is incorporated in its entirety for all purposes as if fully setforth herein. To enable this, the tracker node maintains collaborationinformation for a list of files. The collaboration information includes,for each file, a list of locations at which a full copy of the file maybe located. The list of locations may include active peers, dormantpeers and remote tracker nodes. The collaboration information may beobtained from each peer when it joins a local torrent. Upon joining thetorrent, the peer may provide the local tracker node with a list offiles that it is willing to serve.

Methods and systems for providing items of content over a peer-to-peersystem are described in U.S. Pat. No. 8,639,630 to Fomenko et al.entitled: “Distribution of digital content”, which is incorporated inits entirety for all purposes as if fully set forth herein. Items ofcontent are requested from a central server by a downloading peer, andthe central server determines uploading peers from whom the downloadingpeer may request parts of the content item.

A server application that is interconnected with a number of client/peerterminals, as part of an IMS network, is described in U.S. PatentApplication Publication No. 2008/0109446 to Wang entitled: “Peer-to-peerfile download system for IMS network”, which is incorporated in itsentirety for all purposes as if fully set forth herein. For peer-to-peertransfer of a selected data file, a client terminal establishes andaccesses a secure account on the server application. From the serverapplication, the client terminal obtains the network locations of one ormore peer terminals having sections/pieces of the data file storedthereon. The client terminal contacts the peer terminals for obtainingthe data file sections there from over the IMS network. The clientterminal and/or peer terminals transmit accounting data to the serverapplication through secure accounts. The accounting data relates to theamount of data transferred and/or to the data transfer rate, and may beused for billing purposes

A method for directing a client to a content server containing desiredcontent by providing the client with an address shared by a plurality ofcontent servers, each of which has a copy of the desired content, isdescribed in U.S. Patent Application Publication No. 2002/0091760 toRozen entitled: “Distributed selection of a content server”, which isincorporated in its entirety for all purposes as if fully set forthherein. The client is then served from an optimal, or closest availablecontent server selected from the plurality of content servers. Thisoptimal content server is selected on the basis of an optimal path fromthe client to the shared address.

A computer program product includes instructions that when executed by aprocessor perform a method for providing content in a network isdescribed in U.S. Patent Application Publication No. 2009/0248793 toJacobsson et al. entitled: “Providing Content In a Network”, which isincorporated in its entirety for all purposes as if fully set forthherein. The method includes receiving an identifier that is forwardedfrom a device in a network and associated with content divided intocontent portions that are to be delivered to the device. The methodincludes selecting a content source in the network for each of therespective content portions, wherein for at least one of the contentportions the content source is selected among multiple content sourcesassociated with the respective content portion using recordedinformation about the multiple content sources. The method includesforwarding, in response to the identifier, source information to thedevice that identifies each selected content source and is configuredfor use by the device in requesting at least one of the multiple contentportions from each selected content source.

Methods and apparatus for cooperative file distribution system employingone or more storage proxies to allow an offline receiver to obtain filesor pieces thereof when the receiver comes online are provided in U.S.Patent Application Publication No. 2006/0224687 to Popkin et al.entitled: “Method and apparatus for offline cooperative filedistribution using cache nodes”, which is incorporated in its entiretyfor all purposes as if fully set forth herein. A central trackerreceives an indication from the sender that the sender has the file;determines if the receiver is online; and initiates a storage of thefile on one or more storage proxies if the receiver is not online. Aproxy service can identify one or more potential storage proxies thatcan store the file and that each satisfy one or more predefined resourcecriteria. The sender can send a request to one or more of the storageproxies from the list of storage proxies to act as a storage proxy forthe communication between the sender and the receiver. The potentialstorage proxies compare one or more resource measures to predefinedcriteria; and provide an acceptance if the one or more resource measuressatisfy the predefined criteria.

Computer-based methods and apparatuses, including computer programproducts, for policy-based content insertion are described in U.S.Patent Application Publication No. 2009/0182843 to Hluchyj et al.entitled: “Policy-Based Content Insertion”, which is incorporated in itsentirety for all purposes as if fully set forth herein. A client devicetransmits to a content server a request for the delivery of content. Thecontent server modifies the request based on an ingress policy. Thecontent server transmits the modified request to a second server wherethe second server processes the request. The second server transmits areply to the modified request to the content server. The reply includesa content insertion instruction. The content server transmits thecontent to the client device based on the content insertion instructionand/or one or more egress policies.

A system and method for efficient and private peer-to-peer file sharingconsists of ascribing a uniquely identified and anonymous link (an“edgelink”) to any file or set of files on a peer computer, aredescribed in U.S. Patent Application Publication No. 2011/0035503 toZaid et al. entitled: “System and Method for Anonymous Addressing ofContent on Network Peers and for Private Peer-to-Peer File Sharing”,which is incorporated in its entirety for all purposes as if fully setforth herein. The link is registered with a publishing server along withcontinuously updated connectivity information about the peer withoutregistering any identifying information about the file. A peer recipientis able to access the link, receive connectivity information about thepublishing peer from the server, and then receive the file from thepublishing peer without file content passing through the server,mediating any intermediary NAT devices without requiring any manual orautomatic device reconfiguration.

A method, system and corresponding device for load balancing aredescribed in U.S. Patent Application Publication No. 2013/0007253 to Liet al. entitled: “Method, system and corresponding device for loadbalancing”, which is incorporated in its entirety for all purposes as iffully set forth herein. The present invention involves in a computerapplication, and solves the technical problems due to the introductionof more mechanism in the prior art. The method of the present inventionmainly includes acquiring by a peer address information of at least oneSN from a BSSN, both the BSSN and SN belong to an overlay network; ifthe peer is a server, saving by the server the address information andreporting by the server server information to a SN corresponding to oneof the address information, and spreading by the SN the serverinformation to other SNs; if the peer is a client, saving by the clientthe address information and acquiring by the client the serverinformation from a SN corresponding to the one of the addressinformation and saving the server information.

Techniques for obtaining and providing a portion of content includereceiving a request for the portion of the content, requesting andreceiving one or more data chunks, processing the one or more datachunks, and providing one or more data blocks as the requested portionof the content, are described in U.S. Patent Application Publication No.2013/0064370 to Gouge et al. entitled: “Distribution of portions ofcontent”, which is incorporated in its entirety for all purposes as iffully set forth herein. The processing may include validating,decrypting, and/or decompressing the one or more data chunks to createthe one or more data blocks. Techniques for providing metadata and oneor more data chunks may include receiving content and dividing thecontent into data blocks. Processing may then be performed on the datablocks to create data chunks, and the metadata may be generated from theprocessing. The metadata and one or more of the data chunks may beprovided to a device.

A method, a device, a server and a system of/for peer to peer transferof content are described in U.S. Pat. No. 7,574,515 to Fontijn et al.entitled: “Peer to peer transfer of content”, which is incorporated inits entirety for all purposes as if fully set forth herein. the methodincludes the steps of receiving and transmitting, from a first device(11), a first request with a first selection criterion for a firstcontent to a server (18) or to a second device (12); transferring thefirst content satisfying the first selection criterion to the firstdevice from the server, when the server previously has acknowledged thefirst device as a legal recipient of the first content and in case thefirst content is available only on the server, and noting that the firstdevice subsequently has the requested first content available for otherdevices (14, 15, 16, 17); or re-directing the first request to a thirddevice (13) on which the server knows that the requested first contentis still available and transferring the first content satisfying thefirst selection criterion to the first device from the third device; ortransferring the first content satisfying the first selection criterionto the first device from the second device, when the first content isavailable on the second device, and informing the server that the firstcontent has been transferred to the first device from the second device;and rewarding the one of the second or third device from which the firstcontent was transferred to the first device, when content wastransferred from one of these; and charging the first device forreception of the first content. This enables for download, upload andsharing of legally protected paid-for content.

A method for providing content to a remotely located electronic deviceis described in U.S. Patent Application Publication No. 2007/0142036 toWikman et al. entitled: “Provision of content in mobile environments”,which is incorporated in its entirety for all purposes as if fully setforth herein. The device may be connectable to the Internet, and may beaccessing content on a device (e.g. an Internet server) located near amobile intermediate device by using the mobile intermediate device(another Internet server) as a “through conduit”. The intermediatedevice detects other devices in its proximity, lists the detecteddevices, detects a request to access at least one of the listed Internetservers, and forwards the access request to the listed Internet serversto be accessed. The remote device does not need to know the originalcontent address.

Communicating in a peer-to-peer computer environment is described inU.S. Patent Application Publication No. 2011/0066924 to DORSO et al.entitled: “Communicating in a computer environment”, which isincorporated in its entirety for all purposes as if fully set forthherein. A tracker peer is contacted and a list of peer nodes areobtained at a user device. A subset of peer nodes are selected from thelist of peer nodes to act as relay nodes for a communication. Anappropriate compression scheme is selected for the communication at theuser device. Data is transmitted to at least one relay node for the atleast one relay node to forward to at least one other user device,wherein the relay node is one of the subset of the peer nodes. Data isreceived at the user device from the at least one relay node forwardedfrom the at least one other user.

Dynamic Adaptive Streaming over HTTP (DASH) is intended to support amedia-streaming model for delivery of media content in which controllies exclusively with the client. Clients may request data using theHTTP protocol from standard web servers that have no DASH-specificcapabilities. Consequently, this standard focuses not on client orserver procedures but on the data formats used to provide a DASH MediaPresentation. ISO/IEC 23009-1:2012(E), MPEG-DASH standard, Jan. 5, 2012,entitled: “Information technology—Dynamic adaptive streaming over HTTP(DASH) —Part 1: Media presentation description and segment formats”,which is incorporated in its entirety for all purposes as if fully setforth herein, primarily specifies formats for the Media PresentationDescription and Segments for dynamic adaptive streaming delivery of MPEGmedia over HTTP, and is applicable to streaming services over theInternet.

Standard terminology and the taxonomy of web replication and cachinginfrastructure as deployed is disclosed in IETF RFC 3040 entitled:“Internet Web Replication and Caching Taxonomy” to Cooper et al.(January 2001), which is incorporated in its entirety for all purposesas if fully set forth herein. IETF RFC 3040 introduces standardconcepts, and protocols used today within this application domain.Currently deployed solutions employing these technologies are presentedto establish a standard taxonomy. This document presents open protocolsand points to published material for each protocol.

An address of an information object repository that should service aclient request for an information object and is returned in response toa request therefor is described in U.S. Pat. No. 7,162,539 toGarcia-Luna-Aceves et al. entitled: “System and method for discoveringinformation objects and information object repositories in computernetworks”, which is incorporated in its entirety for all purposes as iffully set forth herein. The address of the information object repositorythat is returned is selected according to specified performance metricsregardless of whether or not the information object repository maintainsa local copy of the information object that is the client request. Insome cases, the address of the information object repository is furtherselected according to an address of a client making the client request.Further, the address of the information object repository is selectedfrom a number of addresses of information object repositories. Thespecified performance metrics may include one or more of an averagedelay from the information object repository to the client, averageprocessing delays at the information object repository, reliability of apath from the information object repository to the client, availablebandwidth in the path, and loads on the information object repository.In some cases, the information object repository may be instructed toobtain a copy of the information object after the address of theinformation object repository is returned in response to the requesttherefore.

A method and system for accelerating downloading and displaying ofcontent in web pages in a peer-to-peer network is described in U.S.Patent Application Publication No. 2006/0212584 to Yu et al. entitled:“Method and system for accelerating downloading of web page content by apeer-to-peer network”, which is incorporated in its entirety for allpurposes as if fully set forth herein. A peer-to-peer network clientcaptures a download request from a web browser, and submits a query thatincludes an identifier of the file to an indexing server. Thepeer-to-peer network client receives a peer list including connectivityinformation of a peer node that has stored at least a portion of thefile content. The peer-to-peer network client then connects with thepeer node, and downloads the portion from the peer node. Thepeer-to-peer client conveys the downloaded portion to the web browser.

A system and a method for automatically collecting content, is describedin U.S. Patent Application Publication No. 2015/0206176 to Toval et al.entitled: “Behavioral content discovery”, which is incorporated in itsentirety for all purposes as if fully set forth herein. The methodcomprising the steps of: defining a plurality of content sites, creatinga collection of virtual agents data, including user characteristic dataand user behavioral data, presenting the collection of virtual agents tothe plurality of content sites receiving content from the visitedinteract site; and storing the received content or presenting it to auser.

A method and a system for monitoring an advertisement presented within amobile application is described in U.S. Patent Application PublicationNo. 2017/0221092 to Toval et al. entitled: “System and a method forsurveying advertisements in mobile applications”, which is incorporatedin its entirety for all purposes as if fully set forth herein. Themethod including tracing in real-time executable code of the mobileapplication that processes an advertisement. Where this traced processof advertisement performs: negotiating advertisement display,communicating an advertisement, and displaying an advertisement. Thesystem then detects within the process of advertisement an advertisementprocessed by the executable code. The system then records theadvertisement as displayed, and parameters associated with theadvertisement.

Facilitating browser access to cached content available from a peer topeer network is described in U.S. Patent Application Publication No.2013/0191456 to Ting et al. entitled: “Peer to peer browser contentcaching”, which is incorporated in its entirety for all purposes as iffully set forth herein. The facilitating comprises receiving a requestfor content from a content server, receiving from the content servercontent metadata indicating that the requested content is available fromat least one alternative user computing device via a peer to peernetwork, instantiating on the user computing device a browser helperapplication which facilitates access to the peer to peer network, andreceiving from the content server a lookup table comprising a list ofalternative user computing devices from which the requested content isavailable. The lookup table can be parsed to select an alternative usercomputing device from which the content, or portions thereof, isrequested. The received content can then be stored for later use orpresented to the user via the browser.

A method and apparatus for peer-to-peer services are described in U.S.Pat. No. 7,440,994 to Harrow et al. entitled: “Method and apparatus forpeer-to-peer services to shift network traffic to allow for an efficienttransfer of information between devices via prioritized list”, which isincorporated in its entirety for all purposes as if fully set forthherein.

A method and apparatus for peer-to-peer services are described in U.S.Pat. No. 7,562,112 to Harrow et al. entitled: “Method and apparatus forpeer-to-peer services for efficient transfer of information betweennetworks”, which is incorporated in its entirety for all purposes as iffully set forth herein. In one embodiment, a request for data isreceived from a first local device. A determination of a second localdevice having the data is made. The first local device is directed tothe second local device to directly obtain the data from the secondlocal device. A direct transfer of the data from the second local deviceto the first local device is performed.

In consideration of the foregoing, it would be an advancement in the artto provide an improved functionality method and system that is simple,secure, anonymous, cost-effective, load balanced, redundant, optimized,reliable, provide lower CPU and/or memory usage, enable pipelining ofrequests and responses, reduce network congestion, easy to use, reducelatency, faster, has a minimum part count, minimum hardware, and/or usesexisting and available components, protocols, programs and applications,for providing better quality of service, overload avoidance, better oroptimal resources allocation and using, better communication andadditional functionalities, and provides a better user experience, inparticular when fetching content by a client device from a web serverover the Internet.

Alternatively or in addition, it would be an advancement in the art toprovide an improved functionality method and system for web crawling,Search engine optimization (SEO), search engine data scraping, adverification, price comparisons, business or market intelligence, bigdata, classified posting, social media, and other related tasks.

SUMMARY Relay Claims

A method may be used for fetching a content over the Internet by aclient device using a first device. Any content herein may be stored ina web server and may be identified by a Uniform Resource Locator (URL).Any method herein may comprise: receiving, by the first device from theclient device, a URL request; fetching N times, wherein N>1 or N=1, bythe first device from the web server, a first response, until the firstresponse may be determined to be a proper response. Each one of the Ntimes fetchings may comprise sending, by the first device to the webserver, a first message that comprises the URL request; receiving, bythe first device from the web server, the first response in response tothe sending of the first message to the web server; and checking anddetermining whether the first response is a proper response thatcomprises the content. Amy method herein may further comprise,responsive to determining that the first response is a proper response,sending, by the first device to the client device, the content; andresponsive to determining that the first response is not a properresponse, sending, by the first device to the client device, an errormessage. The number N may be equal to, or more than, 1, 2, 3, 4, 5, 7,10, 15, 20, 25, 30, 40, 50, or 100. Alternatively or in addition, thenumber N may be less than 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50,100, 150, or 200.

Any communication herein, such as over the Internet between the clientdevice and the first device, or between the first device and the webserver, may be based on, may use, or may be compatible with, HypertextTransfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS)protocol or connection. Any client device herein may serve as an HTTP orHTTPS client, and any first device herein may serve as an HTTP or HTTPSclient. Alternatively or in addition, any first device herein may serveas an HTTP or HTTPS server, and further any message herein, or anyresponse herein, may be an HTTP or HTTPS message. Any content herein maycomprise, or may consist of, a web-page or a web-site that may include,may consist of, or may comprise, a part or whole of files, text,numbers, audio, voice, multimedia, video, images, music, or computerprogram.

Any checking of any response herein may comprise identifying andchecking a HTTP status code that may be received by any device, such asthe first device, in response to the sending of the URL request. Anyresponse herein, such as the first response, may be determined as aproper response responsive to a status code of 2xx. Any response herein,such as the first response, may be determined as not being a properresponse responsive to a status code of 4xx or 5xx, or responsive to astatus code of HTTP 404 error message. Alternatively or in addition, anychecking of any response herein may comprise using a timeout mechanism,and any response herein may be determined as not being a proper responsein response to not receiving a proper response after elapsed definedtime period after an initiation of the fetching. Alternatively or inaddition, any checking of any response herein may comprise checking ifan URL redirection is identified, such as by checking that the HTTPstatus code is 3xx Redirection, and any response herein may bedetermined as not being a proper response in response to detecting theURL redirection.

Alternatively or in addition, any method herein may be used with acriterion that may relate to any feature, any characteristic, or anytype, of the received content, and any checking of any response hereinmay comprise verifying if the content received satisfy the criterion.Any criterion herein may comprise a value, and any response herein maybe determined as not being a proper response in response to comparingthe content feature, characteristic, or type, to the value.Alternatively or in addition, any criterion herein may comprise a valueof a size of a file, and any response herein may be determined as notbeing a proper response in response to comparing the received contentsize to the value.

Any method herein may comprise performing more than 2 fetchings, and thesame first message may be sent by any device, such as the first device,to any device or server, such as the web server, in all of thefetchings. Alternatively or in addition, any method herein may compriseperforming more than 2 fetchings, and the at least two different firstmessages may be sent by any device, such as the first device, to anydevice or server, such as the web server, in all of the fetchings.Alternatively or in addition, any method herein may comprise performingmore than 2 fetchings, and a distinct first message may be sent by anydevice, such as the first device, to any device or server, such as theweb server, in each of the fetchings.

Any method herein may be used with a list of IP addresses stored in anydevice, such as in the first device, and each of the fetchings hereinmay further comprise selecting, by any device such as the first device,an IP address from the list. Any sending herein, by any device such asthe first device to the web server of any message, such as the firstmessage, may comprise using the selected IP address as the source IPaddress. Any list herein may comprise at least 10, 20, 50, 100, 200,500, 1,000, 2,000, 5,000, 10,000, 20,000, 50,000, 100,000, 200,000,500,000, 1,000,000, 2,000,000, 5,000,000, or 10,000,000 IP addresses.

Any method herein may be used with a group of devices, and each of anyIP addresses herein may be an IP address of a device in the group. Anysending herein, such as by the first device to the web server of thefirst message, may comprise sending, by the first device to a device inthe group that is addressed by the selected IP address, the firstmessage; sending, by the selected device to the web server, the firstmessage; receiving, by the selected device from the web server, thefirst response to the sent first message; and sending, by the selecteddevice to the first device, the first response.

At least one of, or each one of, the devices in any group herein may bea client device. Any method herein may be used with a virtualization,and at least one of, or each one of, any devices herein, such as thedevices in the group, may be a client device that may consist of, maycomprise, may be part of, or may be integrated with, a server devicethat may virtualize a client device addressed by the selected IPaddress. Alternatively or in addition, at least one of, or each one of,the devices in any group herein may be a client device that is housed ina single enclosure that is a hand-held enclosure or a portableenclosure. Alternatively or in addition, at least one of, or each oneof, the devices in any group herein may be a client device that may beintegrated in part or entirely in an appliance. Alternatively or inaddition, at least one of, or each one of, the devices in any groupherein may consist of, may comprise, may be integrated with, or may bepart of, a wearable device that is wearable on a person. Alternativelyor in addition, at least one of, or each one of, the devices in anygroup herein may be a client device that may consist of, may comprise,may be part of, or may be integrated with, a notebook computer, a laptopcomputer, a media player, a Digital Still Camera (DSC), a Digital videoCamera (DVC or digital camcorder), a Personal Digital Assistant (PDA), acellular telephone, a digital camera, a video recorder, or a smartphone.Alternatively or in addition, at least one of, or each one of, thedevices in any group herein may consist of, may comprise, may be partof, or may be integrated with, a smartphone that comprises, or is basedon, an Apple iPhone 6 or a Samsung Galaxy S6.

Alternatively or in addition, at least one of, or each one of, thedevices in any group herein may be a client device, and any methodherein may further comprise storing, operating, or using an operatingsystem. Any operating system herein may be a mobile operating systemthat may be based on, or may comprise, Android version 2.2 (Froyo),Android version 2.3 (Gingerbread), Android version 4.0 (Ice CreamSandwich), Android Version 4.2 (Jelly Bean), Android version 4.4(KitKat), Apple iOS version 3, Apple iOS version 4, Apple iOS version 5,Apple iOS version 6, Apple iOS version 7, Microsoft Windows® Phoneversion 7, Microsoft Windows® Phone version 8, Microsoft Windows® Phoneversion 9, or Blackberry® operating system.

Any selection herein, such as selection of an IP address from a list orselecting a device from a group of devices, may be based on, or may use,load balancing or random selection. Any random selection herein may use,or may be based on, one or more random numbers generated by a randomnumber generator. Any random number generator herein may be hardwarebased, and may be using thermal noise, shot noise, nuclear decayingradiation, photoelectric effect, or quantum phenomena. Alternatively orin addition, any random number generator herein may be software based,and may be based on executing an algorithm for generating pseudo-randomnumbers.

Any selection herein, such as selection of an IP address from a list orselecting a device from a group of devices, may be based on, or may use,an estimated geographical location of any device, such as the clientdevice or of the web server. Any method herein may further compriseestimating the geographical location of the client device or of the webserver using geolocation, and any geolocation herein may be based on IPgeolocation or on W3C Geolocation Application Programming Interface(API). Alternatively or in addition, any selection herein, such asselection of an IP address from a list or selecting a device from agroup of devices, may be based on estimating as being associated tobeing in the same area as the client device or the web server, such asbeing in the same continent, country, state, region, city, postal/zipcode, latitude, longitude, or Timezone as the client device or the webserver. Alternatively or in addition, any selection herein, such asselection of an IP address from a list or selecting a device from agroup of devices, may be based on being the recent one to be selected,or based on being the least recent to be selected, manually selected bya user.

Any device herein, such as the first device or the client device, maycomprise, may be part of, or may consist of, a client device in aclient/server architecture, and may be housed in a single enclosure thatmay be a hand-held enclosure or a portable enclosure. Alternatively orin addition, any device herein, such as the first device or the clientdevice, may consist of, may comprise, may be part of, or may beintegrated with, a notebook computer, a laptop computer, a media player,a Digital Still Camera (DSC), a Digital video Camera (DVC or digitalcamcorder), a Personal Digital Assistant (PDA), a cellular telephone, adigital camera, a video recorder, or a smartphone. Alternatively or inaddition, any device herein, such as the first device or the clientdevice, may consist of, may comprise, may be part of, or may beintegrated with a smartphone that may comprise, or may be based on, anApple iPhone 6 or a Samsung Galaxy S6. Any method herein may furthercomprise, by any device such as the first device, storing, operating, orusing an operating system, that may be a mobile operating system, suchas Android version 2.2 (Froyo), Android version 2.3 (Gingerbread),Android version 4.0 (Ice Cream Sandwich), Android Version 4.2 (JellyBean), Android version 4.4 (KitKat), Apple iOS version 3, Apple iOSversion 4, Apple iOS version 5, Apple iOS version 6, Apple iOS version7, Microsoft Windows® Phone version 7, Microsoft Windows® Phone version8, Microsoft Windows® Phone version 9, or Blackberry® operating system.

Any device herein, such as the first device or the client device, may beintegrated in part or entirely in an appliance. A primary functionalityof any appliance herein may be associated with food storage, handling,or preparation. A primary functionality of any appliance herein may beheating food, and any appliance herein may be a microwave oven, anelectric mixer, a stove, an oven, or an induction cooker. Alternativelyor in addition, any appliance herein may be a refrigerator, a freezer, afood processor, a dishwasher, a food blender, a beverage maker, acoffeemaker, or an iced-tea maker. Alternatively or in addition, aprimary functionality of any appliance herein may be associated withenvironmental control, and any appliance herein may consist of, or maybe part of, an HVAC system. Alternatively or in addition, a primaryfunctionality of any appliance herein may be associated with temperaturecontrol, and any appliance herein may be an air conditioner or a heater.Alternatively or in addition, a primary functionality of any applianceherein may be associated with cleaning, such as clothes cleaning, andany appliance herein may be a washing machine, a clothes dryer, or avacuum cleaner. Alternatively or in addition, a primary functionality ofany appliance herein may be associated with water control or waterheating. Alternatively or in addition, any appliance herein may be ananswering machine, a telephone set, a home cinema method, a HiFi method,a CD or DVD player, an electric furnace, a trash compactor, a smokedetector, a light fixture, or a dehumidifier. Alternatively or inaddition, any appliance herein may be a battery-operated portableelectronic device, such as a notebook, a laptop computer, a mediaplayer, a cellular phone, a Personal Digital Assistant (PDA), an imageprocessing device, a digital camera, a video recorder, or a handheldcomputing device.

Any integration herein may involve sharing a component, such as housingin same enclosure, sharing same processor, or mounting onto samesurface. Any integration herein may involve sharing a same connector,and any connector herein may be a power connector for connecting to apower source, and any integration herein may involve sharing the sameconnector for being powered from same power source, or sharing samepower supply.

Any device herein, such as the first device or the client device, mayconsist of, may comprises, may be integrated with, or may be part of, awearable device that is wearable on a person, such as being wearable onan organ of the person head, and the organ may be an eye, ear, face,cheek, nose, mouth, lip, forehead, or chin. Alternatively or inaddition, any device herein, such as the first device or the clientdevice, may be constructed to have a form substantially similar to, isconstructed to have a shape allowing mounting or wearing identical orsimilar to, or is constructed to have a form to at least in partsubstitute for, headwear, eyewear, or earpiece. Alternatively or inaddition, any device herein, such as the first device or the clientdevice, may be shaped for permanently or releasably being attachable to,or be part of, a clothing piece of a person, and the attaching may usetaping, gluing, pinning, enclosing, encapsulating, a pin, or a latch andhook clip. Alternatively or in addition, any device herein, such as thefirst device or the client device, may comprise, or consists of, anannular member defining an aperture therethrough that is sized forreceipt therein of a part of a human body.

Any headwear herein may consist of, may be structured as, or maycomprise, a bonnet, a cap, a crown, a fillet, a hair cover, a hat, ahelmet, a hood, a mask, a turban, a veil, or a wig. Any eyewear hereinmay consist of, may be structured as, or may comprise, glasses,sunglasses, a contact lens, a blindfold, or a goggle. Any earpieceherein may consist of, may be structured as, or may comprise, a hearingaid, a headphone, a headset, or an earplug. Any clothing piece hereinmay be a top, bottom, or full-body underwear, or a headwear, a footwear,an accessory, an outwear, a suit, a dress, a skirt, or a top.

Any method herein may further comprise, by any device such as the firstdevice or the client device, storing, operating, or using, by, a clientoperating system that may consist of, may comprise, or may be based on,one out of Microsoft Windows 7, Microsoft Windows XP, Microsoft Windows8, Microsoft Windows 8.1, Linux, and Google Chrome OS. Any clientoperating system herein may be a Real-Time Operating System (RTOS), suchas FreeRTOS, SafeRTOS, QNX, VxWorks, or Micro-Controller OperatingSystems (μC/OS).

Any device herein, such as the first device, may consist of, maycomprise, may be part of, or may be integrated with, a server device,which may consist of, may include, may be part of, or may be integratedwith, a proxy server. Any proxy server herein may consist of, mayinclude, may be part of, or may be integrated with, an HTTP proxyserver, a web-proxy server, a caching proxy, an open-source cachingproxy server, a cloud-based proxy server, an open proxy server, aforwarding proxy server, a reverse proxy server, a transparent proxyserver, a non-transparent proxy server, an anonymous proxy server, atranslation proxy server, a SOCKS proxy server, a CGI web proxy server,a suffix proxy server, an I2P anonymous proxy server, a DNS proxyserver, or any combination thereof.

Any method herein may be used use with a virtualization, and any deviceherein, such as the first device or the client device, may consist of,may comprise, may be part of, or may be integrated with, a server devicethat may virtualize any client device herein, such as addressed by anyselected IP address. Any device virtualization herein, such as anyclient device virtualization, may be executed as part of a VirtualMachine (VM). Any method herein may be used with a host computer thatmay implement the VM, and any method herein may further compriseexecuting, by the host computer, a hypervisor or a Virtual MachineMonitor (VMM). Any virtualization herein may include, may be based on,or may use, full virtualization, para-virtualization, or hardwareassisted virtualization.

Any communication over the Internet over any two devices herein, such asbetween the client device and the first device, or between the firstdevice and the web server, may be based on, may use, or may becompatible with, Socket Secure (SOCKS) protocol or connection, and anydevice herein, such as any server, may serve as an SOCKS server and anyother device herein, such as any selected device, may serve as an SOCKSclient. Any SOCKS protocol or connection herein may be according to, maybe based on, or may be compatible with, SOCKS4, SOCKS4a, or SOCKS5.Further any SOCKS protocol or connection herein may be according to, maybe based on, or may be compatible with, IETF RFC 1928, IETF RFC 1929,IETF RFC 1961, or IETF RFC 3089. Alternatively or in addition, anycommunication over the Internet over any two devices herein, such asbetween the client device and the first device, or between the firstdevice and the web server, may be based on, may use, or may becompatible with, WebSocket (ws) or WebSocket Secure (wss) protocol orconnection.

Any method herein may be use with a web browser, and may furthercomprise identifying, by the client device, the URL request by the webbrowser; sending, by the client device to the first device, the URLrequest; and receiving, by the client device, the content or the errormessage from the first device. Further, any method herein may furthercomprise using, by the web server in the client device, the content inresponse to receiving of the content from the first device, anddisplaying, by the web server in the client device or in any otherdevice herein, the content to a user. Any method herein may furthercomprise, by any device such as the client device, notifying to a userof the client device, or displaying a notification to the user, inresponse to receiving of the error message from any device, such as fromthe first device.

Any method herein may further comprise, by any device herein such as theclient device or the first device, storing, operating, or using, a webbrowser. Any web browser herein may consist of, may comprise, or may bebased on, Microsoft Internet Explorer, Google Chrome, Opera™, or MozillaFirefox®. Any web browser herein may consist of, may comprise, or may bebased on, a mobile web browser, which may consist of, may comprise of,or may be based on, Safari, Opera Mini™, or Android web browser.

Any step herein, such as any identifying herein, may be performed aspart of a plug-in or an extension integrated with the web browser. Atleast one of the steps performed by any device herein, such as theclient device, may be integrated with the web browser in a form of aplug-in or an extension. Any identifying herein, such as of the firstURL request, may use a plug-in or an extension to the web browser. Anyintegration herein may be by hooking to the web browser, or anyintegration herein may in a filter driver form, or, any web browserherein and any steps herein may be communicating using an Inter-ProcessCommunication (IPC). Any identifying herein, such as of the first URLrequest, may use hooking to the web browser, may be in a filter driverform, or may use an Inter-Process Communication (IPC), which may use afile sharing, a signal, a socket, a pipe, a message queue, a sharedmemory, a semaphore, memory mapped file, a clipboard, a Component ObjectModel (COM), a data copy, a DDE protocol, or mailslots.

Any method herein may be used with a web browser, and may furthercomprise identifying, by the client device, the URL request by the webbrowser; sending, by the client device to the first device, the URLrequest; and receiving, by the client device, the content or the errormessage from the first device. Alternatively or in addition, any methodherein may be used with a web browser, and may further comprise:identifying, by the client device, the URL request by the web browser;fetching M times, wherein M>1 or M=1, by the client device, a secondresponse, until the second response is determined not to be the errormessage. Each one of the M times fetchings may comprise: sending, by theclient device to the first device, the URL request; receiving, by theclient device from the first device, a second response; checking anddetermining whether the second response is a proper response thatcomprises the content or whether the second response is the errormessage; and responsive to determining that the second response is aproper response, using, by the web browser, the content. The number Mmay be equal to, or more than, 1, 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40,50, or 100. Further, The number M may be less than 2, 3, 4, 5, 7, 10,15, 20, 25, 30, 40, 50, 100, 150, or 200.

Any method herein may comprise performing more than 2 fetchings out ofthe M fetchings, and a same message may be sent by the client device tothe first device in all of the fetchings. Alternatively or in addition,at least two different messages are sent by the client device to thefirst device in the fetchings. Alternatively or in addition, a distinctmessage is sent by the client device to the first device in each of thefetchings.

Any method herein may be used with a list of IP addresses, and each ofthe M fetchings may further comprise selecting, by any device, such asthe client device, an IP address from the list, and any sending hereinby any device, such as by the client device to the first device, maycomprise using the selected IP address as the source IP address. Anylist herein may comprise at least 10, 20, 50, 100, 200, 500, 1,000,2,000, 5,000, 10,000, 20,000, 50,000, 100,000, 200,000, 500,000,1,000,000, 2,000,000, 5,000,000, or 10,000,000 IP addresses. Any IPaddress selection may be manually selected by a user, and any methodherein may comprise displaying to the user, in each fetching, the IPaddresses in the list, and selecting, by the user, an IP address fromthe list.

Any non-transitory computer readable medium may contain computerinstructions that, when executed by a processor, may cause the processorto perform at least one or more of any steps herein. Any non-transitorycomputer readable medium may contain computer instructions that, whenexecuted by a processor, may cause the processor to perform part of, orall of, the steps herein. Any part of, or whole of, any method or stepherein may be included in a Software Development Kit (SDK) that may beprovided as a non-transitory computer readable medium containingcomputer instructions, and any method herein may further compriseinstalling the SDK. Any method herein may further comprise extractingdata, such as URL, using SSL sniffing. Any information identification ordata receiving herein, such as URL or URL request identification, mayuse, or may be based on, extracting the information or data using SSLsniffing.

Client Claims

A method may be for fetching a content over the Internet by a webbrowser in a client device may use a group of devices. Any content maybe stored in a web server and is identified by a Uniform ResourceLocator (URL). Any method herein may comprising: identifying, by theclient device, a URL request by the web browser; and fetching N times,wherein N>1 or N=1, by the client device, a first response, until thefirst response is determined to be a proper response. Each one of the Ntimes fetchings may comprise: selecting, by the client device, a devicefrom the group; sending, by the client device to the selected device,the URL request; receiving, by the client device from the selecteddevice, the first response in response to the sending of the URLrequest; and checking for determining whether the first response is aproper response that comprises the content. Any method may furthercomprise responsive to determining that the first response is a properresponse, using, by the web browser, the content; and responsive todetermining that the first response is not a proper response, returningan error message to the web browser. The number N may be equal to, ormay be more than, 1, 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50, or 100.Further, the number N may be less than 2, 3, 4, 5, 7, 10, 15, 20, 25,30, 40, 50, 100, 150, or 200.

Any communication over the Internet between the client device and theselected device may be based on, may use, or may be compatible with,Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure(HTTPS) protocol or connection. Any client device may serve as an HTTPor HTTPS client. Any selected device may serve as an HTTP or HTTPSclient, and any selected device may serve as an HTTP or HTTPS server.Any error message or the first response may be an HTTP or HTTPS message.

Any checking or determining of any response herein may compriseidentifying for checking a HTTP status code that may be received by anydevice, such as the client device, in response to the sending of the URLrequest. Any response herein, such as the first response, may bedetermined as a proper response responsive to a status code of 2xx. Anyresponse herein, such as the first response, may be determined as notbeing a proper response responsive to a status code of 4xx or 5xx, orresponsive to a status code of HTTP 404 error message. Alternatively orin addition, any checking of any response herein may comprise using atimeout mechanism, and any response herein may be determined as notbeing a proper response in response to not receiving a proper responseafter elapsed defined time period after an initiation of the fetching.Alternatively or in addition, any checking of any response herein maycomprise checking if an URL redirection is identified, such as bychecking that the HTTP status code is 3xx Redirection, and any responseherein may be determined as not being a proper response in response todetecting the URL redirection.

Any method herein may comprise performing more than 2 fetchings. A samedevice or at least two different devices may be selected from the groupin all of the fetchings. Alternatively or in addition, distinct devicesmay be selected from the group for all the fetchings. Each of thedevices in the group may be addressable by a respective IP address, andany method may be use with a list that may comprise the IP addresses ofall the devices in the group. Any selecting herein of any device fromthe group may comprise, or may consist of, selecting the respective IPaddress of the selected device. The number of devices in the group is atleast 10, 20, 50, 100, 200, 500, 1,000, 2,000, 5,000, 10,000, 20,000,50,000, 100,000, 200,000, 500,000, 1,000,000, 2,000,000, 5,000,000, or10,000,000.

At least one of, or each one of, the devices in the group may a clientdevice. Further, any method herein may be use with a virtualization, andat least one of, or each one of, the devices in the group may be aclient device that may consist of, may comprises, may be part of, or maybe integrated with, a server device that may virtualize a client deviceaddressed by the selected IP address. Alternatively or in addition, atleast one of, or each one of, the devices in the group may be a clientdevice that may be housed in a single enclosure that may be a hand-heldenclosure or a portable enclosure. Alternatively or in addition, atleast one of, or each one of, the devices in the group may be a clientdevice that may be integrated in part or entirely in an appliance.Alternatively or in addition, at least one of, or each one of, thedevices in the group may consist of, may comprise, may be integratedwith, or may be part of, a wearable device that may be wearable on aperson.

Alternatively or in addition, at least one of, or each one of, thedevices in the group may be a client device that may consist of, maycomprise, may be part of, or may be integrated with, a notebookcomputer, a laptop computer, a media player, a Digital Still Camera(DSC), a Digital video Camera (DVC or digital camcorder), a PersonalDigital Assistant (PDA), a cellular telephone, a digital camera, a videorecorder, or a smartphone. Alternatively or in addition, at least oneof, or each one of, the devices in the group may be a client device thatmay consist of, may comprise, may be part of, or may be integrated with,a smartphone that may comprise, or may be based on, an Apple iPhone 6 ora Samsung Galaxy S6.

At least one of, or each one of, the devices in the group may be aclient device that may be operative for storing, operating, or using anoperating system, which may be as a mobile operating system. that may bebased on, or may comprise, Android version 2.2 (Froyo), Android version2.3 (Gingerbread), Android version 4.0 (Ice Cream Sandwich), AndroidVersion 4.2 (Jelly Bean), Android version 4.4 (KitKat), Apple iOSversion 3, Apple iOS version 4, Apple iOS version 5, Apple iOS version6, Apple iOS version 7, Microsoft Windows® Phone version 7, MicrosoftWindows® Phone version 8, Microsoft Windows® Phone version 9, orBlackberry® operating system.

Any selecting of a device from the group may be based on, or may use,load balancing or random selection. Any random selection herein may use,or may be based on, one or more random numbers generated by a randomnumber generator. Any random number generator herein may be hardwarebased and may use thermal noise, shot noise, nuclear decaying radiation,photoelectric effect, or quantum phenomena. Alternatively or inaddition, any random number generator may be software based, and may bebased on executing an algorithm for generating pseudo-random numbers.

Alternatively or in addition, any selecting of a device from the groupmay be based on, or may use, an estimated geographical location of theclient device or of the web server, and any method herein may furthercomprise estimating the geographical location of the client device or ofthe web server using geolocation, such as IP geolocation or based on W3CGeolocation Application Programming Interface (API). Any device hereinmay be selected based on being estimated as being associated to being inthe same area as the client device or the web server, such as being inthe same continent, country, state, region, city, postal/zip code,latitude, longitude, or Timezone as the client device or the web server.Alternatively or in addition, any selecting of a device from the groupmay be based on being the least recent to be selected, or being manuallyselected by a user. Any method herein may further comprise, for eachfetching, displaying to the user the devices in the group, andselecting, by the user, a device from the group.

Any client device herein, or at least one of, or each one of, thedevices in the group, may comprise, may be part of, or may consist of, aclient device in a client/server architecture, and may be housed in asingle enclosure that may be a hand-held enclosure or a portableenclosure. Any client device herein, or at least one of, or each one of,the devices in the group, may consist of, may comprise, may be part of,or may be integrated with, a notebook computer, a laptop computer, amedia player, a Digital Still Camera (DSC), a Digital video Camera (DVCor digital camcorder), a Personal Digital Assistant (PDA), a cellulartelephone, a digital camera, a video recorder, or a smartphone, such asan Apple iPhone 6 or a Samsung Galaxy S6.

Any method herein may further comprise, by the client device, or atleast one of, or each one of, the devices in the group, storing,operating, or using an operating system. Any operating system may be amobile operating system that may be based on, or may comprise, Androidversion 2.2 (Froyo), Android version 2.3 (Gingerbread), Android version4.0 (Ice Cream Sandwich), Android Version 4.2 (Jelly Bean), Androidversion 4.4 (KitKat), Apple iOS version 3, Apple iOS version 4, AppleiOS version 5, Apple iOS version 6, Apple iOS version 7, MicrosoftWindows® Phone version 7, Microsoft Windows® Phone version 8, MicrosoftWindows® Phone version 9, or Blackberry® operating system.

Any client device herein may be integrated in part or entirely in anappliance, and at least one of, or each one of, the devices in thegroup, may be integrated in part or entirely in an appliance. A primaryfunctionality of the appliance may be associated with food storage,handling, or preparation. Alternatively or in addition, a primaryfunction of the appliance may be heating food, and the appliance may bea microwave oven, an electric mixer, a stove, an oven, or an inductioncooker. Alternatively or in addition, the appliance may be arefrigerator, a freezer, a food processor, a dishwasher, a food blender,a beverage maker, a coffeemaker, or an iced-tea maker. Alternatively orin addition, a primary function of the appliance may be associated withenvironmental control, and the appliance may consist of, or may be partof, an HVAC system.

Alternatively or in addition, a primary function of the appliance may beassociated with temperature control, and the appliance may be an airconditioner or a heater. Alternatively or in addition, a primaryfunction of the appliance may be associated with cleaning, such as withclothes cleaning, and the appliance may be a washing machine, a clothesdryer, or a vacuum cleaner. Alternatively or in addition, a primaryfunction of the appliance may be associated with water control or waterheating. Alternatively or in addition, the appliance may be an answeringmachine, a telephone set, a home cinema method, a HiFi method, a CD orDVD player, an electric furnace, a trash compactor, a smoke detector, alight fixture, or a dehumidifier. Alternatively or in addition, theappliance may be a battery-operated portable electronic device, such asa notebook, a laptop computer, a media player, a cellular phone, aPersonal Digital Assistant (PDA), an image processing device, a digitalcamera, a video recorder, or a handheld computing device.

Any integration herein may involves sharing a component, housing in sameenclosure, sharing same processor, or mounting onto same surface, orsharing a same connector. Alternatively or in addition, any integrationherein may sharing a same power connector for connecting to a powersource, sharing the same connector for being powered from same powersource, or sharing same power supply.

Any client device herein, or at least one of, or each one of, thedevices in the group, may consist of, may comprises, is integrated with,or may be part of, a wearable device that may be wearable on a person.Any wearable device herein may be wearable on an organ of the personhead, and the organ may be an eye, ear, face, cheek, nose, mouth, lip,forehead, or chin.

Any wearable device herein may be constructed to have a formsubstantially similar to, may be constructed to have a shape allowingmounting or wearing identical or similar to, or may be constructed tohave a form to at least in part substitute for, headwear, eyewear, orearpiece. Any headwear herein may consist of, may be structured as, ormay comprise, a bonnet, a cap, a crown, a fillet, a hair cover, a hat, ahelmet, a hood, a mask, a turban, a veil, or a wig. Any eyewear hereinmay consist of, may be structured as, or may comprise, glasses,sunglasses, a contact lens, a blindfold, or a goggle. Any earpieceherein may consist of, may be structured as, or may comprise, a hearingaid, a headphone, a headset, or an earplug. Any wearable device hereinmay be shaped for permanently or releasably being attachable to, or bepart of, a clothing piece of a person, and the attaching may use taping,gluing, pinning, enclosing, encapsulating, a pin, or a latch and hookclip. Any clothing piece herein may be a top, bottom, full-bodyunderwear, a headwear, a footwear, an accessory, an outwear, a suit, adress, a skirt, or a top. Any clothing piece herein may comprise anannular member defining an aperture therethrough that may be sized forreceipt therein of a part of a human body.

Any method herein may further comprise storing, operating, or using, bythe first device or by one or more of the devices in the group, a clientoperating system, that may consist of, may comprise, or may be based on,Microsoft Windows 7, Microsoft Windows XP, Microsoft Windows 8,Microsoft Windows 8.1, Linux, or Google Chrome OS. Any client operatingsystem herein may be a Real-Time Operating System (RTOS), such asFreeRTOS, SafeRTOS, QNX, VxWorks, or Micro-Controller Operating Systems(μC/OS).

At least one of, or each one of, the devices in the group, may consistof, may comprise, may be part of, or may be integrated with, a serverdevice in a server/architecture, and the server device may consist of,may include, may be part of, or may be integrated with, a proxy server.Any proxy server herein may consist of, may include, may be part of, ormay be integrated with, an HTTP proxy server, a web-proxy server, acaching proxy, an open-source caching proxy server, a cloud-based proxyserver, an open proxy server, a forwarding proxy server, a reverse proxyserver, a transparent proxy server, a non-transparent proxy server, ananonymous proxy server, a translation proxy server, a SOCKS proxyserver, a CGI web proxy server, a suffix proxy server, an I2P anonymousproxy server, a DNS proxy server, or any combination thereof.

Any method herein may further comprise, by one of, or each of, theselected devices: receiving, by the selected device from the clientdevice, the URL request, in response to the sending by the client deviceof the URL request; and fetching M times, wherein M>1 or M=1, by theselected device from the web server, a second response, until the secondresponse is determined to be a proper response. Each one of the M timesfetchings may comprise: sending, by the selected device to the webserver, the URL request; receiving, by the selected device from the webserver, the second response in response to the sending of the URLrequest to the web server; and checking and determining whether thesecond response is a proper response that comprises the content;responsive to determining that the second response is a proper response,sending, by the selected device to the client device, the content; andresponsive to determining that the first response is not a properresponse, sending, by the selected device to the client device, anadditional error message, wherein the additional error message isdetermined as not a proper response. The number M may be equal to, ormay be more than, 1, 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50, or 100.Further, the number M may be less than 2, 3, 4, 5, 7, 10, 15, 20, 25,30, 40, 50, 100, 150, or 200.

Multi-Fetching Claims

Any method herein may be used for fetching by a first device over theInternet a content that may be stored in a web server and may beidentified by a Uniform Resource Locator (URL). Any method herein maycomprise: first fetching, by the first device, a first response by usinga first fetching scheme; checking for determining whether the firstresponse is a proper response that comprises the content; responsive todetermining that the first response is a proper response, using thefetched content. Any method may further comprise responsive todetermining that the first response is not a proper response, performingthe steps of: second fetching, by the first device, a second response byusing a second fetching scheme that is distinct from the first fetchingscheme; checking for determining whether the second response is a properresponse that comprises the content; responsive to determining that thesecond response is a proper response, using the fetched content. Anymethod may further comprise responsive to determining that the secondresponse is not a proper response, performing the steps of: thirdfetching, by the first device, a third response by using a thirdfetching scheme that is distinct from the first fetching scheme and fromthe second fetching scheme; checking for determining whether the thirdresponse is a proper response that comprises the content; responsive todetermining that the third response is a proper response, using thefetched content; and responsive to determining that the third responseis not a proper response, performing, by the first device, a firstaction. Any method herein may further comprise receiving, by the firstdevice from a server device, a URL request.

Any first action herein may further comprise fourth fetching, by thefirst device, a fourth response by using a fourth fetching scheme thatmay be distinct from the first fetching scheme, from the second fetchingscheme, and from the third fetching scheme. Alternatively or inaddition, any first action herein may further comprise checking fordetermining whether the fourth response is a proper response thatcomprises the content; and responsive to determining that the fourthresponse is a proper response, using the fetched content. Each of thefirst, second, or third fetching schemes may be a direct fetching schemeor a non-direct fetching scheme, and any non-direct fetching scheme maybe a proxy-server based fetching scheme, a Data-Center (DC) proxy-serverbased fetching scheme, or a tunnel-based fetching scheme.

Any first device herein may be addressed in the Internet using an IPaddress, and at least one of the first, second, or third fetchingschemes may be a direct fetching scheme that may consist of, or maycomprise: sending, by the first device to the web server, a URL requestthat include the IP address; and receiving, by the first device from theweb server, the respective first, second, or third response; The URLrequest sent by the first device may be received unchanged by the webserver, so that the IP address of the first device may be known to theweb server.

At least one of the first, second, or third fetching schemes may be anon-direct fetching scheme that may consist of, or may comprise:sending, by the first device, a URL request that is responsive to theURL; receiving, by the web server, the URL request that includes an IPaddress that is distinct from the IP address of the first device;sending, by the web server, the content, in response to the received URLrequest; and receiving, by the first device, the content. The URLrequest received by the web server may not include the IP address of thefirst device, so that the IP address of the first device may be unknownto the web server.

Any method herein may further be used with a second device that servesas an intermediary device, and any non-direct fetching scheme mayconsist of, or may comprises: sending, by the first device to the seconddevice, the URL request that may be responsive to the URL; sending, bythe second device to the web server, the URL request; receiving, by theweb server from the second device, the URL request; sending, by the webserver to the second device, the content, in response to the receivedURL request; and receiving, by the second device from the web server,the content, sending, by the second device to the first device, thecontent; and receiving, by the first device from the second device, thecontent.

Any non-direct fetching scheme herein may consist of, or may comprise, aproxy server fetching scheme, wherein the second device consists of,comprises, is part of, or is integrated with, a server device. Anyserver device herein may consist of, may include, may be part of, or maybe integrated with, a proxy server, that may consist of, may includes,may be part of, or may be integrated with, an HTTP proxy server, aweb-proxy server, a caching proxy, an open-source caching proxy server,a cloud-based proxy server, an open proxy server, a forwarding proxyserver, a reverse proxy server, a transparent proxy server, anon-transparent proxy server, an anonymous proxy server, a translationproxy server, a SOCKS proxy server, a CGI web proxy server, a suffixproxy server, an I2P anonymous proxy server, a DNS proxy server, or anycombination thereof.

Any method herein may be used with a list of IP addresses stored in thesecond device, and any method herein may further comprise selecting, bythe first or second device an IP address from the list, and the sendingof the URL request to the web server includes the selected IP address asthe source address. Any non-direct fetching scheme herein may consistof, or may comprise, a Data Center (DC)-based proxy server fetchingscheme, and the second device may consist of, may comprise, may be partof, or may be integrated with, a server device that use the selected IPaddress as a source destination.

Any method herein may be used with a virtualization, and any deviceherein, such as the second device, may consist of, may comprise, may bepart of, or may be integrated with, a server device that may virtualizea client device addressed by the selected IP address. Any client devicevirtualization may be executed as part of a Virtual Machine (VM), andthe method may be used with an host computer that may implement the VM,wherein the method further comprising executing, by the host computer, ahypervisor or a Virtual Machine Monitor (VMM). Any virtualization hereinmay include, may be based on, or may use, full virtualization,para-virtualization, or hardware assisted virtualization.

Any method herein may be used with a group of devices, and each of theIP addresses in the list may be associated with a distinct device in thegroup, and the second device may consist of, may comprise, may be partof, or may be integrated with, a server device. Any the non-directfetching scheme herein may consist of, or may comprise, a tunnel-basedfetching scheme, that may consist of, or may comprise: selecting adevice from the group by selecting the IP address from the list that isassociated with the selected device; sending, by the second device tothe selected device, the URL request; receiving, by the selected device,the URL request; sending, by the selected device to the web server, theURL request; receiving, by the web server from the selected device, theURL request; sending, by the web server to the selected device, thecontent, in response to the received URL request; and receiving, by theselected device from the web server, the content, sending, by theselected device to the second device, the content; receiving, by thesecond device from the selected device, the content; sending, by thesending device to the first device, the content; and receiving, by thefirst device from the second device, the content. Any method herein maybe used with a group of multiple devices that may comprise the firstdevice, and any method may further comprise selecting the first devicefrom the group.

The first, second, or third fetching may comprise fetching N times,wherein N>1 or N=1, by the first device, the respective first, second,or third response, by using the respective first, second, or thirdfetching scheme, until the respective first second, or third response isdetermined to be a proper response. Each one of the N times fetchingsmay comprise: sending, by the first device, the URL request; andreceiving, by the first device, the first response in response to thesending of the URL request. The sending may comprise sending to the webserver, and the receiving may comprise receiving from the web server.Alternatively or in addition, the sending may comprise sending to anadditional device that may be distinct from the web server, and thereceiving may comprise receiving from the additional device. The numberN may be equal to, or may be more than, 1, 2, 3, 4, 5, 7, 10, 15, 20,25, 30, 40, 50, or 100. Further, the number N may be less than 2, 3, 4,5, 7, 10, 15, 20, 25, 30, 40, 50, 100, 150, or 200.

The first device may consists or, may comprise, or may be part of, aclient device in a client/server architecture, and may be housed in asingle enclosure that may be a hand-held enclosure or a portableenclosure. Any client device herein may consist of, may comprise, may bepart of, or may be integrated with, a notebook computer, a laptopcomputer, a media player, a Digital Still Camera (DSC), a Digital videoCamera (DVC or digital camcorder), a Personal Digital Assistant (PDA), acellular telephone, a digital camera, a video recorder, or a smartphone,which may comprises, or may be based on, an Apple iPhone 6 or a SamsungGalaxy S6.

Any method herein may further comprise receiving, by the first devicefrom a client device, a URL request. Any method herein may be used witha web browser, and may further comprise identifying, by the clientdevice, the URL request by the web browser; sending, by the clientdevice to the first device, the URL request; and receiving, by the firstdevice from the client device, the URL request, and the first fetchingmay be responsive to the receiving of the URL request from the clientdevice. Any using of the fetched content may comprise sending, by thefirst device, the fetched content to the client device. Any methodherein may further comprising storing, operating, or using, by theclient device, the web browser, and the identifying of the URL by theweb browser may be performed as part of a plug-in or an extensionintegrated with the web browser. The performing of the first action maycomprise sending, by the first device to the client device, an errormessage.

Any method herein may further comprise fetching M times, wherein M>1 orM=1, by the client device, a fourth response, until the fourth responseis determined not to be the error message. Each one of the M timesfetchings may comprise: sending, by the client device to the firstdevice, the URL request; receiving, by the client device from the firstdevice, the fourth response; checking and determining whether the fourthresponse is a proper response that comprises the content or whether thefourth response is the error message; and responsive to determining thatthe fourth response is a proper response, using, by the web browser, thecontent.

Content Comparing Claims

Any method herein may be used for fetching by a first device, that maybe a server device or a client device, over the Internet a content,which may be stored in a web server and may be identified by a UniformResource Locator (URL). Any method herein may comprise: first fetching,by the first device, a first content, wherein in the first fetching aURL request is received by the web server using a first IP address as asource address; storing, by the first device, the fetched first content;second fetching, by the first device, a second content, wherein in thesecond fetching the URL request is received by the web server using asecond IP address as a source address, wherein the second IP address isdifferent from the first IP address; comparing the stored fetched firstcontent and the fetched second content; responsive to determining thatthe first and second contents are identical, using the fetched content;and responsive to determining that first and second contents are notidentical, performing, by the first device, a first action.

Any method herein may be preceded by N times fetching, by the firstdevice, and each of the N times fetching may comprise fetching the URL.Alternatively or in addition, each of the N times fetching may comprisefetching from the web server. The number N may be equal to, or may bemore than, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, 20, 50, 70, 100, 150,200, 250, 300, 400, 500, 700, or 1000. Further, the number N may be lessthan, 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, 20, 50, 70, 100, 150, 200, 250,300, 400, 500, 700, 1000, or 2000.

Any method herein may further comprise receiving, by the first devicefrom a second device, the URL request. Any first action herein maycomprise sending an error message to the second device. Further, anyusing of the fetched content may comprise sending the fetched content tothe second device. The first fetching may use, or may be based on, afirst fetching scheme, and the second fetching may use, or may be basedon, a second fetching scheme that may be different from the firstfetching scheme. Any fetching herein, such as the first fetching, mayuse, or may be based on, a direct fetching scheme. Any fetching herein,such as the second fetching, may use, or may be based on, a non-directfetching scheme. Any non-direct fetching scheme herein may be aproxy-server based fetching scheme, a Data-Center (DC) proxy-serverbased fetching scheme, or a tunnel-based fetching scheme. In the directfetching scheme herein, the URL request may be received by the webserver using an IP address of the first device as a source address. Oneof the first and second IP addresses may comprise, or may consist of, anIP address of the first device.

The first device may be addressed in the Internet using an IP address,and one of the first and second fetching may use a direct fetchingscheme that may consist of, or may comprise: sending, by the firstdevice to the web server, a URL request that include the IP address ofthe first device; and receiving, by the first device from the webserver, the respective content, and the URL request sent by the firstdevice may be received unchanged by the web server so that the IPaddress of the first device is known to the web server.

Alternatively or in addition, the first device may be addressed in theInternet using an IP address, and one of the first and second fetchingmay use a non-direct fetching scheme that may consist of, or maycomprise: sending, by the first device, the URL request; receiving, bythe web server, the URL request that includes an IP address that isdistinct from the IP address of the first device; sending, by the webserver, the content, in response to the received URL request; andreceiving, by the first device, the content, and the URL requestreceived by the web server does not include the IP address of the firstdevice so that the IP address of the first device is unknown to the webserver. Any method herein may further be used with a second device thatmay serve as an intermediary device, and any non-direct fetching schemeherein may consist of, or may comprise: sending, by the first device tothe second device, the URL request; receiving, by the second device, theURL request; sending, by the second device to the web server, the URLrequest; receiving, by the web server from the second device, the URLrequest; sending, by the web server to the second device, the content,in response to the received URL request; and receiving, by the seconddevice from the web server, the content; sending, by the second deviceto the first device, the content; and receiving, by the first devicefrom the second device, the received content.

Any non-direct fetching scheme herein may consist of, or may comprise, aproxy server fetching scheme, and the second device may consist of, maycomprise, may be part of, or may be integrated with, a server device,which may consist of, may include, may be part of, or may be integratedwith, a proxy server. Any proxy server herein may consist of, mayinclude, may be part of, or may be integrated with, an HTTP proxyserver, a web-proxy server, a caching proxy, an open-source cachingproxy server, a cloud-based proxy server, an open proxy server, aforwarding proxy server, a reverse proxy server, a transparent proxyserver, a non-transparent proxy server, an anonymous proxy server, atranslation proxy server, a SOCKS proxy server, a CGI web proxy server,a suffix proxy server, an I2P anonymous proxy server, a DNS proxyserver, or any combination thereof. The sending, by the second device tothe web server, of the URL request, may use the server device IP addressas a source address.

Any method herein may be used with a list of IP addresses stored in thesecond device, and any method herein may further comprise selecting, bythe first device an IP address from the list, and the sending of the URLrequest to the web server may use the selected IP address as a sourceaddress. Any non-direct fetching scheme herein may use, or may be basedon, a Data Center (DC)-based proxy server fetching scheme, and thesecond device may consist of, may comprise, may be part of, or may beintegrated with, the Data Center (DC)-based proxy server. Any methodherein may be used with a virtualization, and the second device mayconsist of, may comprise, may be part of, or may be integrated with, aserver device that may virtualize a client device addressed by theselected IP address. Any client device virtualization herein may beexecuted as part of a Virtual Machine (VM), and may use a host computerthat may implement the VM, and any method herein may further compriseexecuting, by the host computer, a hypervisor or a Virtual MachineMonitor (VMM). Any virtualization herein may include, may be based on,or may use, full virtualization, para-virtualization, or hardwareassisted virtualization.

Any method herein may be used with a group of devices, each of the IPaddresses in the list may be associated with a distinct device in thegroup, the second device may consist of, may comprise, may be part of,or may be integrated with, a server device, and any non-direct fetchingscheme herein may consist of, or may comprise, a tunnel-based fetchingscheme, that may consist of, or may comprises: selecting a device fromthe group by selecting the respective IP address from the list that isassociated with the selected device; sending, by the second device tothe selected device, the URL request; receiving, by the selected device,the URL request; sending, by the selected device to the web server, theURL request; receiving, by the web server from the selected device, theURL request; sending, by the web server to the selected device, thecontent, in response to the received URL request; receiving, by theselected device from the web server, the content; sending, by theselected device to the second device, the content; receiving, by thesecond device from the selected device, the content; sending, by thesending device to the first device, the content; and receiving, by thefirst device from the second device, the content. Any first deviceherein may consist or, may comprise, or may be part of, a client devicein a client/server architecture, and may be housed in a single enclosurethat may be a hand-held enclosure or a portable enclosure.

Any method herein may further comprise storing, operating, or using, bythe first device, a web browser, which may consist of, may comprise of,or may be based on, Microsoft Internet Explorer, Google Chrome, Opera™,or Mozilla Firefox®. Any web browser herein may be a mobile web browser,which may consist of, may comprise of, or may be based on, Safari, OperaMini™, or Android web browser. Any first action herein may comprisereturning an error message to the web browser, and any using of thefetched content may comprise using of the fetched content by the webbrowser.

Any method herein may further comprise receiving, by the first devicefrom a client device, the URL request, and may be used with a webbrowser in the client device, that further comprise: identifying, by theclient device, the URL request by the web browser; sending, by theclient device to the first device, the URL request; and receiving, bythe first device from the client device, the URL request. The firstfetching may be responsive to the receiving of the URL request from theclient device. The using of the fetched content may comprise sending, bythe first device, the fetched content to the client device. Any methodherein may further comprise storing, operating, or using, by the clientdevice, the web browser. Any identifying of the URL by the web browsermay be performed as part of a plug-in or an extension integrated withthe web browser. Any performing of the first action may comprisesending, by the first device to the client device, an error message.

Any server herein may consist of, may include, may be part of, or may beintegrated with, a proxy server. Any proxy server herein may consist of,may include, may be part of, or may be integrated with, an HTTP proxyserver, a web-proxy server, a caching proxy, an open-source cachingproxy server, a cloud-based proxy server, an open proxy server, aforwarding proxy server, a reverse proxy server, a transparent proxyserver, a non-transparent proxy server, an anonymous proxy server, atranslation proxy server, a SOCKS proxy server, a CGI web proxy server,a suffix proxy server, an I2P anonymous proxy server, a DNS proxyserver, or any combination thereof. Any method herein may be used forovercoming blocking, such as where a direct fetching scheme may fail isdue to geoblocking, Internet censorship, Man-In-The-Middle (MITM)attack, or firewalling.

A method may be used for fetching a content identified by a contentidentifier to a client device from a web server by using tunnel devices.The method may be used with a first and second servers and a group oftunnel devices that are each connected to the Internet and are eachaddressable in the Internet using a respective IP address, and the firstserver may store a list of the IP addresses associated with the tunneldevices in the group. The method may comprise sending, by the clientdevice to the second server, a request message that comprises thecontent identifier; receiving, by the second server from the clientdevice, the request message; sending, by the second server to the firstserver, a first message; receiving, by the first server from the secondserver, the first message; selecting, by the first server, an IP addressassociated with a tunnel device from the list of tunnel devices, inresponse to the received first message; sending, by the first server tothe selected tunnel device, a second message using an IP address of theselected first tunnel device; receiving, by the selected tunnel devicefrom the first server, the second message; sending, by the selectedtunnel device to the web server, a content request that comprises thecontent identifier; receiving, by the selected tunnel device from theweb server, the content, in response to the content request; sending, bythe selected tunnel device to the second server, the content; receiving,by the second server from the selected tunnel device, the content;sending, by the second server to the client device, the content; andreceiving, by the client device from the second server, the content inresponse to the request message.

Any list herein, such as the list of the IP addresses may comprise, ormay consist of, multiple distinct lists, and each of the multipledistinct lists may comprise one or more of the IP addresses that may beassociated with the tunnel devices in the group. Any list of IPaddresses herein may comprise, or may consist of, at least 2, 3, 4, 5,8, 10, 20, 30, 50, 80, 100, 120, 150, 200, 300, 500, 1,000, 2,000,3,000, 5,000, 10,000, 20,000, 30,000, 50,000, or 100,000 distinct lists.Alternatively or in addition, any list of IP addresses herein maycomprise, or may consist of, less than 3, 4, 5, 8, 10, 20, 30, 50, 80,100, 120, 150, 200, 300, 500, 1,000, 2,000, 3,000, 5,000, 10,000,20,000, 30,000, 50,000, 100,000 or 200,000 distinct lists. Any list ofIP addresses herein, such as at least one list of any multiple distinctlists herein may include at least 1, 2, 3, 4, 5, 8, 10, 12, 15, 20, 20,30, 50, 80, 100, 120, 150, 200, 500, 1,000, 2,000, 5,000, or 10,000 IPaddresses, or may include less than 2, 3, 4, 5, 8, 10, 12, 15, 20, 20,30, 50, 80, 100, 120, 150, 200, 500, 1,000, 2,000, 5,000, 10,000 or20,000 IP addresses. Each of the multiple distinct lists herein mayinclude at least 1, 2, 5, 8, 10, 12, 15, 20, 20, 30, 50, 80, 100, 120,150, 200, 500, 1,000, 2,000, 5,000, or 10,000 IP addresses, or mayinclude less than 2, 3, 4, 5, 8, 10, 12, 15, 20, 20, 30, 50, 80, 100,120, 150, 200, 500, 1,000, 2,000, 5,000, 10,000 or 20,000 IP addresses.

Any two list herein, such as at least first and second lists of themultiple distinct lists, may be mutually exclusive, whereby each of theIP addresses included in the first list may not be part of the secondlist. Further, part of, or all of, any lists of the multiple distinctlists may be mutually exclusive, whereby each of the IP addressesincluded in one of the lists may not be part of any other list of themultiple distinct lists. Any two list herein, such as at least first andsecond lists of the multiple distinct lists, may be mutuallynon-exclusive, whereby at least one of the IP addresses that is includedin the first list may be part of the second list. Further, all of thelists of the multiple distinct lists may be mutually non-exclusive,whereby at least one of the IP addresses included in a list may be partof another list of the multiple distinct lists.

Any list herein, such as any list of the multiple distinct lists, mayinclude a single IP address, further, at least two lists of the multipledistinct lists may include a single IP address. At least two lists ofthe multiple distinct lists may include the same number of IP addresses.Further, at least 3, 5, 8, 10, 15, 20, 30, 50, 100, 200, 300, 500,1,000, 5,000, or 10,000 lists of the multiple distinct lists may includethe same number of IP addresses. Alternatively or in addition, at least1%, 2%, 3%, 5%, 10%, 15%, 20%, 25%, 30%, 35%, 40%, 45%, 50%, 55%, 60%,70%, 80%, or 90% of the lists of the multiple distinct lists may includethe same number of IP addresses, or all of the lists of the multipledistinct lists may include the same number of IP addresses. Any IPaddresses herein or any associated tunnel devices herein of any list,such as of at least one list of the multiple distinct lists, may beassociated with a same value or a value range of an attribute type.Further, any IP addresses or any associated tunnel devices of each ofthe multiple distinct lists may be associated with the same value or thevalue range of the attribute type. Further, any value herein maycomprise a numeric value or an identifier of a feature, an attribute, acharacteristic, or a property of the attribute type, and any value rangeherein may comprise a numeric value range or identifiers of a feature,an attribute, a characteristic, or a property of the attribute type.

Any attribute type herein may comprise a geographical location, and anyvalue herein may comprise a name or an identifier of a continent, acountry, a region, a city, a street, a ZIP code, or a timezone.Alternatively or in addition, any attribute type herein may comprise anInternet Service Provider (ISP) or Autonomous System Number (ASN), andany value herein may respectively comprise a name or an identifier ofthe ISP or the ASN number. Alternatively or in addition, any attributetype herein may correspond to a hardware of software of tunnel devices.Alternatively or in addition, any attribute type herein may correspondto a communication property, type, or feature of a communication link ofany device, such as any tunnel devices. Alternatively or in addition,any attribute type herein may correspond to an operating system of anydevice, such as the tunnel devices. Alternatively or in addition, anyattribute type herein may correspond to a RTT of the tunnel devices.Alternatively or in addition, any attribute type herein may correspondto a content type, and any value of the content type may comprise avideo data, audio data, and no multimedia web-page. Any method hereinmay be used with multiple web servers, and any attribute type maycorrespond to a web server from the multiple web servers, and the valuescomprise an identifier of the web server, and any identifier herein maycomprise an IP address of the web server, a domain name, a website name,or a URL.

Any selecting herein of any IP address from any list may compriseselecting a list from the multiple distinct lists; and selecting an IPaddress from the selected list. Any selecting of any IP address from anyselected list may be based on load balancing, and may be based on, ormay be using, random, quazi-random, or deterministic selection.Alternatively or in addition, any selecting of any list from anymultiple distinct lists or any selecting of any IP address from anyselected list, may be based on, or may use, random selecting, that mayuse one or more random numbers generated by a random number generator.Any random number generator herein may be hardware based, and may beusing thermal noise, shot noise, nuclear decaying radiation,photoelectric effect, or quantum phenomena. Alternatively or inaddition, any random number generator herein may be software based, andmay be based on executing an algorithm for generating pseudo-randomnumbers.

Further, any selecting of any list from any multiple distinct lists orany selecting of any IP address from any selected list may be based on,or may use, Last-In-First-Out (LIFO) or First-In-First-Out (FIFO)scheme. Alternatively or in addition, any selecting herein of any IPaddress from any selected list may be based on, or may be using,sequential or cyclic selection. Any message herein, such as the firstmessage, may comprise a criterion, and any selecting herein of any listfrom any multiple distinct lists may be based on, may be using, or maybe in response to, the criterion. Any selecting herein of any list fromany multiple distinct lists may be based on load balancing.Alternatively or in addition, any selecting herein of any list from anymultiple distinct lists may be based on, or may be using, randomselection, sequential, or cyclic selection. Any message herein, such asthe first message, may comprise a criterion, and any selecting herein ofthe list from any multiple distinct lists may be based on, may be using,or may be in response to, the criterion.

Any device herein, such as the client device, may be associated with anylist of any multiple distinct lists, and any selecting herein of anylist from any multiple distinct lists may comprise selecting the listthat may be associated with the client device. Any method herein may beused with multiple client devices, and each list of any multipledistinct lists may be associated with a client device of the multipleclient devices. Further, any client device herein may be selected fromthe multiple client devices, and any selecting herein of any list fromany multiple distinct lists may comprise selecting the list that may beassociated with the selected client device. Further, any client deviceof the multiple client devices may be associated with a list of themultiple distinct lists.

Any IP addresses herein, or any associated tunnel devices, of at leasttwo lists of, or all of, the multiple distinct lists, may berespectively associated with a distinct value or a distinct value rangeof an attribute type. Further, any message herein, such as the firstmessage, may comprise a value or a value range of the attribute type,and any selecting herein of any list from any multiple distinct listsmay be based on, may be in response to, or may use, the value or thevalue range in the first message, and any selecting herein of any listfrom any multiple distinct lists may comprise selecting the list thatmay be associated with the value or the value range in the firstmessage. Alternatively or in addition, any message herein, such as thefirst message, may comprise an identifier of the client device, and anyselecting herein of any list from any multiple distinct lists may bebased on, may be in response to, or may use, the identifier of theclient device, which may comprise, may use, or may be based on, the IPaddress of the client device.

Any web server herein, any content herein, or any content identifierherein may be associated with a list of the multiple distinct lists, andany selecting herein of any list from any multiple distinct lists maycomprise selecting the list that may be associated with the web server,the content, or the content identifier. Any method herein may be usedwith multiple web servers, or multiple contents each associated with arespective content identifier, and any list of any multiple distinctlists may be associated with a respective one of the multiple webservers or the multiple contents. Further, any web server herein or anycontent herein may be respectively selected from the multiple webservers or the multiple contents, and any selecting herein of any listfrom any multiple distinct lists may comprise selecting the list thatmay be associated with the respectively selected web server or content.Alternatively or in addition, each of the multiple web servers ormultiple contents may be associated with a list of the multiple distinctlists.

Any method herein may further comprise defining, forming, maintaining,or storing of at least one list of the multiple distinct lists, or ofall lists of the multiple distinct lists. Any defining, forming,maintaining, or storing herein may be by any device or apparatus herein,such as by the first server, the second server, or the client device.Further, any method herein may further comprise updating of any list,such as updating at least one list of the multiple distinct lists. Anymethod herein may further comprise updating of at least 2, 3, 5, 8, 10,15, 20, 30, 50, 100, 200, 300, 500, 1,000, 5,000, or 10,000 lists of themultiple distinct lists, or updating of at least 1%, 2%, 3%, 5%, 10%,15%, 20%, 25%, 30%, 35%, 40%, 45%, 50%, 55%, 60%, 70%, 80%, or 90% ofthe lists of the multiple distinct lists.

Alternatively or in addition, any method herein may further compriseforming, maintaining, or storing all lists of any multiple distinctlists. Alternatively or in addition, any updating of any list maycomprise adding an IP address to, or removing an IP address from, thelist. Any updating herein may be at least 1 minute, 2, minutes, 5minutes, 10 minutes, 20 minutes, 30 minutes, 1 hour, 2 hours, 5 hours,10 hours, 1 day, 2 days, 4 days, 1 week, 2 weeks, 3 weeks, 1 months, 2months, or 6 months after any forming, defining, forming, or storing.Further, Any updating herein may be less than 1 minute, 2, minutes, 5minutes, 10 minutes, 20 minutes, 30 minutes, 1 hour, 2 hours, 5 hours,10 hours, 1 day, 2 days, 4 days, 1 week, 2 weeks, 3 weeks, 1 months, 2months, or 6 months after any forming, defining, forming, or storing.Alternatively or in addition, at least two lists or all lists of the ofthe multiple distinct lists may not be updated or changed for at least 1minute, 2, minutes, 5 minutes, 10 minutes, 20 minutes, 30 minutes, 1hour, 2 hours, 5 hours, 10 hours, 1 day, 2 days, 4 days, 1 week, 2weeks, 3 weeks, 1 months, 2 months, or 6 months after the last forming,defining, forming, or storing. Any updating herein may compriseperiodically updating, that may be every at least 1 minute, 2, minutes,5 minutes, 10 minutes, 20 minutes, 30 minutes, 1 hour, 2 hours, 5 hours,10 hours, 1 day, 2 days, 4 days, 1 week, 2 weeks, 3 weeks, 1 months, 2months, or 6 months, or may be every less than 1 minute, 2, minutes, 5minutes, 10 minutes, 20 minutes, 30 minutes, 1 hour, 2 hours, 5 hours,10 hours, 1 day, 2 days, 4 days, 1 week, 2 weeks, 3 weeks, 1 months, 2months, or 6 months.

Any selecting herein of any list from any multiple distinct lists or anyselecting herein of any IP address from any selected list may be basedon, or may be in response to, a time of an action or an event. Anyaction herein may comprise an action by any device or apparatus herein,such as any client device, any first server, any second server, any webserver, or any selected tunnel device. Any event herein may be an eventaffecting, or sensed by, any device or apparatus herein, such as anyclient device, any first server, any second server, any web server, orany selected tunnel device. Any time herein may comprise the time at therespective location of the client device, the first server, the secondserver, the web server, or the selected tunnel device. Any action hereinmay comprise any receiving of, or any transmitting of, any message overthe Internet, such as sending or receiving by any device or apparatusherein, such as any client device, any first server, any second server,any web server, or any selected tunnel device. Alternatively or inaddition, any action herein may comprise any selecting of any list fromany multiple distinct lists, or any selecting of any IP address from anyselected list.

At least any one list from any multiple distinct lists may be associatedwith a timing information, and any the selecting herein of any list fromany multiple distinct lists may be based on, or may be according to, thetime versus the associated timing information of the at least one list.At least 3, 5, 8, 10, 15, 20, 30, 50, 100, 200, 300, 500, 1,000, 5,000,or 10,000 lists of any multiple distinct lists may be associated with adistinct timing information, or at least 1%, 2%, 3%, 5%, 10%, 15%, 20%,25%, 30%, 35%, 40%, 45%, 50%, 55%, 60%, 70%, 80%, or 90% of any lists ofany multiple distinct lists may be associated with a distinct timinginformation. Any selecting herein of any list from any multiple distinctlists may be based on, or may be according to, the time versus theassociated timing information of the lists. Any timing informationherein may comprise a month, a week, a day of the week, an hour of aday, or a minute in an hour, and any multiple distinct lists herein maycomprise at least 7 distinct lists, each associated with a different dayof the week. Alternatively or in addition, any multiple distinct listsherein may comprise at least 24 distinct lists, each associated with atleast one different hour of the day. Further, any time herein maycomprise a month, a week, a day of the week, an hour of a day, or aminute in an hour.

Any method herein may be used with a first device that may be connectedto the Internet and may be addressable in the Internet using a first IPaddress. Any method herein may further comprise sending, by the firstdevice to the first server, a third message; and receiving, by the firstserver from the first device, the third message. Further, any methodherein may further comprise adding the IP address of the first device toa single list, two or more lists, of any multiple distinct lists. Anymethod herein may be used with a first device that may be connected tothe Internet and addressable in the Internet using a first IP address,and may further comprise forming or adding an additional list to themultiple distinct lists. Further, any method herein may further compriseforming or adding an additional list to the multiple distinct lists thatincludes the first IP address. Alternatively or in addition, any methodherein may further comprise sending, by the first device to the firstserver, a third message; and receiving, by the first server from thefirst device, the third message. Any forming or adding herein of theadditional list may be in repose to the receiving of the third message.

Any selecting herein of any IP address from any list may compriseselecting a list from the multiple distinct lists; selecting an IPaddress from the selected list; checking the availability of the deviceassociated with the selected IP address to serve as a tunnel device; andresponsive to the selected device unavailability to serve as a tunneldevice, selecting and using another IP address from the selected list.Alternatively or in addition, any selecting herein of any IP addressfrom any list may comprise selecting a list from the multiple distinctlists; checking the availability of all the devices associated with theIP addresses in the selected list to serve as a tunnel device; andresponsive to a device availability to serve as a tunnel device,selecting and using the IP address of the available device.Alternatively or in addition, any selecting herein of any IP addressfrom any list may comprise selecting a list from the multiple distinctlists; checking the availability of all the devices associated with theIP addresses in the selected list to serve as a tunnel device; andresponsive to no a availability of any device from the selected list toserve as a tunnel device, adding and using an additional IP address ofan available device. At least 2 lists of any multiple distinct listsherein may each be identified by a respective distinct identifier.Alternatively or in addition, each list of any multiple distinct listsmay be identified by a respective distinct identifier. Any identifierherein may comprise a characters set, an alphanumeric string, a number,or an IP address.

Any list of the IP addresses herein may comprise, or may consist of,multiple distinct collections, and each collection may comprise one ormore lists of any multiple distinct lists. For example, two or morecollections may comprise more than 1, 2, 5, 10, 12, 15, 20, 20, 30, 50,80, 100, 120, 150, 200, 500, 1,000, 2,000, 5,000, or 10,000 lists, ortwo or more collections may comprise less than 5, 10, 12, 15, 20, 20,30, 50, 80, 100, 120, 150, 200, 500, 1,000, 2,000, 5,000, 10,000 or20,000 lists. Further, each one of the collections may comprise morethan 1, 2, 5, 10, 12, 15, 20, 20, 30, 50, 80, 100, 120, 150, 200, 500,1,000, 2,000, 5,000, or 10,000 lists, or less than 5, 10, 12, 15, 20,20, 30, 50, 80, 100, 120, 150, 200, 500, 1,000, 2,000, 5,000, 10,000 or20,000 lists.

Any method herein may be used with a mapping function, and each listherein of any multiple distinct lists herein may be associated with, ormay be identified by, a distinct value that may be the result of themapping function on the IP addresses or on distinct values associatedwith the corresponding tunnel devices. Any distinct values herein may benumerical values that may correspond with a feature, an attribute, acharacteristic, or a property of an attribute type, or any combinationthereof. Alternatively or in addition, any distinct values herein may benumerical values that are random values or that may be sequentiallyallocated. Any mapping function herein may consist of, may comprise, ormay be based on, a hash function, and any distinct values herein may behash values. Any hash function herein may consist of, may comprise, ormay be based on, checksum, check digit, fingerprint, lossy compression,randomization, error-correcting code, or cipher. Further, any hashfunction herein may consist of, may comprise, or may be based on, SecureHash Algorithm (SHA) or modulo N function or operation, and any hashfunction herein may be according to, based on, or compatible with, IEEEStandard 754-1985. The number N may be the number of lists in themultiple distinct lists, and may be equal or higher than 1, 2, 5, 10,12, 15, 20, 20, 30, 50, 80, 100, 120, 150, 200, 500, 1,000, 2,000,5,000, or 10,000, or may be equal or less than 5, 10, 12, 15, 20, 20,30, 50, 80, 100, 120, 150, 200, 500, 1,000, 2,000, 5,000, 10,000 or20,000.

Any method herein may be used with a first device that may be connectedto the Internet and may be addressable in the Internet using a first IPaddress. The method may further comprise sending, by the first device tothe first server, a third message; receiving, by the first server fromthe first device, the third message; and storing, in the first server,the first IP address in the list, and adding the first device to thegroup of tunnel devices, so that the first device can be selected as atunnel device as part of the selecting by the first server. The thirdmessage may comprise at least one value relating to at least oneattribute type associated with the first device. Any method herein mayfurther comprise storing, in the first server, the at least one value,as associated with the first device or with the first IP address,establishing a connection between the first server and the first device,and the first server may initiate communication with the first deviceusing the established connection. Any connection or any establishedconnection herein may be a TCP connection using ‘Active OPEN’, ‘PassiveOPEN’, or TCP keepalive mechanism, or may use, or may be based on, aVirtual Private Network (VPN).

Any method herein may further comprise, for each of the tunnel devicesin the group, sending, by the tunnel device to the first server, a thirdmessage; receiving, by the first server from the tunnel device, thethird message; and storing, in the first server, the IP address of thetunnel device in the list, and adding the tunnel device to the group oftunnel devices, so that the tunnel device may be selected as a tunneldevice as part of the selecting by the first server. The third messagemay comprise at least one value relating to at least one attribute typeassociated with the tunnel device. Any method herein may furthercomprise, storing, in the first server, the at least one value, asassociated with the tunnel device or with the tunnel device IP address.Any method herein may further comprise, establishing a connectionbetween the first server and the tunnel device, and the first server mayinitiate communication with the tunnel device using the establishedconnection, and the established connection may be a TCP connection using‘Active OPEN’, ‘Passive OPEN’, or TCP keepalive mechanism, or may use,or may be based on, a Virtual Private Network (VPN).

Each of the messages herein, such as the first and second messages, maycomprise the content identifier, and the sending by the selected tunneldevice to the web server of the content request that comprises thecontent identifier may be in response to the received second message.The sending, by the selected tunnel device to the second server of thecontent may comprises sending, by the selected tunnel device to thefirst server, the content; receiving, by the first server from theselected tunnel device, the content; sending, by the first server to thesecond server, the content; and receiving, by the second server from thefirst server, the content.

Any message herein, such as the second message, may comprise the IPaddress of the second server. In response to the receiving of the secondmessage, any method herein may comprise initiating a communication, bythe selected tunnel device with the second server. The initiating of thecommunication by the selected tunnel device may use, or may be based on,Network Address Translator (NAT) traversal scheme, which may beaccording to, may be based on, or may use, Internet Engineering TaskForce (IETF) Request for Comments (RFC) 2663, IETF RFC 3715, IETF RFC3947, IETF RFC 5128, IETF RFC 5245, IETF RFC 5389, or IETF RFC 7350.Alternatively or in addition, any NAT traversal scheme herein may beaccording to, may be based on, or may use, Traversal Using Relays aroundNAT (TURN), Socket Secure (SOCKS), WebSocket (ws) or WebSocket Secure(wss), NAT ‘hole punching’, Session Traversal Utilities for NAT (STUN),Interactive Connectivity Establishment, (ICE), UPnP Internet GatewayDevice Protocol (IGDP), or Application-Level Gateway (ALG).

In response to the communication initiated by the selected tunneldevice, any method herein may further comprise, sending, by the secondserver to the selected tunnel device, the content identifier, and thesending, by the selected tunnel device to the web server of the contentrequest, may be in response to receiving the content identifier from thesecond server. Alternatively or in addition, the sending, by theselected tunnel device to the second server of the content may comprisesending, by the selected tunnel device to the second server, the contentusing the initiated communication.

Any communication over the Internet between the selected tunnel deviceand the second server, may be based on, may use, or may be compatiblewith, Transmission Control Protocol over Internet Protocol (TCP/IP)protocol or connection. Any communication over the Internet between theselected tunnel device and the second server, may be based on, may use,or may be compatible with, HTTP or HTTPS protocol or connection, and thesecond server may serve as an HTTP or HTTPS server respectively and theselected tunnel device may serve as an HTTP or HTTPS clientrespectively.

Any communication over the Internet between the selected tunnel deviceand the second server, may be based on, may use, or may be compatiblewith, Socket Secure (SOCKS) protocol or connection, and the secondserver may serve as an SOCKS server and the selected tunnel device mayserve as an SOCKS client. Any SOCKS protocol or connection herein may beaccording to, may be based on, or may be compatible with, SOCKS4,SOCKS4a, or SOCKS5. Alternatively or in addition, any SOCKS protocol orconnection herein may be according to, may be based on, or may becompatible with, IETF RFC 1928, IETF RFC 1929, IETF RFC 1961, or IETFRFC 3089. Alternatively or in addition, any communication between anytwo entities herein, such as over the Internet between the selectedtunnel device and the second server, may be based on, may use, or may becompatible with, Socket Secure (SOCKS) or WebSocket (ws), which may beWebSocket Secure (wss), protocol or connection, and the second servermay serve as an SOCKS or WebSocket server and the selected tunnel devicemay serve as an WebSocket client. Any WebSocket protocol or connectionherein may be according to, may be based on, or may be compatible with,IETF RFC 6455. Any communication over the Internet between the selectedtunnel device and the second server, may be based on, may use, or may becompatible with, HTTP Proxy protocol or connection, and the secondserver may serve as an HTTP Proxy server and the selected tunnel devicemay serve as an HTTP Proxy client. Any method herein may furthercomprise establishing a connection between the second server and theselected tunnel device, and the second server may initiate communicationwith the selected tunnel device using the established connection.

Any method herein may further comprise sending, by the second server tothe client device, the IP address of the selected tunnel device;receiving, by the client device from the second server, the IP addressof the selected tunnel device; and storing, by the client device, thereceived IP address of the selected tunnel device. Any method herein maybe used with a first IP address stored in the client device, and therequest message may comprise the first IP address. The first message maycomprise the first IP address, and the selecting, by the first server ofthe tunnel device from the list of tunnel devices may be based on, ormay be in response to, the received first IP address. Any selectingherein by the first server of the tunnel device may comprise selecting atunnel device having the first IP address.

Any first tunnel device in the group may be operating in multiple statesthat may include an idle state and non-idle states. Any method hereinmay further comprise by the first tunnel device responsive to being inone of the non-idle states, determining, if an idling condition is met;responsive to the determination that the idling condition is met,shifting to the idle state; responsive to being in the idle state,determining if an idling condition is met; and responsive to thedetermination that the idling condition is not met, shifting to one ofthe non-idle states. The first tunnel device may be selected by thefirst server in response to the first tunnel device being in the idlestate. Any method herein may further comprise receiving, by the firstserver from the first tunnel device, a message responsive to the firsttunnel device state; and the first tunnel device may be selected by thefirst server in response to the first tunnel device state being the idlestate.

Any method herein may further comprise sending, by the first tunneldevice to the first server, a first status message in response toshifting to the idle state; and sending, by the first tunnel device tothe first server, a second status message in response to shifting to anon-idle state. The first tunnel device may be selected by the firstserver in response to the first or second status message. Any methodherein may further comprise receiving, by the first server from thefirst tunnel device, the first status message; and adding, the IPaddress of the first tunnel device to the list of IP addresses inresponse to received first status message. Any method herein may furthercomprise receiving, by the first server from the first tunnel device,the second status message; and removing, the IP address of the firsttunnel device from the list of IP addresses in response to receivedsecond status message. Any method herein may be used with an additionalidling condition, and any determining herein may comprise determining ifthe idling condition and the additional idling condition are met.

Any method herein may further comprise operating, by the first tunneldevice, an operating system or a program process or thread, and anyidling condition herein may be determined to be met based on, oraccording to, activating or executing the process or thread by theoperating system or the program. The process or thread may comprise alow-priority or background task, an idle process, or a screensaver.Further, the process or thread may comprise using the entire screen fordisplaying. Any method herein may further comprise monitoring ormetering, by the first tunnel device, a resource utilization, and anyidling condition herein may be determined to be met based on, oraccording to, the monitored or metered resource utilization being undera threshold, and the resource utilization may comprise the utilizationof a processor in the first tunnel device. Any tunnel device herein,such as the first tunnel device, may comprise an input device forobtaining an input from a human user or operator, and any the methodherein may further comprise sensing the input, by the any tunnel device(or the first tunnel device) using the input device, and any idlingcondition herein may be determined to be met based on, or according to,not receiving an input from the input device for a pre-set timeinterval. Any input device herein may comprise a pointing device, akeyboard, a touchscreen, or a microphone.

Any tunnel device herein, such as the first tunnel device, may comprisea motion sensor for sensing motion, acceleration, vibration, or locationchange of the first tunnel device, and any method herein may furthercomprise sensing, by any tunnel device (or the first tunnel device)using the motion sensor, the respective first tunnel device motion,acceleration, vibration, or location change, and any idling conditionherein may be determined to be met based on, or according to,respectively sensing the motion, the vibration, the acceleration, or thelocation change being under a threshold. Any the motion sensor hereinmay comprise an accelerometer, gyroscope, vibration sensor, or a GlobalPositioning System (GPS) receiver.

Any tunnel device herein, such as the first tunnel device, may comprisea network interface or a network transceiver for communication over anetwork (such as the Internet), and any method herein may furthercomprise metering, by any tunnel device (or the first tunnel device), anamount of data transmitted to, or received from, the network during atime interval, and any idling condition herein may be determined to bemet based on, or according to, the metered amount of data being under athreshold level. Any tunnel device herein, such as the first tunneldevice, may comprise a battery, and any method herein may furthercomprise metering or sensing, by any tunnel device (or the first tunneldevice), a battery charging level, and any idling condition herein maybe determined to be met based on, or according to, the metered or sensedcharge level being over a threshold level. The metering or sensing mayuse a Battery Management System (BMS), and the threshold level may beabove 40%, 50%, 60%, 70%, 80%, or 90% of the battery defined full chargecapacity.

Any method herein may be used with a first attribute type, any or eachof the tunnel devices in the group may be associated with a first valuerelating to the first attribute type, and any method herein may furthercomprise, storing, by the first server, the first value for associatedeach of the tunnel devices in the group. Any first value herein maycomprise a numeric value or an identifier of a feature, acharacteristic, or a property of the first attribute type. Any selectingherein, of a tunnel device by the first server, may be based on thefirst value associated with the selected tunnel device, and any methodherein may further comprise sending, by each of the tunnel devices inthe group to the first server, the respective first value to the firstserver, and receiving, by the first server, the sent first value.

Any message herein, such as the request message and the first message,may comprise one or more values, and any selecting herein, of the tunneldevice by the first server, may be based on comparing the one or morevalues to the first value associated with the selected tunnel device.Alternatively or in addition, any message herein, such as the requestmessage and the first message, may comprise a requested value, and theselecting, of the tunnel device by the first server, may be based on therequested value being equal to the first value associated with theselected tunnel device. Alternatively or in addition, any messageherein, such as the request message and the first message, may comprisemultiple values, and any selecting herein, of the tunnel device by thefirst server, may be based on the first value of the associated with theselected tunnel device being equal to one of the multiple values. Anyvalue herein, such as of the first attribute type, may be numericalvalue, and the request message and the first message may comprise aminimum value, and any selecting, of the tunnel device by the firstserver, may be based on the first value of the associated with theselected tunnel device being higher than the minimum value.Alternatively or in addition, values of the first attribute type arenumerical values, and the request message and the first message maycomprise a maximum value, and any selecting herein, of the tunnel deviceby the first server, may be based on the first value of the associatedwith the selected tunnel device being lower than the maximum value.Alternatively or in addition, the request message and the first messagemay further comprise a minimum value, and any selecting herein, of thetunnel device by the first server, may be based on the first value ofthe associated with the selected tunnel device being higher than theminimum value.

Any method herein may be used with a second attribute type, and each ofthe tunnel devices in the group may be associated with a second valuerelating to the second attribute type, and any method herein may furthercomprise, storing, by the first server, the second value for associatedeach of the tunnel devices in the group. Any selecting herein, of thetunnel device by the first server, may be based on the first and secondvalues associated with the selected tunnel device. Any method herein mayfurther comprise sending, by each of the tunnel devices in the group tothe first server, the respective first and second values to the firstserver, and receiving, by the first server, the sent first and secondvalues.

Any message herein, such as the request message and the first message,may comprise a first set of one or more values and a second set of oneor more values, and any selecting herein, of the tunnel device by thefirst server, may be based on respectively comparing the first andsecond sets to the first and second values associated with the selectedtunnel device. Any selected tunnel device herein may be selected by thefirst server so that the first value may be included in the first setand the second value may be included in the second set. Alternatively orin addition, any selected tunnel device herein may be selected by thefirst server so that the first value is included in the first set or thesecond value is included in the second set. Alternatively or inaddition, any selected tunnel device herein may be selected by the firstserver so that the first value is included in the first set and thesecond value is not included in the second set.

Any first attribute type herein may comprise a geographical location,and each of the first values may comprise a name or an identifier of acontinent, a country, a region, a city, a street, a ZIP code, or atimezone. Any first value herein of each of the tunnel devices in thegroup or each of the IP addresses may be based on IP geolocation thatmay be based on W3C Geolocation API. Any method herein may be used witha database associating IP addresses to geographical locations, thedatabase may be stored in the first server, and any method herein mayfurther comprise receiving and storing, by the first server, thedatabase, and any method herein may further comprise estimating orassociating the first value to each of the tunnel devices in the groupby the database. Alternatively or in addition, any first attribute typeherein may comprise identification of an Internet Service Provider (ISP)or an Autonomous System Number (ASN), and each of the first valuescomprises respectively a name or an identifier of the ISP or the ASNnumber.

Any first attribute type herein may correspond to a hardware or softwareof tunnel devices. Any first attribute type herein may comprise thehardware of tunnel devices, such as stationary or portable values,respectively based on the tunnel device being stationary or portable.Any first attribute type herein may comprise a program or a softwareapplication the (such as an operating system) installed, used, oroperated, in tunnel devices, such as he type, make, model, or version ofthe software.

Any first attribute type herein may corresponds to a communicationproperty, feature of a communication link of tunnel devices, and thecommunication link may correspond to the respective connection to theInternet of tunnel devices. Alternatively or in addition, thecommunication link may correspond to a communication link of a tunneldevice with the web server, the first server, the second server, or theclient device. The first attribute may correspond to a bandwidth (BW) orRound-Trip delay Time (RTT) of the communication link, and any firstvalue herein may be the respective estimation or measurement of the BWor RTT. Any method herein may further comprise estimating or measuring,by the first server or by a tunnel device, the BW or RTT of thecommunication link. Alternatively or in addition, any first attributetype herein may correspond to the technology or scheme used by thetunnel devices for connecting to the Internet, and any first valuesherein may comprise wired or wireless values, respectively based on thetunnel device being connected to the Internet using wired or wirelessconnection.

Any method herein may be used with a plurality of servers that includesthe first server, each of the plurality of servers may be connectable tothe Internet, may be addressable in the Internet using a respective IPaddress, and may store a respective list of IP addresses of the tunneldevices that are part of the group. Any method herein may furthercomprise selecting, by the second server, the first server from theplurality of servers; and the selecting of the tunnel device by thefirst server may comprise selecting a tunnel device from the respectivelist of IP addresses of the respective selected first server. The firstserver may be randomly selected by the second server from the pluralityof servers, such as by using one or more random numbers generated by arandom number generator.

Any selection herein may be a random selection by using one or morerandom numbers generated by a random number generator. The random numbergenerator may be using thermal noise, shot noise, nuclear decayingradiation, photoelectric effect, or quantum phenomena. Alternatively orin addition, the random number generator may be software based, and therandom number generator may be based on executing an algorithm forgenerating pseudo-random numbers.

Any server herein, and each of the plurality of servers, may beassociated with a one of more attribute values relating to an attributetype, and any server herein, such as the first server, may be selectedby the second server from the plurality of servers based on, oraccording to, the respective one of more attribute values. Any attributetype herein may be a geographical location, and one of more attributevalues herein may comprise a name or an identifier of a continent, acountry, a region, a city, a street, a ZIP code, or a timezone. Any oneof the one of more attribute values may be based on actual geographicallocation or on IP geolocation, which may be based on W3C GeolocationAPI, and any request message herein may comprise the one of moreattribute values.

Any method herein may be used with a plurality of servers that mayinclude the first server, each of the plurality of servers may beconnectable to the Internet, may be addressable in the Internet using arespective IP address, and may store a respective list of IP addressesof the tunnel devices that are part of the group. Any method herein mayfurther comprise for each of the tunnel devices in the group, selecting,by the respective tunnel device, the first server from the plurality ofservers; sending, by the tunnel device to the selected first server, athird message; receiving, by the selected first server from therespective tunnel device, the third message; and storing, in theselected first server, the IP address of the respective tunnel device inthe list, and adding, by the selected first server, the respectivetunnel device to the group of tunnel devices, so that the respectivetunnel device can be selected as a tunnel device as part of theselecting by the selected first server.

The first server may be randomly selected by the respective tunneldevice from the plurality of servers. Each of the plurality of serversmay be associated with a one of more attribute values relating to anattribute type, and the first server may be selected by the respectivetunnel device from the plurality of servers based on, or according to,the respective one of more attribute values. Any attribute type hereinmay be a geographical location, and one of more attribute values maycomprise a name or an identifier of a continent, a country, a region, acity, a street, a ZIP code, or a timezone. Any one of the one of moreattribute values may be based on actual geographical location or on IPgeolocation, which may be based on W3C Geolocation API, and any requestmessage herein may comprise the one of more attribute values.

Any method herein may be used with a Domain Name System (DNS) server,and any content identifier herein may comprise a domain name. Any methodherein may further comprise performing, by the client device using theDNS server, a DNS resolution for obtaining a numerical IP address, andthe request message, the first message, and the second message maycomprise the obtained numerical IP address. Alternatively or inaddition, any method herein may further comprise performing, by thesecond server using the DNS server, a DNS resolution for obtaining anumerical IP address, and any request message herein may comprise thedomain name, and the first message and the second message may comprisethe obtained numerical IP address. Alternatively or in addition, anymethod herein may further comprise performing, by the selected tunneldevice using the DNS server, a DNS resolution for obtaining a numericalIP address, and each of the request message, the first message, and thesecond message may comprise the domain name.

Any content herein may comprise a web-page or a web-site. Any contentidentifier herein may be, or may comprise, a Uniform Resource Identifier(URI) or a Uniform Resource Locator (URL). Any or each of each of the IPaddresses herein may be in IPv4 or IPv6 form. Any web server herein mayuse HyperText Transfer Protocol (HTTP) or HTTP Secure (HTTPS) forresponding to respective HTTP or HTTPS requests via the Internet, andany content request herein may be, or may comprise, an HTTP or an HTTPSrequest. Any communication over the Internet herein, such as between theclient device and the second server, between the second server and thefirst server, between the first server and the selected tunnel device,or between the selected tunnel device and the web server, may be basedon, may use, or may be compatible with, Transmission Control Protocolover Internet Protocol (TCP/IP) protocol or connection. Alternatively orin addition, the communication over the Internet between the clientdevice and the second server, between the second server and the firstserver, between the first server and the selected tunnel device, andbetween the selected tunnel device and the web server, may be based on,may use, or may be compatible with, Transmission Control Protocol overInternet Protocol (TCP/IP) protocol or connection.

Any method herein may further be used for redundancy or resiliency, andmay further comprise selecting, by any device, such as the first server,an additional IP address associated with any device, such as anadditional tunnel device from the list of tunnel devices, in response tothe received first message; sending, by any device, such as theadditional tunnel device, to any device, such as the web server, acontent request that may comprise the content identifier; receiving, byany device, such as the additional tunnel device, from any device, suchas the web server, the content, in response to the content request; andreceiving, by any device such as the client device, from any device,such as the second server, the content received by the additional tunneldevice in response to the request message. Any selecting herein of theadditional IP address may be performed after the sending of the contentrequest by the selected tunnel device, or alternatively before thesending of the content request by the selected tunnel device.

Any method herein may further comprise sending, by any device, such asthe first server, to any device, such as the additional tunnel device,an additional message using an IP address of the additional tunneldevice; receiving, by any device, such as the additional tunnel devicefrom any device, such as the first server, the additional message;sending, by any device, such as the additional tunnel device, to anydevice, such as the second server, the content; receiving, by anydevice, such as the second server, from any device, such as theadditional tunnel device, the content; and sending, by any device, suchas the second server to any device, such as the client device, thecontent.

Any selecting herein, such as by the first server, of an IP addressassociated with a tunnel device may comprise selecting, by any device,such as the first server, any multiple IP addresses respectivelyassociated with multiple tunnel devices from the list of tunnel devices,in response to the received first message. At least two of, or all of,the multiple IP addresses may be selected in parallel. Alternatively orin addition, at least two of, or all of, the multiple IP addresses maybe sequentially selected. Any method herein may further comprise, foreach tunnel device from the multiple tunnel devices, receiving, by anydevice, such as the client device, the content from the tunnel device,in response to the request message. The content from at least two of, orall of, any multiple tunnel devices, may be sequentially received or inparallel. Any method herein may further comprise selecting and using, byany device, such as the client device, a content received from one ofany multiple tunnel devices, such as the content first received from oneof the multiple tunnel devices. Any method herein may further comprisediscarding, by any device, such as the client device, the contentreceived from non-selected ones of any multiple tunnel devices, orcomparing, by any device, such as the client device, the contentreceived from two or more of any multiple tunnel devices.

Any method herein may further comprise, for each tunnel device from anymultiple tunnel devices, sending, by any device, such as the tunneldevice to any device, such as the web server, a content request that maycomprise the content identifier; and receiving, by any device, such asthe tunnel device from any device, such as the web server, the content,in response to the content request. Any sending of the content request,or any receiving of the content from the web server, by at least two of,or all of, the multiple tunnel devices, may be performed sequentially orin parallel. Any protocols used by at least two of, or all of, anymultiple tunnel devices, for the receiving of the content from the webserver, may be identical, or may be different from each other.

Any method herein may further comprise, for each tunnel device from anymultiple tunnel devices, sending, by any device, such as the firstserver, to any device, such as the tunnel device, any second messageusing an IP address of the tunnel device; and receiving, by any device,such as the tunnel device, from any device, such as the first server,the second message. Any sending of the second message by any device,such as by the first server to, or the receiving of the content from anydevice such as the first server by, at least two of, or all of, themultiple tunnel devices, may be performed sequentially or in parallel.Any protocols used by at least two of, or all of, any multiple tunneldevices, for the receiving of the content from any device such as thefirst server, may be identical or may be different from each other.

Any method herein may further comprise, for each tunnel device from anymultiple tunnel devices sending, by any device, such as the tunneldevice to the any device, such as the second server, the content;receiving, by any device, such as the second server from any device,such as the tunnel device, the content; sending, by any device such asthe second server, to any device, such as the client device, thecontent; and receiving, by any device such as the client device, fromany device, such as the second server, the content in response to therequest message. Any sending of the content to the second server, or anyreceiving of the content from the second server, by at least two of, orall of, the multiple tunnel devices, may be performed sequentially or inparallel. Any protocols used by at least two of, or all of, the multipletunnel devices, for the sending of the content to the second server, maybe identical, or may be different from each other.

The number of any selected multiple IP addresses herein may be equal to,or more than, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, 20, 30, 35, 40, 45,50, 60, 70, or 100 IP addresses. Further, the number of any selectedmultiple IP addresses herein may be less than, 3, 4, 5, 6, 7, 8, 9, 10,12, 15, 20, 30, 35, 40, 45, 50, 60, 70, 100, or 150 IP addresses. Anylist of the IP addresses herein may comprise, or may consist of,multiple distinct lists, and each of the multiple distinct lists maycomprise one or more of the IP addresses associated with the tunneldevices in the group, and any multiple IP addresses herein may be partof the same list of the multiple distinct lists.

Any method herein may further comprise sending, by any device, such asthe client device, to any device, such as the second server, anadditional request message that may comprise the content identifier; andreceiving, by any device, such as the client device, the content inresponse to the additional request message. Any method herein mayfurther comprise receiving, by any device, such as the second server,from any device, such as the client device, the additional requestmessage; sending, by any device, such as the second server, to anydevice, such as the first server, an additional first message;receiving, by any device, such as the first server, from any device,such as the second server, the additional first message; selecting, byany device, such as the first server, an additional IP addressassociated with an additional tunnel device from the list of tunneldevices, in response to the received additional first message; sending,by any device, such as the selected additional tunnel device, to anydevice, such as the web server, a content request that comprises thecontent identifier; and receiving, by any device, such as the selectedadditional tunnel device, from any device, such as the web server, thecontent, in response to the content request. Further, any method hereinmay further comprise sending, by any device, such as the first server tothe selected additional tunnel device, an additional second messageusing the additional IP address of the selected first tunnel device;receiving, by any device, such as the selected additional tunnel device,from any device, such as the first server, the additional secondmessage; sending, by any device, such as the selected additional tunneldevice, to any device, such as the second server, the content;receiving, by any device, such as the second server, from any device,such as the selected additional tunnel device, the content; and sending,by any device, such as the second server, to any device, such as theclient device, the content.

Any sending of any additional request message may be at least in part inparallel to, or after, any sending of any other request message. Anyreceiving, by any device, such as the client device, the content inresponse to the additional request message may be in parallel, or after,the receiving, by any device, such as the client device, the content inresponse to any other request message. Any method herein may furthercomprise selecting and using, by any device, such as the client device,one of the content received in response to any additional requestmessage and the content received in response to any other requestmessage, such as selecting and using, the first received content. Anymethod herein may further comprise discarding, by any device, such asthe client device, the content received from non-selected one of thecontent received in response to multiple request messages.

Any method herein may further comprise sending, by any device, such asthe client device, to any device such as the second server, multiplerequest messages, and each of the multiple request messages may comprisethe content identifier; and receiving, by any device, such as the clientdevice, the content in response each of to the multiple requestmessages. The number of sent multiple request messages herein may beequal to, or may be more than, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, 20,30, 35, 40, 45, 50, 60, 70, or 100 messages. Alternatively or inaddition, the number of sent multiple request messages herein may beless than 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, 20, 30, 35, 40, 45, 50, 60,70, 100, or 150 messages. The content received in response to at leasttwo of, or all of, any multiple request messages, may be receivedsequentially or in parallel. Any protocols used for the sending of atleast two of, or all of, the multiple request messages, or for thereceiving of the responses therefor, may be identical, or may bedifferent from each other. Any method herein may further compriseselecting and using, by any device, such as the client device, a contentreceived in response for one of the sent multiple request messages, suchas the first received content. Any method herein may further comprisediscarding, by any device, such as the client device, the contentreceived in response to the non-selected ones of the sent multiplerequest messages. Any method herein may further comprise comparing, byany device, such as the client device, the content received from inresponse to two or more sent multiple request messages.

Any method herein may further comprise receiving, by any device, such asthe second server, from any device, such as the client device, each ofthe of the multiple request messages; sending, by any device, such asthe second server, to any device, such as the first server, messages inresponse to the received multiple request messages; and receiving, byany device, such as the first server, from any device, such as thesecond server, the messages. Any method herein may further compriseselecting, by any device, such as the first server, for each one of themultiple request messages an IP address associated with a tunnel devicefrom any list of tunnel devices. Any list of the IP addresses herein maycomprise, or may consist of, multiple distinct lists, and each of themultiple distinct lists may comprise one or more of the IP addressesassociated with the tunnel devices in the group, and any selectedmultiple IP addresses herein may be part of the same list of themultiple distinct lists.

Any method herein may further comprise selecting, by any device, such asthe first server, an IP address associated with a tunnel device from thelist of tunnel devices, in response to each of the received firstmessage; sending, by any device, such as the first server, to anydevice, such as the selected tunnel device, multiple messages each usingan IP address of the selected tunnel devices; receiving, by any device,such as each of the selected tunnel devices from any device, such as thefirst server, the messages; sending, by any device, such as by each ofthe selected tunnel device, to any device, such as the web server, acontent request that may comprise the content identifier; receiving, byany device, such as by each of the selected tunnel device, from anydevice, such as the web server, the content, in response to the contentrequest; sending, by any device, such as by each of the selected tunneldevice, to any device, such as the second server, the content;receiving, by any device such as the second server, from any device,such as each of the selected tunnel device, the content; and sending, byany device, such as the second server, to any device, such as the clientdevice, each of the received content. The protocols used for at leasttwo of, or all of, any sending actions herein, or of the receivingactions herein, may be identical, or may be different from each other.At least two of, or all of, any sending actions herein, or any receivingactions herein, may be performed in parallel or sequentially.

Any communication over the Internet herein, such as between the clientdevice and the second server, between the second server and the firstserver, between the first server and the selected tunnel device, orbetween the selected tunnel device and the web server, may be based on,may use, or may be compatible with, HTTP or HTTPS protocol orconnection, and one of the node may serve as an HTTP or HTTPS serverrespectively and the other node may serve as an HTTP or HTTPS clientrespectively. Alternatively or in addition, the communication over theInternet between the client device and the second server, between thesecond server and the first server, between the first server and theselected tunnel device, and between the selected tunnel device and theweb server, may be based on, may use, or may be compatible with, HTTP orHTTPS protocol or connection, and one of the node may serve as an HTTPor HTTPS server respectively and the other node may serve as an HTTP orHTTPS client respectively. Any communication over the Internet betweenthe client device and the second server may be based on, may use, or maybe compatible with, HTTPS protocol or connection, and any requestmessage herein may be according to, may be based on, or may use, HTTPSframe or packet form. Any method herein may further comprise extracting,such as by the first or second server, the content identifier using SSLsniffing. Any request message herein may comprise an attribute valuecorresponding to an attribute type, and any method herein may furthercomprise extracting, by the first or second server, the attribute valueusing SSL sniffing.

Any communication over the Internet herein, such as between the clientdevice and the second server, between the second server and the firstserver, or between the first server and the selected tunnel device, maybe based on, uses, or may be compatible with, Socket Secure (SOCKS)protocol or connection, and one of the node may serve as an SOCKS serverrespectively and the other node may serve as an SOCKS clientrespectively. Any communication over the Internet herein between theclient device and the second server, may be based on, may use, or may becompatible with, Socket Secure (SOCKS) protocol or connection. Thesecond server may serve as an SOCKS server and the client device mayserve as an SOCKS client, or the second server may serve as an SOCKSclient and the client device may serve as an SOCKS server. Any SOCKSprotocol or connection herein may be according to, may be based on, ormay be compatible with, SOCKS4, SOCKS4a, or SOCKS5. Alternatively or inaddition, any SOCKS protocol or connection herein may be according to,may be based on, or may be compatible with, IETF RFC 1928, IETF RFC1929, IETF RFC 1961, or IETF RFC 3089.

Alternatively or in addition, any communication between any two entitiesherein, such as over the Internet between the client device and thesecond server, between the second server and the first server, orbetween the first server and the selected tunnel device, may be basedon, uses, or may be compatible with, Socket Secure (SOCKS) or WebSocket(ws), which may be WebSocket Secure (wss), protocol or connection, andthe second server may serve as an SOCKS or WebSocket server and theselected tunnel device may serve as an WebSocket client. Any WebSocketprotocol or connection herein may be according to, may be based on, ormay be compatible with, IETF RFC 6455.

Any communication over the Internet herein, such as between the clientdevice and the second server, between the second server and the firstserver, or between the first server and the selected tunnel device, maybe based on, uses, or may be compatible with, HTTP Proxy protocol orconnection, and one of the node may serve as an HTTP Proxy serverrespectively and the other node may serve as an HTTP Proxy clientrespectively. Any communication over the Internet herein between theclient device and the second server, may be based on, may use, or may becompatible with, HTTP Proxy protocol or connection. The second servermay serve as an HTTP Proxy server and the client device may serve as anHTTP Proxy client, or the second server may serve as an HTTP Proxyclient and the client device may serve as an HTTP Proxy server.

Any tunnel device, or any or each of the tunnel devices in the group maybe associated with a single IP address. One or more of the tunneldevices in the group may be associated with multiple IP addresses, suchas with more than 1,000, 2,000, 5,000, 10,000, 20,000, 50,000 or 100,000distinct IP addresses. A primary or sole functionality of any or each ofthe one or more of the tunnel devices may be to serve as a selectedtunnel device.

Any method herein may further comprise storing, operating, or using, byat least one of the tunnel devices in the group, or the selected tunneldevice, a server operating system. The server operating system mayconsist or, may comprise, or may be based on, Microsoft Windows Server®,Linux, or UNIX. Alternatively or in addition, the server operatingsystem may consist or, may comprise, or may be based on, one out ofMicrosoft Windows Server® 2003 R2, 2008, 2008 R2, 2012, or 2012 R2variant, Linux™ or GNU/Linux based Debian GNU/Linux, DebianGNU/kFreeBSD, Debian GNU/Hurd, Fedora™, Gentoo™, Linspire™, Mandriva,Red Hat® Linux, SuSE, and Ubuntu®, UNIX® variant Solaris™, AIX®, Mac™ OSX, FreeBSD®, OpenBSD, and NetBSD®. Any method herein may furthercomprise storing, operating, or using, by at least one of the tunneldevices in the group, or the selected tunnel device, a client operatingsystem. The client operating system may consist or, may comprise, or maybe based on, one out of Microsoft Windows 7, Microsoft Windows XP,Microsoft Windows 8, Microsoft Windows 8.1, Linux, and Google Chrome OS.Any Operating System (OS) herein, such as any server or client operatingsystem, may consist of, include, or be based on a real-time operatingsystem (RTOS), such as FreeRTOS, SafeRTOS, QNX, VxWorks, orMicro-Controller Operating Systems (μC/OS).

Any method herein may further comprise storing, operating, or using, byany client device, by at least one of the tunnel devices in the group,or the selected tunnel device, a web browser. The web browser mayconsist of, may comprise, or may be based on, Microsoft InternetExplorer, Google Chrome, Opera™, or Mozilla Firefox®. Alternatively orin addition, the web browser may be a mobile web browser, which mayconsist of, may comprise of, or may be based on, Safari, Opera Mini™, orAndroid web browser.

At least one of the tunnel devices in the group, or the selected tunneldevice, may be integrated in part or entirely in an appliance. A primaryfunctionality of the appliance may be associated with food storage,handling, or preparation, such as heating food, and the appliance may bea microwave oven, an electric mixer, a stove, an oven, or an inductioncooker. Alternatively or in addition, the appliance may be arefrigerator, a freezer, a food processor, a dishwasher, a food blender,a beverage maker, a coffeemaker, or an iced-tea maker. Alternatively orin addition, a primary function of the appliance may be associated withenvironmental control, and the appliance may consist of, or may be partof, an HVAC system. Alternatively or in addition, a primary function ofthe appliance may be associated with temperature control, and theappliance may be an air conditioner or a heater. Alternatively or inaddition, a primary function of the appliance may be associated withcleaning such as clothes cleaning, and the appliance may be a washingmachine, a clothes dryer, or a vacuum cleaner. Alternatively or inaddition, a primary function of the appliance may be associated withwater control or water heating. Alternatively or in addition, theappliance may be an answering machine, a telephone set, a home cinemamethod, a HiFi method, a CD or DVD player, an electric furnace, a trashcompactor, a smoke detector, a light fixture, or a dehumidifier.Alternatively or in addition, the appliance may be a battery-operatedportable electronic device, such as a notebook, a laptop computer, amedia player, a cellular phone, a Personal Digital Assistant (PDA), animage processing device, a digital camera, a video recorder, or ahandheld computing device.

Any integration herein may involve sharing a component, housing in sameenclosure, sharing same processor, mounting onto same surface, orsharing a same connector, which may be a power connector for connectingto a power source. Alternatively or in addition, the integration mayinvolve sharing the same connector for being powered from same powersource, or the integration may involve sharing same power supply.

Any device herein, such as at least one of the tunnel devices in thegroup, or the selected tunnel device, may be housed in a singleenclosure that may be a hand-held enclosure or a portable enclosure. Anydevice herein, such as at least one of the tunnel devices in the group,or the selected tunnel device, may be integrated with at least one of anotebook computer, a laptop computer, a media player, a Digital StillCamera (DSC), a Digital video Camera (DVC or digital camcorder), aPersonal Digital Assistant (PDA), a cellular telephone, a digitalcamera, a video recorder, or a smartphone, which may comprise, or may bebased on, an Apple iPhone 6 or a Samsung Galaxy S6.

Any method herein may further comprise storing, operating, or using anoperating system, by at least one of the tunnel devices in the group, orthe selected tunnel device. The operating system may be a mobileoperating system that may comprise Android version 2.2 (Froyo), Androidversion 2.3 (Gingerbread), Android version 4.0 (Ice Cream Sandwich),Android Version 4.2 (Jelly Bean), Android version 4.4 (KitKat), AppleiOS version 3, Apple iOS version 4, Apple iOS version 5, Apple iOSversion 6, Apple iOS version 7, Microsoft Windows® Phone version 7,Microsoft Windows® Phone version 8, Microsoft Windows® Phone version 9,or Blackberry® operating system.

Any method herein may further comprise, or may be preceded by,connecting to the Internet, by any device such as by at least one of thetunnel devices in the group or by the selected tunnel device, via awireless network.

A non-transitory computer readable medium may contain computerinstructions that, when executed by a computer processor, cause theprocessor to perform at least part of, or all of, the steps of anymethod herein. At least part of, or all of, the steps of any methodherein may be included in a Software development kit (SDK) that may beprovided as a non-transitory computer readable medium containingcomputer instructions, and any method herein may further compriseinstalling the SDK in any device herein. Any steps by any tunnel deviceherein may be included in a Software development kit (SDK) that may beprovided as a non-transitory computer readable medium containingcomputer instructions, and any method herein may further compriseinstalling the SDK on any or each of the tunnel devices in the group.Any client device herein, any server herein, such as the first server orthe second server, or the selected tunnel device, may comprise anon-transitory computer readable medium containing computer instructionsthat, when executed by a computer processor, cause the processor toperform at least part of the steps of any method herein. Any list hereinmay comprise at least 10,000, 20,000, 50,000, 100,000, 200,000, 500,000,1,000,000, 2,000,000, 5,000,000, or 10,000,000 IP addresses or tunneldevices.

The first and second servers may be owned, may be operated, or may becontrolled by an entity. Further, at least one of the tunnel devices inthe group may be owned, may be operated, or may be controlled by theentity. A tunnel device may be randomly selected by the first server.

Each identifier of any content herein or of any device herein may be anIP address (in IPv4 or IPv6 form) or a URL. Each of the servers may be aweb server using HyperText Transfer Protocol (HTTP) that responds toHTTP requests via the Internet, and the first and second requests may beHTTP requests. Each communication with a server may be based on, orusing, HTTP persistent connection.

Any communication with a network element, such as with the first device,the second device, the first server, or the second server, may be basedon, or be according to, TCP/IP protocol or connection, and may bepreceded by the step of establishing a connection. Further,communication between any two network elements, such as between thefirst device and the second device, may be over the establishedconnection. Any communication between any two network elements may useTCP, and the connection may be established by performing ‘Active OPEN’or ‘Passive OPEN’, may use a VPN, or may use a tunneling protocol. Anycontent herein, such as the first content, may include, consist of, orcomprise, a part or whole of files, text, numbers, audio, voice,multimedia, video, images, music, web-site page, or computer program.

Each of the network elements herein, such as any of the servers, maystore, operate, or use, a server operating system, that may be based on,comprise, or use, Microsoft Windows Server®, Linux, or UNIX, such asMicrosoft Windows Server® 2003 R2, 2008, 2008 R2, 2012, or 2012 R2variant, Linux™ or GNU/Linux based Debian GNU/Linux, DebianGNU/kFreeBSD, Debian GNU/Hurd, Fedora™, Gentoo™, Linspire™, Mandriva,Red Hat® Linux, SuSE, and Ubuntu®, UNIX® variant Solaris™, AIX®, Mac™ OSX, FreeBSD®, OpenBSD, and NetBSD®. Each of the network elements herein,such as the client device or any of the tunnel devices, may store,operate, or use, a client operating system, that may consist or,comprise of, or may be based on, Microsoft Windows 7, Microsoft WindowsXP, Microsoft Windows 8, Microsoft Windows 8.1, Linux, or Google ChromeOS. The client operating system may be a mobile operating system, suchas Android version 2.2 (Froyo), Android version 2.3 (Gingerbread),Android version 4.0 (Ice Cream Sandwich), Android Version 4.2 (JellyBean), Android version 4.4 (KitKat), Apple iOS version 3, Apple iOSversion 4, Apple iOS version 5, Apple iOS version 6, Apple iOS version7, Microsoft Windows® Phone version 7, Microsoft Windows® Phone version8, Microsoft Windows® Phone version 9, or Blackberry® operating system.Any Operating System (OS) herein, such as any server or client operatingsystem, may consist of, include, or be based on a real-time operatingsystem (RTOS), such as FreeRTOS, SafeRTOS, QNX, VxWorks, orMicro-Controller Operating Systems (μC/OS).

Any apparatus or device herein, such as any one or more of the clientdevices or of the tunnel devices, may consist of, may comprise, may beintegrated with, or may be part of, a wearable device that may bewearable on a person. Any wearable device herein may be wearable on anorgan of the person head, such as an eye, ear, face, cheek, nose, mouth,lip, forehead, or chin. Alternatively or in addition, any wearabledevice herein may be constructed to have a form substantially similarto, may be constructed to have a shape allowing mounting or wearingidentical or similar to, or may be constructed to have a form to atleast in part substitute for, headwear, eyewear, or earpiece. Anyheadwear herein may consist of, may be structured as, or may comprise, abonnet, a cap, a crown, a fillet, a hair cover, a hat, a helmet, a hood,a mask, a turban, a veil, or a wig. Any eyewear herein may consist of,may be structured as, or may comprise, glasses, sunglasses, a contactlens, a blindfold, or a goggle. Any earpiece herein may consist of, maybe structured as, or may comprise, a hearing aid, a headphone, aheadset, or an earplug. Alternatively or in addition, any wearabledevice herein may be shaped for permanently or releasably beingattachable to, or be part of, a clothing piece of a person, and anyattaching herein may use taping, gluing, pinning, enclosing,encapsulating, a pin, or a latch and hook clip. Any clothing pieceherein may be a top, bottom, or full-body underwear, or a headwear, afootwear, an accessory, an outwear, a suit, a dress, a skirt, or a top.Alternatively or in addition, any wearable device herein may furthercomprises an annular member defining an aperture therethrough that issized for receipt therein of a part of a human body. Any the human bodypart herein may be part of a human hand that consists of, or comprises,an upper arm, elbow, forearm, wrist, or a finger. Further, any humanbody part herein may be part of a human head or neck that may consistof, or may comprise, a forehead, ear, skull, or face. Alternatively orin addition, any human body part herein may be part of a human thorax orabdomen that may consist of, or may comprise, a waist or hip. Further,any human body part herein may be part of a human leg or foot that mayconsist of, or may comprise, a thigh, calf, ankle, instep, knee, or toe.

Any system or method herein may implement redundancy, where the systemor method may include one or more additional identical, similar, ordifferent element, such as using two or more identical or similar slicesor any other content parts, using two or more identical or similarnetwork elements performing identical or similar functionalities, usingtwo or more identical or similar hardware pieces performing identical orsimilar functionalities, or using two or more data-paths transportingidentical or similar information. The redundancy may be based on DualModular Redundancy (DMR), Triple Modular Redundancy (TMR), QuadrupleModular Redundancy (QMR), 1:N Redundancy, ‘Cold Standby’, or ‘HotStandby’.

The steps described herein may be sequential, and performed in thedescribed order. For example, in a case where a step is performed inresponse to another step, or upon completion of another step, the stepsare executed one after the other. However, in case where two or moresteps are not explicitly described as being sequentially executed, thesesteps may be executed in any order, or may be simultaneously performed.Two or more steps may be executed by two different network elements, orin the same network element, and may be executed in parallel usingmultiprocessing or multitasking.

A tangible machine-readable medium (such as a storage) may have a set ofinstructions detailing part (or all) of the methods and steps describedherein stored thereon, so that when executed by one or more processors,may cause the one or more processors to perform part of, or all of, themethods and steps described herein. Any of the network elements may be acomputing device that comprises a processor and a computer-readablememory (or any other tangible machine-readable medium), and thecomputer-readable memory may comprise computer-readable instructionssuch that, when read by the processor, the instructions causes theprocessor to perform the one or more of the methods or steps describedherein.

Any method herein may be used for fetching a content identified by acontent identifier to a client device from a web server, and may befurther used with a first and second servers and a tunnel device thatare each connected to the Internet and are each addressable in theInternet using a respective IP address. The method by the second servermay comprise receiving, from the client device, a request message thatcomprises the content identifier; sending, to the first server, a firstmessage; receiving, from the tunnel device or from the first server, thecontent; and sending, to the client device, the content, in response tothe request message. Any receiving of the content may comprisereceiving, from the tunnel device, the content. The method may furthercomprise responding to a communication initiated by the tunnel device,and the initiated communication by the tunnel device may use, or may bebased on, Network Address Translator (NAT) traversal scheme. Any NATtraversal scheme herein may be according to, may be based on, or mayuse, Internet Engineering Task Force (IETF) Request for Comments (RFC)2663, IETF RFC 3715, IETF RFC 3947, IETF RFC 5128, IETF RFC 5245, IETFRFC 5389, or IETF RFC 7350. Any NAT traversal scheme herein may beaccording to, may be based on, or may use, Traversal Using Relays aroundNAT (TURN), Socket Secure (SOCKS), Socket Secure (SOCKS) or WebSocket(ws), which may be WebSocket Secure (wss), NAT ‘hole punching’, SessionTraversal Utilities for NAT (STUN), Interactive ConnectivityEstablishment, (ICE), UPnP Internet Gateway Device Protocol (IGDP), orApplication-Level Gateway (ALG). The method may further comprise inresponse to the communication initiated by the tunnel device, sending,to the tunnel device, the content identifier.

The communication over the Internet with the tunnel device, with thefirst server, or with the client device, may be based on, may use, ormay be compatible with, Transmission Control Protocol over InternetProtocol (TCP/IP) protocol or connection. Further, the communicationover the Internet with the tunnel device, with the first server, or withthe client device, may be based on, may use, or may be compatible with,HTTP or HTTPS protocol or connection, and the second server may serve asan HTTP or HTTPS server respectively and the tunnel device may serve asan HTTP or HTTPS client respectively.

Furthermore, the communication over the Internet with the tunnel device,with the first server, or with the client device, may be based on, mayuse, or may be compatible with, Socket Secure (SOCKS) protocol orconnection, and the second server may serve as an SOCKS server andrespectively the tunnel device, the first server, or the client devicemay serve as an SOCKS client. Any SOCKS protocol or connection hereinmay be according to, may be based on, or may be compatible with, SOCKS4,SOCKS4a, or SOCKS5. Alternatively or in addition, any SOCKS protocol orconnection may be according to, may be based on, or may be compatiblewith, IETF RFC 1928, IETF RFC 1929, IETF RFC 1961, or IETF RFC 3089.Alternatively or in addition, any communication over the Internet withthe tunnel device, with the first server, or with the client device, maybe based on, may use, or may be compatible with, Socket Secure (SOCKS)or WebSocket (ws), which may be WebSocket Secure (wss), protocol orconnection, and the second server may serve as an SOCKS or WebSocketserver and the selected tunnel device may serve as an WebSocket client.Any WebSocket protocol or connection herein may be according to, may bebased on, or may be compatible with, IETF RFC 6455.

Further, the communication over the Internet with the tunnel device,with the first server, or with the client device, may be based on, mayuse, or may be compatible with, HTTP Proxy protocol or connection, andthe second server may serve as an HTTP Proxy server and respectively thetunnel device, the first server, or the client device may serve as anHTTP Proxy client. The method may further comprise establishing aconnection with the tunnel device, and the second server may initiatecommunication with the tunnel device using the established connection.The established connection may be a TCP connection using ‘Active OPEN’,‘Passive OPEN’, or TCP keepalive mechanism, or the establishedconnection may use, or may be based on, Virtual Private Network (VPN).

The method may further comprise sending, to the client device, the IPaddress of the tunnel device, may be used with a first IP address storedin the client device, and the request message may comprises the first IPaddress. Further, the first message may comprise the first IP address.The method may further be used with a plurality of servers that includesthe first server. Each of the plurality of servers may be connectable tothe Internet, and may be addressable in the Internet using a respectiveIP address. The method may further comprise selecting the first serverfrom the plurality of servers, such as where the first server israndomly selected from the plurality of servers. The first server may berandomly selected using one or more random numbers generated by a randomnumber generator, and the random number generator may be hardware orsoftware based. The random number generator may use thermal noise, shotnoise, nuclear decaying radiation, photoelectric effect, or quantumphenomena, or may be based on executing an algorithm for generatingpseudo-random numbers.

Each of any plurality of servers herein may be associated with a one ofmore attribute values relating to an attribute type, and the firstserver may be selected from the plurality of servers based on, oraccording to, the respective one of more attribute values. Any messageherein, such as the request message, may comprise the one of moreattribute values. The attribute type may be a geographical location, andone of more attribute values may comprise a name or an identifier of acontinent, a country, a region, a city, a street, a ZIP code, or atimezone. Further, one of more attribute values may be based on actualgeographical location or on IP geolocation, which may be based on W3CGeolocation Application Programming Interface (API).

Any method herein may be used with a Domain Name System (DNS) server,and any content identifier herein may comprise a domain name. Any methodherein may further comprise performing, using the DNS server, a DNSresolution for obtaining a numerical IP address, and any message herein,such as the request message, may comprise the domain name, and anymessage herein, such as the request message, such as the first message,may comprise the obtained numerical IP address.

The communication over the Internet with the client device may be basedon, may use, or may be compatible with, HTTPS protocol or connection,and any message herein, such as the request message, may be accordingto, may be based on, or may use, HTTPS frame or packet form. Any methodherein may further comprising extracting, by the first or second server,the content identifier using SSL sniffing. Any message herein, such asthe request message, may comprise an attribute value corresponding to anattribute type, and the method may further comprise extracting, theattribute value using SSL sniffing.

A non-transitory computer readable medium containing computerinstructions that, when executed by a computer processor, cause theprocessor to perform any part of, or all of, any of the methods herein.A server may comprise a non-transitory computer readable mediumcontaining computer instructions that, when executed by a computerprocessor, cause the processor to perform part of, or all of, any methodherein.

Any of the servers herein, such as the second server, may be storing,operating, or using, a server operating system, which may consist or,may comprise of, or may be based on, Microsoft Windows Server®, Linux,or UNIX. Alternatively or in addition, any server operating systemherein may consist of, may comprise of, or may be based on, MicrosoftWindows Server® 2003 R2, 2008, 2008 R2, 2012, or 2012 R2 variant, Linux™or GNU/Linux based Debian GNU/Linux, Debian GNU/kFreeBSD, DebianGNU/Hurd, Fedora™, Gentoo™ Linspire™, Mandriva, Red Hat® Linux, SuSE,and Ubuntu®, UNIX® variant Solaris™, AIX®, Mac™ OS X, FreeBSD®, OpenBSD,or NetBSD®. Any of the servers herein, such as the first and secondservers may be owned, operated, or controlled by an entity. Further, anytunnel device herein, may be owned, operated, or controlled by theentity.

A method for fetching a content identified by a content identifier byusing tunnel devices may be uses with a first and second servers and agroup of tunnel devices that are each connected to the Internet and areeach addressable in the Internet using a respective IP address. Thefirst server may store a list of the IP addresses associated with thetunnel devices in the group. The method by the first server may comprisereceiving, from the second server, a first message that includes thecontent identifier; selecting, an IP address associated with a tunneldevice from the list of tunnel devices, in response to the receivedfirst message; and sending, to the selected tunnel device, a secondmessage using an IP address of the selected tunnel device. The secondmessage may comprise the content identifier. The method may furthercomprise receiving, from the selected tunnel device, the content; andsending, to the second server, the content. The second message maycomprise the IP address of the second server.

The method may be used with a first device that is connected to theInternet and addressable in the Internet using a first IP address. Themethod may further comprise receiving, from the first device, a thirdmessage; and storing, the first IP address in the list, and adding thefirst device to the group of tunnel devices, so that the first devicecan be selected as a tunnel device as part of the selecting. The thirdmessage may comprise at least one value relating to at least oneattribute type associated with the first device, and the method mayfurther comprise storing, the at least one value, as associated with thefirst device or with the first IP address. The method may furthercomprise establishing a connection with the first device, and theinitiated communication with the first device may use the establishedconnection. The established connection may be a TCP connection using‘Active OPEN’, ‘Passive OPEN’, or TCP keepalive mechanism, or may use,or may be based on, Virtual Private Network (VPN).

Alternatively or in addition, the method may further comprise, for eachof the tunnel devices in the group, receiving, from each of the tunneldevices, a respective third message; storing, the IP address of thetunnel device in the list, and adding the tunnel device to the group oftunnel devices, so that the tunnel device can be selected as a tunneldevice as part of the selecting by the first server. The third messagemay comprise at least one value relating to at least one attribute typeassociated with the tunnel device, and the method may further comprisestoring, the at least one value, as associated with the tunnel device orwith the tunnel device IP address. Further, the method may furthercomprise establishing a connection with the tunnel device, and thecommunication may be initiated with the tunnel device using theestablished connection. The established connection may be a TCPconnection using ‘Active OPEN’, ‘Passive OPEN’, or TCP keepalivemechanism, or the established connection may use, or may be based on,Virtual Private Network (VPN).

The first message may comprises a first IP address, and the selecting,by the first server of the tunnel device from the list of tunnel devicesmay be based on, or may be in response to, the received first IPaddress. Alternatively or in addition, the selecting of the tunneldevice may comprise selecting a tunnel device having the first IPaddress.

The method may be used with a first tunnel device in the group that maybe operating in multiple states that may include an idle state andnon-idle states. The method may further comprise selecting the firsttunnel device in response to the first tunnel device being in the idlestate. The method may further comprise receiving, from the first tunneldevice, a message responsive to the first tunnel device state; and thefirst tunnel device may be selected in response to the first tunneldevice state being the idle state. Alternatively or in addition, themethod may further comprise receiving, from the first tunnel device, afirst status message; and adding, the IP address of the first tunneldevice to the list of IP addresses in response to received first statusmessage. Further, the method may further comprise receiving, from thefirst tunnel device, the second status message; and removing, the IPaddress of the first tunnel device from the list of IP addresses inresponse to received second status message.

The method may be used with a first attribute type, and each of thetunnel devices in the group may be associated with a first valuerelating to the first attribute type. The method may further comprisestoring, the first value for associated each of the tunnel devices inthe group. The first value may comprise a numeric value or an identifierof a feature, a characteristic, or a property of the first attributetype.

Any selecting of any tunnel device herein may be based on the firstvalue associated with the selected tunnel device, and any method hereinmay further comprise receiving, from each of the tunnel devices in thegroup, the respective first value. The first message may comprise one ormore values, and the selecting of the tunnel device, may be based oncomparing the one or more values to the first value associated with theselected tunnel device. Alternatively or in addition, the first messagemay comprise a requested value, and the selecting of the tunnel device,may be based on the requested value being equal to the first valueassociated with the selected tunnel device. Alternatively or inaddition, the first message may comprise multiple values, and theselecting of the tunnel device may be based on the first valueassociated with the selected tunnel device being equal to one of themultiple values. Any values herein of the first attribute type may benumerical values, and the first message may comprise a minimum value,and the selecting, of the tunnel device, may be based on the first valueof the associated with the selected tunnel device being higher than theminimum value. Alternatively or in addition, the values of the firstattribute type may be numerical values, and the first message maycomprise a maximum value, and the selecting of the tunnel device, may bebased on the first value associated with the selected tunnel devicebeing lower than the maximum value. Alternatively or in addition, thefirst message may comprise a maximum and a minimum values, and theselecting of the tunnel device, may be based on the first valueassociated with the selected tunnel device being lower than the maximumvalue and higher than the minimum value.

Any method herein may further be used with a second attribute type, andeach of the tunnel devices in the group may be associated with a secondvalue relating to the second attribute type, and the method may furthercomprise, storing the second value for associated each of the tunneldevices in the group. The selecting of the tunnel device may be based onthe first and second values associated with the selected tunnel device,and the method may further comprise receiving, from each of the tunneldevices in the group, the respective first and second values.Alternatively or in addition, the first message may comprise a first setof one or more values and a second set of one or more values, and theselecting of the tunnel device, may be based on respectively comparingthe first and second sets to the first and second values associated withthe selected tunnel device. Alternatively or in addition, the selectedtunnel device may be selected so that the first value is included in thefirst set and the second value is included in the second set.Alternatively or in addition, the selected tunnel device may be selectedso that the first value is included in the first set or the second valueis included in the second set. Further, the selected tunnel device maybe selected so that the first value is included in the first set and thesecond value is not included in the second set.

Any attribute type herein, such as the first attribute type, maycomprise a geographical location, and each of the first values maycomprise a name or an identifier of a continent, a country, a region, acity, a street, a ZIP code, or a timezone. Further, the first value ofeach of the tunnel devices in the group or each of the IP addresses maybe based on IP geolocation, which may be based on W3C Geolocation API.Any method herein may be used with a database associating IP addressesto geographical locations, and the database may be stored in the firstor second server. The method may further comprise receiving and storing,by the first or second server, the database, and estimating orassociating the first value to each of the tunnel devices in the groupby using the database. Any attribute herein, such as the first attributetype, may comprise Internet Service Provider (ISP) or Autonomous SystemNumber (ASN) identification, and each of the first values may compriserespectively a name or an identifier of the ISP or the ASN number.

Alternatively or in addition, the first attribute type may correspond toa hardware of software of tunnel devices. The first attribute type maycomprise the hardware of tunnel devices, such as stationary or portablevalues, respectively based on the tunnel device being stationary orportable. Alternatively or in addition, the first attribute type maycomprises a software application (such as an operating system)installed, used, or operated, in tunnel devices, and the first valuesmay comprise the type, make, model, or version of the software.

Alternatively or in addition, the first attribute type may correspond toa communication property, feature of a communication link of tunneldevices, such as corresponding to the respective connection to theInternet of tunnel devices or to the communication link of a tunneldevice with the first server or the second server. The first attributetype may correspond to a bandwidth (BW) or Round-Trip delay Time (RTT)of the communication link, and the first value may be the respectiveestimation or measurement of the BW or RTT. Any method herein mayfurther comprise estimating or measuring, by the first server or by atunnel device, the BW or RTT of the communication link. Alternatively orin addition, the first attribute type may correspond to the technologyor scheme used by the tunnel devices for connecting to the first server,and the first values may comprise wired or wireless values, respectivelybased on the tunnel device being connected to the Internet using wiredor wireless connection.

The method may be used with a Domain Name System (DNS) server, and thecontent identifier comprises a domain name. Any method herein mayfurther comprise performing, using the DNS server, a DNS resolution forobtaining a numerical IP address, and any message herein, such as thesecond message, may comprise the obtained numerical IP address.

Any communication herein, such as over the Internet with the secondserver or with the selected tunnel device, may be based on, may use, ormay be compatible with, Transmission Control Protocol over InternetProtocol (TCP/IP) protocol or connection. Alternatively or in addition,any communication over the Internet herein, such as with the secondserver or with the selected tunnel device, may be based on, may use, ormay be compatible with, HTTP or HTTPS protocol or connection, and one ofthe node may serve as an HTTP or HTTPS server respectively and the othernode may serve as an HTTP or HTTPS client respectively. Further, thecommunication over the Internet with the second server or with theselected tunnel device may be based on, may use, or may be compatiblewith, HTTP or HTTPS protocol or connection, and the first server mayserve as an HTTP or HTTPS server and respectively the second server orthe selected tunnel device may serve as an HTTP or HTTPS client. Anycommunication over the Internet herein, such as with the second serveror with the selected tunnel device, may be based on, may use, or may becompatible with, HTTPS protocol or connection, and any message herein,such as the first or second message, may be according to, may be basedon, or may use, HTTPS frame or packet form. Any method may furthercomprise extracting, the content identifier using SSL sniffing. Anymessage herein, such as the first or second message, may comprise anattribute value corresponding to an attribute type, and any methodherein may further comprise extracting the attribute value using SSLsniffing.

The communication over the Internet with the second server or with theselected tunnel device, may be based on, may use, or may be compatiblewith, Socket Secure (SOCKS) protocol or connection, and the first servermay serve as an SOCKS server respectively and the second server or theselected tunnel device may serve as an SOCKS client respectively. AnySOCKS protocol or connection herein may be according to, may be basedon, or may be compatible with, SOCKS4, SOCKS4a, or SOCKS5. Alternativelyor in addition, the SOCKS protocol or connection may be according to,may be based on, or may be compatible with, IETF RFC 1928, IETF RFC1929, IETF RFC 1961, or IETF RFC 3089. Alternatively or in addition, anycommunication over the Internet with the second server or with theselected tunnel device, may be based on, may use, or may be compatiblewith, Socket Secure (SOCKS) or WebSocket (ws), which may be WebSocketSecure (wss), protocol or connection, and the second server may serve asan SOCKS or WebSocket server and the selected tunnel device may serve asan WebSocket client. Any WebSocket protocol or connection herein may beaccording to, may be based on, or may be compatible with, IETF RFC 6455.

Further, any communication herein over the Internet with the secondserver or with the selected tunnel device, may be based on, may use, ormay be compatible with, HTTP Proxy protocol or connection, and the firstserver may serve as an HTTP Proxy server respectively and the secondserver or the selected tunnel device may serve as an HTTP Proxy clientrespectively.

Each of the tunnel devices in the group may be associated with a singleIP address. Alternatively or in addition, one or more of the tunneldevices in the group may be associated with multiple IP addresses, suchas with more than 1,000, 2,000, 5,000, 10,000, 20,000, 50,000 or 100,000distinct IP addresses. A primary or sole functionality of each of theone or more of the tunnel devices may be to serve as a selected tunneldevice.

In any device (client or server) selection herein, such as whenselecting a tunnel device, the device may be randomly selected. Thedevice (such as a tunnel device) may be randomly selected using one ormore random numbers generated by a random number generator, and therandom number generator may be hardware based, and may be is usingthermal noise, shot noise, nuclear decaying radiation, photoelectriceffect, or quantum phenomena. Alternatively or in addition, the randomnumber generator may be software based, and may be based on executing analgorithm for generating pseudo-random numbers.

A method for fetching a content identified by a content identifier to aclient device from a web server by using tunnel devices may use a groupof tunnel devices that may each be connected to the Internet and mayeach be addressable in the Internet using a respective IP address. Asecond server may be connected to the Internet and may be addressable inthe Internet using a respective IP address. The method may comprisesending, to the second server, a request message that comprises thecontent identifier; and receiving, from the second server, the contentin response to the request message. The method may be used with a firstattribute type and with a first value relating to the first attributetype, each of the tunnel devices in the group may be associated with afirst value relating to the first attribute type, and the requestmessage may comprise one or more values associated with the firstattribute type. The first value may comprise a numeric value or anidentifier of a feature, a characteristic, or a property of the firstattribute type, and the request message may comprise the one or morevalues, for selecting, of a tunnel device from the group, based oncomparing the one or more values to the first value associated with theselected tunnel device.

The method may be used with a second attribute type, and each of thetunnel devices in the group may be associated with a second valuerelating to the second attribute type. The request message may comprisea first set of one or more values and a second set of one or more valuesfor selecting of the tunnel device based on respectively comparing thefirst and second sets to the first and second values associated with theselected tunnel device. The first attribute type may comprise ageographical location, and each of the first values may comprise a nameor an identifier of a continent, a country, a region, a city, a street,a ZIP code, or a timezone. Alternatively or in addition, the first valueof each of the tunnel devices in the group or each of the IP addressesmay be based on IP geolocation, which may be based on, or may use, W3CGeolocation API. The method may be used with a database associating IPaddresses to geographical locations, and the database may be stored inthe first server. The method may further comprise receiving and storing,by the first server, the database, and estimating or associating thefirst value to each of the tunnel devices in the group by the database.

Alternatively or in addition, the first attribute type may compriseInternet Service Provider (ISP) or Autonomous System Number (ASN), andeach of the first values may comprise respectively a name or anidentifier of the ISP or the ASN number. Further, the first attributetype may correspond to a hardware of tunnel devices, and the firstvalues may comprise stationary or portable values, respectively based onthe tunnel device being stationary or portable. Alternatively or inaddition, the first attribute type may comprises a software application(such as an operating system) installed, used, or operated, in tunneldevices, and the first values may comprise the type, make, model, orversion of the software.

Alternatively or in addition, the first attribute type may correspond toa communication property, feature of a communication link of tunneldevices, such as to the respective connection to the Internet of tunneldevices, or to a communication link of a tunnel device with the webserver, the first server, the second server, or the client device. Thefirst attribute type may correspond to a bandwidth (BW) or Round-Tripdelay Time (RTT) of the communication link, and the first value may bethe respective estimation or measurement of the BW or RTT. The methodmay further comprise estimating or measuring, by the first server or bya tunnel device, the BW or RTT of the communication link. Further, thefirst attribute type may correspond to the technology or scheme used bythe tunnel devices for connecting to the Internet, and the first valuesmay comprise wired or wireless values, respectively based on the tunneldevice being connected to the Internet using wired or wirelessconnection.

The method may use a Domain Name System (DNS) server, and the contentidentifier may comprise a domain name, and the method may furthercomprise performing, using the DNS server, a DNS resolution forobtaining a numerical IP address, and the request message may comprisethe obtained numerical IP address.

The web server may use HyperText Transfer Protocol (HTTP) or HTTP Secure(HTTPS) for responding to respective HTTP or HTTPS requests via theInternet, and the content request may respectively be an HTTP or anHTTPS request. Further, the communication over the Internet between theclient device and the second server, may be based on, may use, or may becompatible with, Transmission Control Protocol over Internet Protocol(TCP/IP) protocol or connection. Alternatively or in addition, thecommunication over the Internet between the client device and the secondserver, may be based on, may use, or may be compatible with, HTTP orHTTPS protocol or connection, and one of the node may serve as an HTTPor HTTPS server respectively and the other node may serve as an HTTP orHTTPS client respectively, such as where the second server serves as anHTTP or HTTPS server respectively and the client device serves as anHTTP or HTTPS client respectively.

Alternatively or in addition, the communication over the Internetbetween the client device and the second server may be based on, mayuse, or may be compatible with, Socket Secure (SOCKS) protocol orconnection, and the second server may serve as an SOCKS server and theclient device may serve as an SOCKS client. The SOCKS protocol orconnection may be according to, may be based on, or may be compatiblewith, SOCKS4, SOCKS4a, or SOCKS5, or may be according to, may be basedon, or may be compatible with, IETF RFC 1928, IETF RFC 1929, IETF RFC1961, or IETF RFC 3089. Alternatively or in addition, any communicationover the Internet between the client device and the second server may bebased on, may use, or may be compatible with, Socket Secure (SOCKS) orWebSocket (ws), which may be WebSocket Secure (wss), protocol orconnection, and the second server may serve as an SOCKS or WebSocketserver and the selected tunnel device may serve as an WebSocket client.Any WebSocket protocol or connection herein may be according to, may bebased on, or may be compatible with, IETF RFC 6455.

Further, the communication over the Internet between the client deviceand the second server, may be based on, may use, or may be compatiblewith, HTTP Proxy protocol or connection, and the second server may serveas an HTTP Proxy server and the client device may serve as an HTTP Proxyclient.

At least part of steps of any method herein may be included in aSoftware development kit (SDK) that may be provided as a non-transitorycomputer readable medium containing computer instructions, and anymethod herein may further comprise installing the SDK. A method forfetching a content identified by a content identifier from a web serverby using a tunnel device may use first and second servers and a tunneldevice that are each connected to the Internet and are each addressablein the Internet using a respective IP address. The method by the tunneldevice may comprise receiving, from the first or second server, a firstmessage that comprises the content identifier; sending, to the webserver, a content request that comprises the content identifier;receiving, from the web server, the content, in response to the contentrequest; and sending, to the first or second server, the content. Thefirst message may be received from the first server, and the content maybe sent to the second server in response to the first message. Anysending, to the first or second server of the content may compriseexclusively sending, to the first server, the content; or sending, tothe second server, the content. The first message may comprise the IPaddress of the second server.

Any tunnel device herein may be addressable in the Internet using afirst IP address, and the method may further comprise sending, to thefirst server, a second message that may comprise at least one valuerelating to at least one attribute type associated with the tunneldevice. The method may further comprise establishing a connection withthe first server, and responding, to a communication initiating by thefirst server using the established connection. The establishedconnection may be a TCP connection using ‘Active OPEN’, ‘Passive OPEN’,or TCP keepalive mechanism or may use, or may be based on, VirtualPrivate Network (VPN).

The method may further comprise in response to the receiving of thefirst message, initiating a communication, with the second server. Theinitiating of the communication may use, or may be based on, a NetworkAddress Translator (NAT) traversal scheme, which may be according to,may be based on, or may use, Internet Engineering Task Force (IETF)Request for Comments (RFC) 2663, IETF RFC 3715, IETF RFC 3947, IETF RFC5128, IETF RFC 5245, IETF RFC 5389, or IETF RFC 7350. Further, the NATtraversal scheme may be according to, may be based on, or may use,Traversal Using Relays around NAT (TURN), Socket Secure (SOCKS), NAT‘hole punching’, Session Traversal Utilities for NAT (STUN), InteractiveConnectivity Establishment, (ICE), UPnP Internet Gateway Device Protocol(IGDP), or Application-Level Gateway (ALG).

The communication over the Internet with the first or second server, maybe based on, may use, or may be compatible with, Transmission ControlProtocol over Internet Protocol (TCP/IP) protocol or connection.Further, the communication over the Internet with the first or secondserver, may be based on, may use, or may be compatible with, HTTP orHTTPS protocol or connection, and the first or second server may serveas an HTTP or HTTPS server and the tunnel device may serve as an HTTP orHTTPS client. Alternatively or in addition, the communication over theInternet with the first or second server, may be based on, may use, ormay be compatible with, Socket Secure (SOCKS) protocol or connection,and the first or second server may serve as an SOCKS server and thetunnel device may serve as an SOCKS client. The SOCKS protocol orconnection may be according to, may be based on, or may be compatiblewith, SOCKS4, SOCKS4a, SOCKS5, IETF RFC 1928, IETF RFC 1929, IETF RFC1961, or IETF RFC 3089. Alternatively or in addition, any communicationover the Internet with the first or second server, may be based on, mayuse, or may be compatible with, Socket Secure (SOCKS) or WebSocket (ws),which may be WebSocket Secure (wss), protocol or connection, and thesecond server may serve as an WebSocket server and the selected tunneldevice may serve as an WebSocket client. Any WebSocket protocol orconnection herein may be according to, may be based on, or may becompatible with, IETF RFC 6455. Alternatively or in addition, thecommunication over the Internet with the first or second server, may bebased on, may use, or may be compatible with, HTTP Proxy protocol orconnection, and the first or second server may serve as an HTTP Proxyserver and the tunnel device may serve as an HTTP Proxy client.

Any device herein, such as any tunnel device, may further be operatingin multiple states that includes at least an idle state and non-idlestates. The method may further comprise responsive to being in one ofthe non-idle states, determining, if an idling condition is met;responsive to the determination that the idling condition is met,shifting to the idle state; responsive to being in the idle state,determining if an idling condition is met; and responsive to thedetermination that the idling condition is not met, shifting to one ofthe non-idle states. The method may further comprise sending, to thefirst server, a message responsive to the tunnel device state. Further,the method may further comprise sending, to the first server, a firststatus message in response to shifting to the idle state; and sending,to the first server, a second status message in response to shifting toa non-idle state.

The method may further comprise operating, an operating system or aprogram process or thread, and the idling condition may be determined tobe met based on, or according to, activating or executing the process orthread by the operating system or the program. The process or thread maycomprise any low-priority or background task, an idle process, or ascreensaver. Alternatively or in addition, the process or thread maycomprise using the entire screen for displaying. The method may furthercomprise monitoring or metering, a resource utilization, and the idlingcondition may be determined to be met based on, or according to, themonitored or metered resource utilization being under a threshold. Theresource utilization may comprise the utilization of a processor in thetunnel device.

Alternatively or in addition, the tunnel device may comprise an inputdevice for obtaining an input from a human user or operator, the methodfurther comprise sensing, using the input device, the input, and theidling condition may be determined to be met based on, or according to,not receiving an input from the input device for a pre-set timeinterval. Any input device herein may comprise a pointing device, akeyboard, a touchscreen, or a microphone. Alternatively or in addition,the tunnel device may comprise a motion sensor for sensing motion,acceleration, vibration, or location change of the tunnel device, themethod may further comprise sensing, using the motion sensor, the tunneldevice motion, acceleration, vibration, or location change, and theidling condition may be determined to be met based on, or according to,respectively sensing the motion, the vibration, the acceleration, or thelocation change being under a threshold. Any motion sensor herein maycomprise an accelerometer, gyroscope, vibration sensor, or a GlobalPositioning System (GPS) receiver.

Alternatively or in addition, the tunnel device may comprise a networkinterface or a network transceiver for communication over a network, themethod may further comprise metering, an amount of data transmitted to,or received from, the network during a time interval, and the idlingcondition may be determined to be met based on, or according to, themetered amount of data being under a threshold level. Further, thetunnel device may comprise a battery, the method may further comprisemetering or sensing, a battery charging level, and the idling conditionmay be determined to be met based on, or according to, the metered orsensed charge level being over a threshold level. The metering orsensing may use a Battery Management System (BMS), and the thresholdlevel may be above 40%, 50%, 60%, 70%, 80%, or 90% of the batterydefined full charge capacity.

Any tunnel device herein may be associated with a first value relatingto a first attribute type, and the first value may comprise a numericvalue or an identifier of a feature, a characteristic, or a property ofthe first attribute type. The method may further comprise sending, tothe first server, the first value to the first server. The method mayuse a second attribute type, the tunnel device may be associated with asecond value relating to the second attribute type, and the method mayfurther comprise sending, to the first server, the second value. Thefirst attribute type may comprise a geographical location, and each ofthe first values may comprise a name or an identifier of a continent, acountry, a region, a city, a street, a ZIP code, or a timezone. Thefirst value may be based on IP geolocation that may be based on W3CGeolocation API. The method may use any database associating IPaddresses to geographical locations. Furthermore, any first attributetype herein may comprise Internet Service Provider (ISP) or AutonomousSystem Number (ASN), and the first value may comprise a name or anidentifier of the ISP or the ASN number.

Any method herein may be used with a plurality of servers that includesthe first server, and each of the plurality of servers may beconnectable to the Internet and may be addressable in the Internet usinga respective IP address. Any method herein may further compriseselecting, such as randomly selecting, the first server from theplurality of servers. The first server may be randomly selected usingone or more random numbers generated by a random number generator, whichmay be hardware based, such as using thermal noise, shot noise, nucleardecaying radiation, photoelectric effect, or quantum phenomena.Alternatively or in addition, the random number generator may besoftware based, such as based on executing an algorithm for generatingpseudo-random numbers. Alternatively or in addition, the method may beused with a plurality of servers that may include the first server, andeach of the plurality of servers may be connectable to the Internet, andmay be addressable in the Internet using a respective IP address. Themethod may further comprise selecting, the first server from theplurality of servers; and sending, to the selected first server, asecond message. Any method herein may further comprise selecting, suchas randomly selecting, the first server from the plurality of servers.The first server may be randomly selected using one or more randomnumbers generated by a random number generator, which may be hardwarebased, such as using thermal noise, shot noise, nuclear decayingradiation, photoelectric effect, or quantum phenomena. Alternatively orin addition, the random number generator may be software based, such asbased on executing an algorithm for generating pseudo-random numbers.

Each of the plurality of servers may be associated with a one of moreattribute values relating to an attribute type, and the first server maybe selected from the plurality of servers based on, or according to, therespective one of more attribute values. The attribute type may be ageographical location, and one of more attribute values may comprise aname or an identifier of a continent, a country, a region, a city, astreet, a ZIP code, or a timezone. Further, each of the one of moreattribute values may be based on actual geographical location or on IPgeolocation, such as W3C Geolocation API. The first message may furthercomprise the one of more attribute values.

The method may be used with a Domain Name System (DNS) server, and thecontent identifier may comprise a domain name. The method may furthercomprise performing, using the DNS server, a DNS resolution forobtaining a numerical IP address, and the first message or the contentrequest may comprise the obtained numerical IP address. Any tunneldevice herein may be associated with a single IP address or withmultiple IP addresses. Any tunnel device herein may be associated withmore than 1,000, 2,000, 5,000, 10,000, 20,000, 50,000 or 100,000distinct IP addresses. Further, a primary or sole functionality of anytunnel device may be to serve as a tunnel device executing any methodherein. The method may further comprising storing, operating, or using,a client operating system, which may consist of, may comprise, or may bebased on, one out of Microsoft Windows 7, Microsoft Windows XP,Microsoft Windows 8, Microsoft Windows 8.1, Linux, and Google Chrome OS.Alternatively or in addition, the method may further comprise storing,operating, or using, a web browser, which may consist of, comprise, ormay be based on, Microsoft Internet Explorer, Google Chrome, Opera™, orMozilla Firefox®. Further, the web browser may be a mobile web browser,such as Safari, Opera Mini™, or Android web browser. Any OperatingSystem (OS) herein, such as any server or client operating system, mayconsist of, include, or be based on a real-time operating system (RTOS),such as FreeRTOS, SafeRTOS, QNX, VxWorks, or Micro-Controller OperatingSystems (μC/OS).

Any tunnel device herein may be integrated in part or entirely in anappliance, and a primary functionality of the appliance may beassociated with food storage, handling, or preparation. The primaryfunction of the appliance is heating food, and the appliance may be amicrowave oven, an electric mixer, a stove, an oven, or an inductioncooker. Alternatively or in addition, the appliance may be arefrigerator, a freezer, a food processor, a dishwasher, a food blender,a beverage maker, a coffeemaker, or an iced-tea maker. Further, theprimary function of the appliance may be associated with environmentalcontrol, and the appliance may consist of, or may be part of, an HVACsystem. Alternatively or in addition, the primary function of theappliance may be associated with temperature control, and the appliancemay be an air conditioner or a heater. Further, the primary function ofthe appliance may be associated with cleaning, the primary function maybe associated with clothes cleaning, and the appliance may be a washingmachine or a clothes dryer, or the appliance may be a vacuum cleaner.Alternatively or in addition, the primary function of the appliance maybe associated with water control or water heating. Further, theappliance may be an answering machine, a telephone set, a home cinemamethod, a HiFi method, a CD or DVD player, an electric furnace, a trashcompactor, a smoke detector, a light fixture, or a dehumidifier.Alternatively or in addition, the appliance may be a battery-operatedportable electronic device, such as a notebook, a laptop computer, amedia player, a cellular phone, a Personal Digital Assistant (PDA), animage processing device, a digital camera, a video recorder, or ahandheld computing device.

Any integration herein, such as with any appliance, may involve sharinga component, such as housing in same enclosure, sharing same processor,or mounting onto same surface. Further, any integration herein mayinvolve sharing a same connector, such as a power connector forconnecting to a power source, and the integration may involve sharingthe same connector for being powered from same power source, or theintegration may involve sharing same power supply.

Any device herein, such as any tunnel device herein, may be housed in asingle enclosure that may be a hand-held enclosure or a portableenclosure, and may further be integrated with at least one of a notebookcomputer, a laptop computer, a media player, a Digital Still Camera(DSC), a Digital video Camera (DVC or digital camcorder), a PersonalDigital Assistant (PDA), a cellular telephone, a digital camera, a videorecorder, or a smartphone. Any smartphone herein may comprise, or may bebased on, an Apple iPhone 6 or a Samsung Galaxy S6. Any method herein,such as any method by any tunnel device, may further comprise storing,operating, or using an operating system, which may be a mobile operatingsystem such as Android version 2.2 (Froyo), Android version 2.3(Gingerbread), Android version 4.0 (Ice Cream Sandwich), Android Version4.2 (Jelly Bean), Android version 4.4 (KitKat), Apple iOS version 3,Apple iOS version 4, Apple iOS version 5, Apple iOS version 6, Apple iOSversion 7, Microsoft Windows® Phone version 7, Microsoft Windows® Phoneversion 8, Microsoft Windows® Phone version 9, or Blackberry® operatingsystem.

Any device herein, such as any tunnel device herein, may perform as partof any method herein, connecting to the Internet, via a wirelessnetwork. The wireless network may comprise, or may consist of, aWireless Wide Area Network (WWAN), which may be a wireless broadbandnetwork, such as a WiMAX network that is according to, compatible with,or based on, IEEE 802.16-2009. Further, any wireless network herein maycomprise, or may consist of, a cellular telephone network, such as aThird Generation (3G) network that uses a protocol selected from thegroup consisting of UMTS W-CDMA, UMTS HSPA, UMTS TDD, CDMA2000 1×RTT,CDMA2000 EV-DO, and GSM EDGE-Evolution, or the cellular telephonenetwork may use a protocol selected from the group consisting of aFourth Generation (4G) network that uses HSPA+, Mobile WiMAX, LTE,LTE-Advanced, MBWA, or is based on IEEE 802.20-2008. Alternatively or inaddition, the wireless network may comprise, or may consist of, aWireless Personal Area Network (WPAN), which may be according to, may becompatible with, or may be based on, Bluetooth™, Bluetooth Low Energy(BLE), or IEEE 802.15.1-2005 standards, or the WPAN may be a wirelesscontrol network that may be according to, or based on, Zigbee™, IEEE802.15.4-2003, or Z-Wave™ standards. Alternatively or in addition, anywireless network herein may comprise, or may consist of, a WirelessLocal Area Network (WLAN), which may be according to, may be compatiblewith, or may be based on, a standard selected from the group consistingof IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE802.11n, and IEEE 802.11ac.

Any method herein may be used with a virtualization, where at least oneof the steps may be executed as part of a virtualized application aspart of a Virtual Machine (VM). Alternatively or in addition, the clientdevice or any part thereof, the web server or any part thereof, at leastone of the multiple tunnel devices or any part thereof, the first serveror any part thereof, or the second server or any part thereof, may beimplemented as virtual hardware. Further, any method herein may be usedwith a host computer that may implement the VM, and any method hereinmay further comprise executing, by the host computer, a hypervisor or aVirtual Machine Monitor (VMM), and any virtualized application herein orany hardware herein may use or may interface virtual hardware. Anyvirtualization herein may include, may be based on, or may uses, fullvirtualization, para-virtualization, or hardware assistedvirtualization. At least two devices that may be selected from a groupconsisting of the client device, the web server, at least one of themultiple tunnel devices, the first server, and the second server, may beimplemented as virtual hardware, and the at least two devices may bevirtualized by the same host computer that implements the VM.

Any method herein may be used with a virtualization, and anycommunication between any two entities selected from a group consistingof the client device, the web server, at least one of the multipletunnel devices, the first server, and the second server, may be executedas a virtualized network as part of a Virtual Machine (VM). Further, anymethod herein may be used with a host computer that may implement theVM, and any method herein may further comprise executing, by the hostcomputer, a hypervisor or a Virtual Machine Monitor (VMM), and thevirtualized network may use or may interface virtual hardware. Any suchnetwork or communication virtualization may include, may be based on, ormay use, full virtualization, para-virtualization, or hardware assistedvirtualization.

Any method herein may further comprise storing, operating, or using, anoperating system, such as part of the client device, the web server, atleast one of the multiple tunnel devices, the first server, the secondserver, or any combination thereof. The operating system may be executedas a guest operating system as part of a Virtual Machine (VM). Anymethod herein may be uses with a host computer that implements the VM,and the method may further comprise executing, by the host computer, ahypervisor or a Virtual Machine Monitor (VMM), and the guest operatingsystem may use or may interface virtual hardware. Such virtualizationmay include, may be based on, or may use, full virtualization,para-virtualization, or hardware assisted virtualization.

The above summary is not an exhaustive list of all aspects of thepresent invention. Indeed, it is contemplated that the inventionincludes all systems and methods that can be practiced from all suitablecombinations and derivatives of the various aspects summarized above, aswell as those disclosed in the detailed description below andparticularly pointed out in the claims filed with the application. Suchcombinations have particular advantages not specifically recited in theabove summary.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention is herein described, by way of non-limiting examples only,with reference to the accompanying drawings, wherein like designationsdenote like elements. Understanding that these drawings only provideinformation concerning typical embodiments of the invention and are nottherefore to be considered limiting in scope:

FIG. 1 illustrates schematically a block diagram of a computer connectedto the Internet;

FIG. 2 depicts schematically the Internet and computers connected to theInternet;

FIG. 2 a illustrates schematically a structure of an IP-based packet;

FIG. 3 illustrates schematically a simplified flowchart in a WDMarchitecture;

FIG. 3 a illustrates schematically a simplified flowchart in a Linuxarchitecture;

FIG. 3 b illustrates schematically a prior-art arrangement ofvirtualization;

FIG. 3 c illustrates schematically a prior-art arrangement of hostedarchitecture of virtualization;

FIG. 3 d illustrates schematically a prior-art arrangement of bare-metal(hypervisor) architecture of virtualization;

FIG. 4 depicts schematically a few food-related home appliances;

FIG. 4 a depicts schematically a few cleaning-related home appliancesand digital cameras;

FIG. 5 depicts schematically client devices, tunnel devices, and serversconnected to the Internet;

FIG. 5 a depicts schematically a direct fetching scheme over theInternet;

FIG. 5 b depicts schematically a non-direct fetching scheme over theInternet using a proxy server;

FIG. 5 c depicts schematically a non-direct fetching scheme over theInternet using a Data Center (DC) proxy server;

FIGS. 6, 6 a, and 6 b depict schematically messages exchanged over theInternet between a client device and a data server, using differenttunnel devices, according to '044 patent;

FIGS. 7 and 7 a depict schematically a client device, tunnel devices,and servers connected to the Internet;

FIG. 8 illustrates schematically a simplified flowchart of a method forselecting and using a tunnel device for fetching content;

FIG. 9 a illustrates schematically a simplified flowchart of a methodfor selecting and using multiple tunnel devices for fetching multiplecontent in parallel;

FIG. 9 b illustrates schematically a simplified flowchart of a methodfor selecting and using a multiple tunnel devices for fetching multiplecontent in series;

FIG. 10 illustrates schematically a table of data relating to availabletunnel devices and their attributes stored in the TB server;

FIG. 11 depicts schematically messages exchanged over the Internetbetween tunnel devices and the TB server as part of the registrationphase;

FIG. 11 a depicts schematically connections over the Internet betweentunnel devices and the TB server after the registration phase;

FIG. 12 depicts schematically a message exchanged over the Internetbetween a client device and the SP server;

FIG. 12 a depicts schematically a message exchanged over the Internetbetween the SP server and the TB server;

FIG. 12 b depicts schematically messages exchanged over the Internetbetween the TB server and the web server using a tunnel device;

FIG. 13 depicts schematically messages exchanged over the Internet forfetching content from the web server to the client device via the tunneldevice, the TB server, and the SP server;

FIG. 14 illustrates schematically a simplified flowchart relating to aTB server;

FIG. 15 illustrates schematically a simplified flowchart relating to aSP server;

FIGS. 16 and 16 a illustrate schematically simplified flowchartsrelating to a client device;

FIG. 17 illustrates schematically a simplified flowchart relating to atunnel device;

FIGS. 18 and 18 a depicts schematically messages exchanged over theInternet for fetching content from the web server to the client devicevia a dedicated tunnel device, the TB server, and the SP server;

FIGS. 19, 19 a, and 19 b depicts schematically messages exchanged overthe Internet in an alternative scheme for fetching content from the webserver to the client device via a selected tunnel device, the TB server,and the SP server;

FIG. 20 illustrates schematically another simplified flowchart relatingto a TB server;

FIG. 21 illustrates schematically another simplified flowchart relatingto a SP server;

FIG. 22 illustrates schematically another simplified flowchart relatingto a tunnel device;

FIGS. 23 and 23 a depict schematically messages exchanged over theInternet for fetching content from the web server to the client deviceusing multiple TB servers;

FIGS. 24 and 24 a illustrate schematically simplified flowchartsrelating to a SP server using multiple TB servers;

FIGS. 24 b and 24 c illustrate schematically simplified flowchartsrelating to a tunnel device using multiple TB servers;

FIGS. 25 and 25 a depict schematically messages exchanged over theInternet including a DNS resolution by the client device;

FIG. 26 illustrates schematically a simplified flowchart relating to aclient device that includes a DNS resolution;

FIG. 27 depicts schematically messages exchanged over the Internetincluding a DNS resolution by the SP server;

FIGS. 28 and 28 a illustrate schematically simplified flowchartsrelating to the SP server that includes a DNS resolution;

FIG. 29 depicts schematically messages exchanged over the Internetincluding a DNS resolution by the selected tunnel device;

FIGS. 30 and 30 a illustrate schematically simplified flowchartsrelating to the selected tunnel device that includes a DNS resolution;

FIG. 31 depicts schematically a state diagram of a tunnel device;

FIGS. 32 and 32 a illustrate schematically simplified flowchartsrelating to a tunnel device associated with an idle state;

FIG. 33 illustrates schematically a table of data relating to availabletunnel devices associated with an idle state and their attributes storedin the TB server;

FIG. 34 illustrates schematically a simplified flowchart relating tousing multiple attempts for fetching content;

FIG. 35 depicts schematically messages exchanged over the Internet whenusing multiple attempts for direct fetching scheme;

FIG. 35 a depicts schematically messages exchanged over the Internetwhen using multiple attempts for non-direct fetching scheme from a dataserver using a proxy server;

FIG. 35 b depicts schematically messages exchanged over the Internet fora proxy server based non-direct fetching scheme using multiple attemptsfrom a data server or by a client device;

FIG. 35 c depicts schematically messages exchanged over the Internet fora DC proxy server based non-direct fetching scheme using multipleattempts from a data server or by a client device;

FIG. 35 d depicts schematically messages exchanged over the Internet fora client device as intermediate device non-direct fetching scheme usingmultiple attempts from a data server or by a client device;

FIG. 36 depicts schematically messages exchanged over the Internet usingmultiple fetching attempts between SP server and a TB server;

FIG. 37 illustrates schematically a simplified flowchart relating tousing multiple attempts for fetching content by a DC proxy server;

FIG. 37 a depicts schematically messages exchanged over the Internetwhen using multiple attempts for non-direct fetching scheme from a dataserver using a DC proxy server;

FIG. 38 illustrates schematically a simplified flowchart relating tousing multiple attempts for fetching content by using multiple servers;

FIG. 38 a depicts schematically messages exchanged over the Internetwhen using multiple attempts for non-direct fetching scheme from a dataserver using multiple proxy servers;

FIG. 38 b depicts schematically messages exchanged over the Internetwhen using multiple attempts for non-direct fetching scheme from a dataserver using multiple DC proxy servers;

FIG. 38 c depicts schematically messages exchanged over the Internetwhen using multiple attempts for non-direct fetching scheme from a dataserver using multiple SP servers;

FIG. 39 illustrates schematically a simplified flowchart relating tousing multiple attempts for fetching content by using multiple tunnels;

FIG. 39 a depicts schematically messages exchanged over the Internetwhen using multiple attempts for non-direct fetching scheme from a dataserver using multiple tunnels;

FIG. 40 illustrates schematically a simplified general flowchartrelating to using multiple attempts for fetching content;

FIG. 41 illustrates schematically a simplified general flowchartrelating to sequentially using multiple different fetching schemes forfetching content;

FIG. 42 illustrates schematically a simplified general flowchartrelating to comparing content received using two fetching actions; and

FIG. 42 a illustrates schematically a simplified general flowchartrelating to multiple fetching actions followed by comparing contentreceived using two different fetching actions.

DETAILED DESCRIPTION

The principles and operation of an apparatus or a method according tothe present invention may be understood with reference to the figuresand the accompanying description wherein identical or similar components(either hardware or software) appearing in different figures are denotedby identical reference numerals. The drawings and descriptions areconceptual only. In actual practice, a single component can implementone or more functions; alternatively or in addition, each function canbe implemented by a plurality of components and devices. In the figuresand descriptions, identical reference numerals indicate those componentsthat are common to different embodiments or configurations. Identicalnumerical references (in some cases, even in the case of using differentsuffix, such as 5, 5 a, 5 b and 5 c) refer to functions or actualdevices that are either identical, substantially similar, similar, orhaving similar functionality. It will be readily understood that thecomponents of the present invention, as generally described andillustrated in the figures herein, could be arranged and designed in awide variety of different configurations. Thus, the following moredetailed description of the embodiments of the apparatus, system, andmethod of the present invention, as represented in the figures herein,is not intended to limit the scope of the invention, as claimed, but ismerely representative of embodiments of the invention. It is to beunderstood that the singular forms “a,” “an,” and “the” herein includeplural referents unless the context clearly dictates otherwise. Thus,for example, reference to “a component surface” includes reference toone or more of such surfaces. By the term “substantially” it is meantthat the recited characteristic, parameter, or value need not beachieved exactly, but that deviations or variations, including, forexample, tolerances, measurement error, measurement accuracy limitationsand other factors known to those of skill in the art, may occur inamounts that do not preclude the effect the characteristic was intendedto provide.

Each of devices herein may consist of, include, be part of, or be basedon, a part of, or the whole of, the computer 11 or the system 10 shownin FIG. 1 . Each of the servers herein may consist of, may include, ormay be based on, a part or a whole of the functionalities or structure(such as software) of any server described in the '604 patent, such asthe web server, the proxy server, or the acceleration server. Each ofthe clients or devices herein may consist of, may include, or may bebased on, a part or a whole of the functionalities or structure (such assoftware) of any client or device described in the '604 patent, such asthe peer, client, or agent devices.

Each of the servers herein may consist of, may include, or may be basedon, a part or a whole of the functionalities or structure (such assoftware) of any server described in the '044 patent, such as the webserver, the proxy server, or the acceleration server. Each of theclients or devices herein may consist of, may include, or may be basedon, a part or a whole of the functionalities or structure (such assoftware) of any client or device described in the '044 patent, such asthe peer, client, or agent devices. Each of the tunnel devices hereinmay consist of, may include, or may be based on, a part or a whole ofthe functionalities or structure (such as software) of any tunnel devicedescribed in the '044 patent, such as the peer, client, or agentdevices.

Any of the steps or the flow charts described herein may be included asa Software development kit (SDK) that is provided as a non-transitorycomputer readable medium containing computer instructions. The SDK maybe installed in a respective device, either client or a server, to beexecuted by a processor in that device.

An example of an arrangement 70 for retrieving content by the requestingclient device 31 a from the web server 22 b is shown in FIG. 7 .Multiple Internet-connected devices may serve as tunnel devices, such asa tunnel #1 laptop device 33 a, a tunnel #2 smartphone device 33 b, atunnel #3 laptop device 33 c, a tunnel #4 desktop device 33 d, and atunnel #5 ‘Smart TV’ device 33 e. The content fetching may be handled,managed, and aided by using a Super-Proxy (SP) server 72 and a TunnelBank (TB) server 71.

The TB server 71 is used for storing a list of the available tunneldevices, such as their IP addresses together with attribute values thatcorresponds to one or more attribute types. The available tunnels listis stored in a memory 73 that is part of, integrated with, connected to,or in communication with, the TB server 71. The SP server 72 receivesthe content request from the requesting client 31 a, and manages thecontent fetching using the TB server 71. The TB server 71 and the SPserver 72 may be separated devices located at different geographiclocations, as shown in the arrangement 70, may be located in a singlelocation, or may be integrated into a single device or server thatcombines the functionalities of both servers.

Any device that is available for communicating over the Internet 113 mayserve as a tunnel device. Any tunnel device may consist of, include, bepart of, or be based on, a part of, or the whole of, the computer 11 orthe system 10 shown in FIG. 1 . Any tunnel device may be any computersystem, either stationary (such as the desktop 33 d) or portable (suchas the laptop 33 c). Further, any tunnel device may be a smartphone(such as the smartphone 33 b), or may be an appliance, such as thetelevision set 33 e. Further, any tunnel device herein may comprise,consist of, or include a Personal Computer (PC), a desktop computer, amobile computer, a laptop computer, a notebook computer, a tabletcomputer, a server computer, a handheld computer, a handheld device, aPersonal Digital Assistant (PDA) device, a cellular handset, a handheldPDA device, an on-board device, an off-board device, a hybrid device, avehicular device, a non-vehicular device, a mobile or portable device, anon-mobile or a non-portable device. Further, any device or networkelement herein may comprise, consist of, or include a major appliance(white goods) and may be an air conditioner, dishwasher, clothes dryer,drying cabinet, freezer, refrigerator, kitchen stove, water heater,washing machine, trash compactor, microwave oven and induction cooker.The appliance may similarly be a ‘small’ appliance such as TV set, CD orDVD player, camcorder, still camera, clock, alarm clock, video gameconsole, HiFi or home cinema, telephone or answering machine

Furthermore, a tunnel device may be integrated with an appliance. Theappliance primary function may be associated with food storage,handling, or preparation, such as microwave oven, an electric mixer, astove, an oven, or an induction cooker for heating food, or theappliance may be a refrigerator, a freezer, a food processor, adishwasher, a food blender, a beverage maker, a coffeemaker, or aniced-tea maker. Further, the appliance primary function may beassociated with environmental control such as temperature control, andthe appliance may consist of, or may be part of, an HVAC system, an airconditioner or a heater. Furthermore, the appliance primary function maybe associated with cleaning, such as a washing machine, a clothes dryerfor cleaning clothes, or a vacuum cleaner. The appliance primaryfunction may be associated with water control or water heating. Theappliance may be an answering machine, a telephone set, a home cinemasystem, a HiFi system, a CD or DVD player, an electric furnace, a trashcompactor, a smoke detector, a light fixture, or a dehumidifier. Theappliance may be a handheld computing device or a battery-operatedportable electronic device, such as a notebook or laptop computer, amedia player, a cellular phone, a Personal Digital Assistant (PDA), animage processing device, a digital camera, or a video recorder. Theintegration with the appliance may involve sharing a component such ashousing in the same enclosure, sharing the same connector such assharing a power connector for connecting to a power source, where theintegration involves sharing the same connector for being powered fromthe same power source. The integration with the appliance may involvesharing the same power supply, sharing the same processor, or mountingonto the same surface.

While 5 tunnel devices are shown in the example of the arrangement 70,any number of tunnels may be equally used. Preferably, the number oftunnel devices that are used may be above 5,000, 10,000, 20,000, 50,000,100,000, 200,000, 500,000, 1,000,000, 2,000,000, 5,000,000, or10,000,000.

A tunnel device may connect to the Internet 113 directly, such as thetunnel #1 33 a and tunnel #2 33 b shown to directly connect to theInternet 113 as part of the arrangement 70 shown in FIG. 7 . Directconnection herein refers to the ability of any Internet connected deviceor server, such as the TB server 71 and the SP server 72, tocommunicate, or too initiate a communication session, with theInternet-connected device. Alternatively, a tunnel device may beconnected to the Internet via a filtering device, such as a router,gateway, or a firewall. For example, the tunnel #3 33 c is shownconnected to the Internet 113 via a router device (or functionality) 74,and the tunnel #4 33 d is shown connected to the Internet 113 via afirewall device (or functionality) 75. Such filtering devices aretypically used for data security, and may filter communication to, orfrom, the Internet relating to a connected device. In one example, onlypre-approved IP addresses may initiate a communication session over theInternet with a device connected via such filtering mechanism. Forexample, the TB server 71 or the SP server 72 may not initiate acommunication the tunnel #3 33 c or with the tunnel #4 33 d since suchcommunication may be blocked by the respective router device 74 orfirewall device 75.

In one example, the two servers cooperatively used for assisting in thecontent fetching, namely the SP server 72 and the TB server 71, areowned, operated, managed, or controlled by a same entity 76, as shown inan arrangement 70 a shown in FIG. 7 a . In such a case, the entity 76may provide the service of fetching content from the web server 22 b viathe various tunnels as a service, which may be a paid service.

Any content herein may consist of, or may comprise, data such as files,text, numbers, audio, voice, multimedia, video, images, music, computerprograms or any other sequence of instructions, as well as any otherform of information represented as a string of bits, bytes, orcharacters. In one example, the content may include, be a part of, or awhole of, a URL or a website page.

Each tunnel device may be associated with one or more attribute valuescorresponding to one or more attribute types. A table 100 shown in FIG.10 describes an example of various attributes types and values orvarious (available for use) tunnel devices. A top row 101 names theattribute type of other tunnel related information, and each of theother rows may correspond to a single tunnel device. For example, afirst content row 101 a may correspond to the tunnel #1 33 a, a secondrow 101 b may correspond to the tunnel #2 33 b, a third row 101 c maycorrespond to the tunnel #3 33 c, a fourth row 101 d may correspond tothe tunnel #4 33 d, a fifth row 101 e may correspond to the tunnel #5 33e, a sixth row 101 f may correspond to a sixth tunnel, and a seventh row101 g may correspond to a seventh tunnel.

An attribute type may relate to a timing of an operation or activity bya tunnel device. A first column 102 a, named ‘Date-Time’, may correspondto a timing on an event relating to the respective tunnel operation,such as a last time when the tunnel device connected to the Internet, orwhen the tunnel device connected to a specific entity, such as to the TBserver 71 or the SP server 72. In the examples shown in the table 100, arelating timing information relating the first tunnel corresponding tothe first row 101 a is shown as a date 3/5 and a time 19:35, a relatingtiming information relating the second tunnel corresponding to thesecond row 101 b is shown as a date 3/5 and a time 19:38, a relatingtiming information relating the third tunnel corresponding to the thirdrow 101 c is shown as a date 5/5 and a time 00:05, a relating timinginformation relating the fourth tunnel corresponding to the fourth row101 d is shown as a date 11/5 and a time 00:07, a relating timinginformation relating the fifth tunnel corresponding to the fifth row 101e is shown as a date 12/5 and a time 00:15, a relating timinginformation relating the sixth tunnel corresponding to the sixth row 101f is shown as a date 12/5 and a time 05:38, and a relating timinginformation relating the seventh tunnel corresponding to the seventh row101 g is shown as a date 12/5 and a time 22:13.

Alternatively or in addition, the attribute type may be associated withthe communication link involving the connecting of a tunnel device tothe Internet 113. For example, the type of connection of the device maybe used as an attribute type, such as being a wired or a wirelessconnection. Further, the related attribute type may include the protocolor technology used for connecting the respective tunnel to the Internet113, as exampled in a column ‘Connection Type’ 102 e in the table 100.In the examples shown in the table 100, a relating communicationprotocol information relating the first tunnel corresponding to thefirst row 101 a is shown as a value of Very High Speed Subscriber Line(VDSL) technology, a relating communication protocol informationrelating the second tunnel corresponding to the second row 101 b isshown as a value of Third Generation (3G), a relating communicationprotocol information relating the third tunnel corresponding to thethird row 101 c is shown as a value of Data Over Cable Service InterfaceSpecification (DOCSIS), a relating communication protocol informationrelating the fourth tunnel corresponding to the fourth row 101 d isshown as a value of Asymmetric Digital Subscriber Line (ADSL), arelating communication protocol information relating the fifth tunnelcorresponding to the fifth row 101 e is shown as a value of WiFi, arelating communication protocol information relating the sixth tunnelcorresponding to the sixth row 101 f is shown as a value of 4G.LTE, anda relating communication protocol information relating the seventhtunnel corresponding to the seventh row 101 g is shown as a value ofADSL.

Alternatively or in addition, the attribute type may be associated withthe communication link involving the communication of a tunnel devicewith another entity over the Internet 113, such as communication withthe TB server 71, the SP server 72, or the web server 22 b. For example,the bandwidth (BW) or the RTT of such communication of the device may beused as an attribute type, as exampled in columns ‘BW’ 102 g and ‘RTT’102 h in the table 100. In the examples shown in the table 100, arelating communication metrics information relating the first tunnelcorresponding to the first row 101 a is shown as a BW value of 1000(Kb/s) and a RTT value of 30 (ms), a relating communication metricsinformation relating the second tunnel corresponding to the second row101 b is shown as a BW value of 350 (Kb/s) and a RTT value of 70 (ms), arelating communication metrics information relating the third tunnelcorresponding to the third row 101 c is shown as a BW value of 2500(Kb/s) and a RTT value of 540 (ms), a relating communication metricsinformation relating the fourth tunnel corresponding to the fourth row101 d is shown as a BW value of 1400 (Kb/s) and a RTT value of 170 (ms),a relating communication metrics information relating the fifth tunnelcorresponding to the fifth row 101 e is shown as a BW value of 1200(Kb/s) and a RTT value of 120 (ms), a relating communication metricsinformation relating the sixth tunnel corresponding to the sixth row 101f is shown as a BW value of 2100 (Kb/s) and a RTT value of 230 (ms), anda relating communication metrics information relating the seventh tunnelcorresponding to the seventh row 101 g is shown as a BW value of 800(Kb/s) and a RTT value of 310 (ms).

Alternatively or in addition, the attribute type may be associated withthe tunnel connection scheme to the Internet, such as identification ofthe ISP or the associated ASN relating to the ISP, to the tunnel device,or to the Internet connection scheme. In the examples shown in the table100, a column named ‘ASN’ 102 d may be used, a value of the ASNcorresponding to the first row 101 a is shown as 3215 (corresponding toOrange France), a value of the ASN corresponding to the second row 101 bis shown as 3209 (corresponding to Vodafone Germany), a value of the ASNcorresponding to the third row 101 c is shown as 12079 (corresponding toVerizon Wireless USA), a value of the ASN corresponding to the fourthrow 101 d is shown as 16345 (corresponding to Beeline Russia), a valueof the ASN corresponding to the fifth row 101 e is shown as 30148(corresponding to Zain Saudi-Arabia), a value of the ASN correspondingto the sixth row 101 f is shown as 9498 (corresponding to Bharti AirtelIndia), and a value of the ASN corresponding to the seventh row 101 g isshown as 11419 (corresponding to Telefonica Brazil).

Alternatively or in addition, the attribute type may be associated withthe tunnel device itself, such as its location. The location may bebased on an actual physical geographical location or an IP geolocation.In the examples shown in the table 100, a column named ‘GeographicalLocation’ 102 c may be used. A value of the location corresponding tothe first row 101 a is shown as ‘Paris, France’, a value of the locationcorresponding to the second row 101 b is shown as ‘Munich, Germany’, avalue of the location corresponding to the third row 101 c is shown as‘Boston, Mass., USA’, a value of the location corresponding to thefourth row 101 d is shown as ‘Moskow, Russia’, a value of the locationcorresponding to the fifth row 101 e is shown as ‘Riad, Saudi-Arabia’, avalue of the location corresponding to the sixth row 101 f is shown as‘Mumbai, India’, and a value of the location corresponding to theseventh row 101 g is shown as ‘San-Paulo, Brazil’.

Alternatively or in addition, the attribute type may be associated withthe tunnel device itself, such as its structure, functionalities, orfeatures. The attribute type may relate to hardware, software, or anycombination thereof. For example, the type of the tunnel device may beused, such as being stationary or portable. Further, the processingpower or the processor type may be used. For example, the type, make,and version of the any software may be used, such as the operatingsystem, as exampled in an ‘Operating System’ column 102 f in the table100. In the examples shown in the table 100, a relating operating systemrelating to the first tunnel corresponding to the first row 101 a isshown as ‘Chrome 2.0’, a relating operating system relating to thesecond tunnel corresponding to the second row 101 b is shown as ‘iOS3.0’, a relating c operating system relating to the third tunnelcorresponding to the third row 101 c is shown as ‘Windows 10’, arelating operating system relating the fourth tunnel corresponding tothe fourth row 101 d is shown as ‘Windows 7’, a relating operatingsystem relating the fifth tunnel corresponding to the fifth row 101 e isshown as ‘Android 2.0’, a relating operating system relating the sixthtunnel corresponding to the sixth row 101 f is shown as ‘iOS 4.0’, and arelating operating system relating the seventh tunnel corresponding tothe seventh row 101 g is shown as ‘Chrome 3.0’.

The tunnels devices may primarily be identified by their correspondingIP address, as exampled in a ‘Tunnel IP Address’ column 102 b in thetable 100. In the examples shown in the table 100, an IP address of thefirst tunnel corresponding to the first row 101 a is shown as80.12.105.150, an IP address of the second tunnel corresponding to thesecond row 101 b is shown as 176.94.1.17, an IP address of the thirdtunnel corresponding to the third row 101 c is shown as 162.115.192.24,an IP address of relating the fourth tunnel corresponding to the fourthrow 101 d is shown as 83.220.232.67, an IP address of the fifth tunnelcorresponding to the fifth row 101 e is shown as 185.93.228.98, an IPaddress of the sixth tunnel corresponding to the sixth row 101 f isshown as 59.144.192.23, and an IP address of the seventh tunnelcorresponding to the seventh row 101 g is shown as 200.196.224.89.

The general flow of the system operation for fetching content (such asURL) to the requesting client 31 a from the web server 22 b usingtunnels based on the arrangement 70 shown in FIG. 7 , is described in aflow chart 80 in FIG. 8 . A “Registration and Connection” step 81 iscontinuously executed, in which devices that are available to serve astunnels are initiating communication with the TB server 71. During thisinitial communication session, the tunnel device registers with the TBserver 71, and provides one or more attributes values associated withvarious attributes types. Alternatively or in addition, the attributesvalues are estimated, calculated, or otherwise obtained based on thecommunication link with the tunnel device. As part of the registrationprocess, a record that includes the IP address of the registering tunneldevice is added to the tunnels list 73 stored with the TB server 71. Inone example, the records are stored as the table 100 shown in FIG. 10 ,where a row represents a record of a single tunnel device. In additionto registration by adding a record to the tunnels list 73, the tunneldevice opens a lasting connection via the Internet with the TB server71. Such connection preferably allows the TB server 71 to initiatecommunication with the registering tunnel device even after theregistration phase is over and as long as the connection is sustained,such as by using TCP keepalive mechanism. The open connection,preferably a TCP connection, allows the TB server 71 to initiatecommunication with the connected tunnel device even through anyintermediary blocking or filtering apparatus, such as the router 74 orthe firewall device 75. The connection may be terminated upon the tunneldevice closing the connection, such as when powering off ordisconnecting from the Internet. Upon disconnecting from a tunneldevice, the respective record in the tunnels list 73 in the TB server 71is erased, notifying that this tunnel device is no more available to beused as a tunnel device.

The connection process may involve establishing a connection (directlyor via a server) between the registering tunnel device and the TB server71. The handshaking between the two devices involves forming theconnection by exchanging communication-related information. The formedconnection may be used later for efficiently exchange data between thedevices. In one example, the communication between the devices uses TCP,and the pre-connection is used for establishing a connection by forming‘passive open’, involving exchanging SYN, SYN-ACK, and ACK messages. Inanother example, a VPN is formed between the devices, and the tunnelingor the VPN establishment is performed as part of the pre-connectionphase. The tunnel endpoints are authenticated before secure VPN tunnelscan be established. User-created remote-access VPNs may use passwords,biometrics, two-factor authentication, or any other cryptographicmethods. Network-to-network tunnels often use passwords or digitalcertificates, and permanently store the key in order to allow a tunnelto establish automatically, without intervention from a user.

In one example, the number of tunnel devices that have been registeredwith the TB server 71 (or the number of IP addresses) and are availableto be used as tunnel device is above 10,000, 20,000, 50,000, 100,000,200,000, 500,000, 1,000,000, 2,000,000, 5,000,000, or 10,000,000.

The content fetching scheme starts in a “Content Request” step 82, wherethe requesting client sends a request message to the SP server 72. Therequest message preferably includes the requested content, such as a URL(and/or identification of the web server 22 b). The client device 31 amay also include (as part of, or appended to, the request message)criteria for selecting tunnel devices to be used for fetching therequested content from the web server 22 b, as part of a “TunnelSelection” step 83. For example, the request message may includeidentification of an attribute type, and associated values for tunnelsselection. The client device 31 a may use a single value, so that onlytunnel devices associated with this single value will be used.Alternatively or in addition, the client device 31 a may use multiplevalues, so that only tunnel devices associated with one of these valueswill be used. Alternatively or in addition, the client device 31 a mayuse a range of values, so that only tunnel devices associated with oneof the values in the range will be used. For example, the client device31 a may define a minimum value (selecting only tunnel devicesassociated with values at or above the minimum value), may define amaximum value (selecting only tunnel devices associated with values ator below the maximum value), or may define both minimum and maximumvalues (selecting only tunnel devices associated with values at or abovethe minimum value and at or below the maximum value).

For example, in a case where the attribute value is a location, therequest message may define a location of Munich, Germany. Assuming thatthe available tunnel devices are detailed in the table 100 in FIG. 10 ,only the tunnel device (such as the tunnel #2 33 b) associated with thesecond row 101 b may be selected. Alternatively or in addition, therequest message may define a location of Europe. In such a case, thetunnel device (such as the tunnel #2 33 b) associated with the secondrow 101 b, or the tunnel device (such as the tunnel #1 33 a) associatedwith the first row 101 a, may be selected, since both location valuesare in Europe. While the location values are exampled in table 100 ascities, any location may be used as IP geolocation or physicalgeographical location, such as country, state or province, city, streetaddress, or ZIP code). In one example, a tunnel device location may beobtained using its built-in Global Positioning System (GPS), and mayinclude the latitude, longitude, and timezone of the device location.

Similarly, in a case where the attribute value is an RTT, the requestmessage may define a RTT over 300 ms (300 ms minimum), so that eitherthe tunnel device (such as the tunnel #3 33 c) associated with the thirdrow 101 c (having 540 ms), or the tunnel device associated with theseventh row 101 g (having 310 ms), may be selected. Similarly, in a casewhere the attribute value is an RTT, the request message may define aRTT below 80 ms (maximum), so that either the tunnel device (such as thetunnel #1 33 a) that is associated with the first row 101 a (having 30ms), or the tunnel device (such as the tunnel #2 33 b) that isassociated with the second row 101 b (having 70 ms), may be selected.Similarly, in a case where the attribute value is an BW, the requestmessage may define a BW below 2200 Kb/s and above 2000 Kb/s, the tunneldevice associated with the sixth row 101 f (having 2100 Kb/s), may beselected.

In the “Tunnel Selection” step 83, the TB server 71 selects a tunneldevice for use from the tunnel list stored in the storage 73, accordingto the criteria received from the requesting client as part of the“Content Request” step 82. It is noted that some requests may notinclude any criteria, and in such a case any available tunnel device maybe selected by the TB server 71.

Once a tunnel device is selected by the TB server 71, the request forcontent is routed, by the TB server 71, the SP server 72, or anycooperation thereof, to the selected tunnel device. In turn, the tunneldevice forwards the request for content, using tunneling or proxyscheme, to the web server 22 b, as part of a “Using Tunnel” step 84. Itis noted that such tunneling provides anonymity and untraceability,where the web server 22 b is only aware of the request from the selectedtunnel device, and is ignorant to the identity of the origin of therequest, namely the requesting client 31 a, which is not exposed to theweb server 22 b. For example, in case where the requesting client 31 ais in a location A, and the selected tunnel device that is used is in alocation B, the web server 22 b may only be aware (such as by using IPgeolocation) to the request arrival from the location B.

The requested content is then sent to the selected tunnel device, whichin turn submits the fetched content to the requesting client 31 a aspart of a “Content Fetching” step 85, thus completing the cycle ofrequest-response from the point-of-view of the client device 31 a, andending in an “END” step 86. Hence, the ‘Content Fetch’ cycle, that maybe a ‘URL Fetch’ flow-chart 87 in the case where the content is a singleURL, may be defined, starting from the requesting client device 31 aissuing a content request to the SP server 72, until the fetched contentis received by the requesting client device 31 a as part of the “ContentFetching” step 85. The fetched content may be stored in the clientdevice in any volatile or non-volatile memory, or may be stored in alocal cache as described in U.S. Pat. No. 8,135,912 to the Shribman etal. entitled: “System and Method of Increasing Cache Size”, which isincorporated in its entirety for all purposes as if fully set forthherein. The content is stored with its related metadata or any otheridentifiers, so it can be easily detected and fetched when laterrequired.

While retrieving a single URL (or other content) is exampled in the flowchart 80, any number of URLs may be equally retrieved by the requestingclient 31 a. Each URL fetching may be according to, or based on, theflow chart 87 shown as part of the flow chart 80 in FIG. 8 . Forexample, the requesting client 31 a may request multiple web pages ofthe same web site. Assuming fetching of N web pages (or any other NURLs), the first URL may be fetched by executing “URL #1 Fetch” flowchart 87 a, the second URL may be fetched by executing a “URL #2 Fetch”flow chart 87 b, the third URL may be fetched by executing a “URL #3Fetch” flow chart 87 c, and so on, until the N-th URL may be fetched byexecuting a “URL #N Fetch” flow chart 87 n, where each of the URLfetching scheme may be according to, or based on, the flow chart 87shown as part of the flow chart 80 in FIG. 8 . The various fetchingschemes may be executed in parallel, starting in a “START” step 91 andending in an “END” step 92, as shown in the flow chart 90 a in FIG. 9 a. Alternatively or in addition, the various fetching schemes may beexecuted in series, starting in the “START” step 91 and ending in the“END” step 92, as shown in the flow chart 90 b in FIG. 9 b.

In one example, the same tunnel device is selected in two, or in all, offetching activities named “URL #1 Fetch” flow chart 87 a to the “URL #NFetch” flow chart 87 n. Alternatively or in addition, a different tunneldevice is selected for each of fetching activities named “URL #1 Fetch”flow chart 87 a to the “URL #N Fetch” flow chart 87 n, which ispreferred from anonymity point of view.

A schematic messaging flow diagram 110 describing the registration phaseas part of the “Registration and Connection” phase 81 is shown in FIG.11 . Each of the tunnel devices initiates a communication with the TBserver 71, notifying its availability to serve as a tunnel device. Aspart of the communication, each of the tunnel devices may transmit oneor attribute values pertaining to one or more attribute types. As partof the registration phase 81, the TB server 71 adds a record (row) foreach available tunnel device to the tunnels list or table in memory 73,such as adding a row for each new available tunnel device to table 100shown in FIG. 10 . In the example of the arrangement 70, the tunnel #133 a connects via a data path 111 a, the tunnel #2 33 b connects via adata path 111 b, the tunnel #3 33 c connects via a data path 111 c, thetunnel #4 33 d connects via a data path 111 d, and the tunnel #5 33 econnects via a data path 111 e.

As part of the “Registration and Connection” phase 81, a sustainedconnection is established between the registered tunnel devices and theTB server 71, such as by using TCP keepalive mechanism. Shownpictorially in an arrangement 110 a shown in FIG. 11 a relating to theexample of the arrangement 70, the tunnel #1 33 a connection is shown asa dashed line 112 a, the tunnel #2 33 b connection is shown as a dashedline 112 b, the tunnel #3 33 c connection is shown as a dashed line 112c, the tunnel #4 33 d connection is shown as a dashed line 112 d, andthe tunnel #5 33 e connection is shown as a dashed line 112 e. Suchsustained connection (such as by using TCP keepalive mechanism) allowsthe TB server 71 to initiate connection with any of the registered andavailable tunnel devices, even in the case when a filtering apparatus,such as a router (for example the router 74) or a gateway (for examplethe gateway 75), is connected between a tunnel device and the Internet113.

The connection process involves establishing a connection (directly orvia a server), where the handshaking between the TB server 71 and eachof tunnel devices involves forming the connection by exchangingcommunication-related information. The formed connection may be usedlater for efficiently exchange data between the devices. In one example,the communication between the devices uses TCP, and the pre-connectionis used for establishing a connection by forming ‘passive open’,involving exchanging SYN, SYN-ACK, and ACK messages. In another example,a VPN is formed between the devices, and the tunneling or the VPNestablishment is performed as part of the pre-connection phase. Thetunnel endpoints are authenticated before secure VPN tunnels can beestablished. User-created remote-access VPNs may use passwords,biometrics, two-factor authentication, or any other cryptographicmethods. Network-to-network tunnels often use passwords or digitalcertificates, and permanently store the key in order to allow a tunnelto establish automatically, without intervention from a user.

The process of fetching content, corresponding to the “Content Request”step 82 that is part of the ‘URL Fetch’ flow chart 87, starts with therequesting client 31 a send a request for content to the SP server 72,as shown in a message path 121 a shown as part of a messaging chart 120shown in FIG. 12 . In one example, such request only comprises anidentification (such as a URL) of the requested content. Preferably, therequest includes a guidance regarding selection of a tunnel device thatwill be used for fetching the requested content. In one example, therequest includes, either as integral part of the request, as an appendedmessage, or as a separate message, the attribute type and an attributevalue, to be used for selecting the tunnel device to be used. In anotherexample, multiple values, or a range of values are defined for theattribute type that serves as a criterion. Further, multiple attributestypes may be used, each associated with a value or with multiple values.

The content request message, as well as the attributes types and valuesinformation, may be sent over the message path 121 a using a proprietaryprotocol, agreed upon between the two communicating nodes. Preferably,the SOCKS, WebSocket (ws), which may be WebSocket Secure (wss), or HTTPProxy protocol may be used, where the client device 31 a executes aclient side protocol, and the SP server 72 executes a server sideprotocol.

In response to receiving the content request over the message path 121a, the SP server 72 forward the content request, along with the tunnelselection criteria, to the TB server 71, shown as a message path 131 ain the messaging chart 120 a shown in FIG. 12 a . The message sent overthe message path 131 a may use a proprietary protocol, agreed uponbetween the two communicating nodes. Preferably, the HTTP, HTTPS, SocketSecure (SOCKS), WebSocket (ws), which may be WebSocket Secure (wss), orHTTP Proxy protocol may be used, where the SP server 72 executes aclient side protocol, and the TB server 71 executers a server sideprotocol. Alternatively or in addition, the SP server 72 may execute theserver side protocol, and the TB server 71 may executer the client sideprotocol.

As part of the “Tunnel Selection” phase 83, according to a pre-set ofcriteria, according to the attributes type and values that were receivedfrom the client device 31 a as part of the message path 121 a, oraccording to any combination thereof, the TB server 71 uses the tunnelslist stored in the memory 73, which may include the table 100, forselecting a tunnel device to be used. In one example, the attribute typeis location and the value is Moskow, Russia, hence the tunnel #4 33 d,which record is included in the fourth row 101 d of the table 100, issuitable to be selected, and is selected by the TB server 71 to servethe specific content request from the client device 31 a.

In one example, the tunnel device to be used may be randomly selected,allowing, for example, for load balancing. In one example, by randomlyselecting different tunnel devices for multiple content pieces ofcontent (such as multiple web pages of the same web site) from the samecontent source, the web server 22 b senses a distributed requestingschemes, and further cannot attribute the requests to the client device31 a, further providing anonymity and untraceability. Randomness iscommonly implemented by using random numbers, defined as a sequence ofnumbers or symbols that lack any pattern and thus appear random, areoften generated by a random number generator. Randomness is described,for example, in IETF RFC 1750 “Randomness Recommendations for Security”(December 1994), which is incorporated in its entirety for all purposesas if fully set forth herein. A random number generator (having eitheranalog or digital output) can be hardware based, using a physicalprocess such as thermal noise, shot noise, nuclear decaying radiation,photoelectric effect or other quantum phenomena. Alternatively, or inaddition, the generation of the random numbers can be software based,using a processor executing an algorithm for generating pseudo-randomnumbers which approximates the properties of random numbers.

In a case where no criteria for selecting is directed by the requestingclient 31 a, the TB server 71 may randomly select a tunnel device fromthe group or list of all currently available tunnel devices. Similarly,in a case where there are multiple tunnel devices that are available andall of them satisfy the criteria set (such as all of them are associatedwith a defined value, or are within the range of defined values,relating to a specific attribute type), the TB server 71 may randomlyselect a tunnel device from the group or list of all currently availabletunnel devices that also satisfy the defined criteria.

Upon completing the selection of the tunnel #4 33 d, the TB server 71forwards the requested content identification to the selected tunnel #433 d, shown as a message path 131 b in the messaging chart 120 b shownin FIG. 12 b . Such communication uses the established connection 111 d(such as the TCP connection) that was established during the“Registration and Connection” phase 81, allowing for communication viathe firewall 75. The message sent over the message path 131 b may use aproprietary protocol, agreed upon between the two communicating nodes.Preferably, the HTTP, HTTPS, Socket Secure (SOCKS), WebSocket (ws),which may be WebSocket Secure (wss), or HTTP Proxy protocol may be used,where the TB server 71 executes a server side protocol, and the tunnel#4 33 d executes a client side protocol. Alternatively or in addition,the TB server 71 may executes a client side protocol, and the tunnel #433 d may execute a server side protocol.

In response to the request message 131 b, the selected tunnel #4 33 dsends a request for the identified content to the appropriate serverthat stores the required content, exampled to be the web server 22 b,shown as a message path 131 c in a messaging chart 120 b in FIG. 12 b .Thus, the “Using Tunnel” phase 84 is completed where the request arrivesat the content source, namely the web server 22 b. The message sent overthe message path 131 c may use a proprietary protocol, agreed uponbetween the two communicating nodes. Preferably, the HTTP or HTTPSprotocol may be used, where the web server 22 b executes a server sideprotocol, and the tunnel #4 33 d executes a client side protocol.Further, any tunneling protocol or mechanism may be used where theselected tunnel, which is the tunnel #4 33 d in the example herein,serves as a tunnel between the TB server 71 and the web server 22 b.

The requested content is then fetched from the web server 22 b to therequesting client 31 a, as part of the “Content Fetching” phase 85,along the ‘opposite’ route of the request flow. As shown in a messagingchart 130 shown in FIG. 13 , the content is first sent from the webserver 22 b to the selected tunnel #4 33 d along a message path 131 d,which in turn sends it to the TB server 71 along a message path 131 e,which in turn sends it to the SP server 72 along a message path 131 f,arriving at the requesting client 31 a along a message path 131 g,completing the request/response cycle from the client device 31 a pointof view. The same protocol or protocols used for forwarding the requestfrom the client device 31 a to the web server 22 b may be equally usedfor any portion of the ‘return’ path of the requested content from theweb server 22 b to the client device 31 a. Alternatively or in addition,the return path may use different protocol or protocols than the onesused in the requesting path.

The TB server 71 generally executes a flowchart 140 shown in FIG. 14 .The TB server 71 generally executes in parallel at least a “ConnectionHandler” flow chart 140 a and a “Request Handler” flow chart 140 b. The“Connection Handler” flow chart 140 a involves identifying a device thatis available to server as a tunnel device. For each such device, arecord of the device and its associated various attributes values isformed, stored and maintained, together with establishing a continuousconnection with the tunnel device, corresponding to the “Registrationand Connection” phase 81 and the messaging charts 110 and 110 arespectively shown in FIGS. 11 and 11 a. The TB server 71 continuouslylistens and waits for tunnel devices to initiate a communication. Uponreceiving a communication request from a potential tunnel device, suchas from the tunnel #2 33 b shown as message path 111 b in the chart 110,the TB server 71 accepts the communication from the tunnel device, aspart of an “Accept and Open Connection” step 141. In addition to thetunnel device IP address, information regarding the connection timing,the tunnel device type, connection functionalities, operating system,processing power, and other values relating to various attribute typesare obtained (such as from the tunnel device itself, from theconnection, or otherwise), and stored as a record in the tunnels list73, which may be in a form of a row in the table 100, as part of an “Addto Table” step 142. The tunnel device is then available for beingselected for use in a fetching content operation, and the selection maybe based on the respective information in the record in the table 100.In order to allow for the TB server 71 to initiate communication withthis available tunnel device, a continuous connection is established aspart of an “Establish Connection” step 143. For example, a TCPconnection 112 b (using TCP keepalive mechanism) may be used as shown inthe chart 110 a. Upon sensing that there is no response from this tunneldevice as part of a “Detect Disconnection” step 143 a, such as notreceiving a keepalive message reply after a set interval, the TB server71 assumes that this tunnel device is no longer available to be used asa tunnel device for content fetching operation, and the respectiverecord is deleted from the table 100 as part of a “Remove from table”step 144. The “Connection Handler” flow chart 140 a is repeated forevery tunnel device, so that a large number of such instances areperformed simultaneously and independently.

The “Request Handler” flow chart 140 b involves selecting a tunneldevice from the available ones based on a request from the SP server 72,and using the selected tunnel device for fetching the requested content.The “Request Handler” flow chart 140 b is repeated for each content(such as URL) request from the client device 31 a conveyed to it fromthe SP server 72, so that a large number of such instances of thisoperation are performed simultaneously and independently. First, acontent request is received from the SP server 72 as part of a “ReceiveRequest from SP” step 145, corresponding to the message path 131 a shownin the messaging chart 120 b. In general, the request includes a replicaof the content request received from the requesting client 31 a. Basedon pre-set criteria and criteria that is part of the received request,the TB server 71 selects a tunnel device from the available ones, aspart of a “Select Tunnel” step 146, which correspond to the “TunnelSelection” phase 83. As part of a “Send Request to Tunnel” step 147,which corresponds to the message path 131 b shown in the messaging chart120 b and performed as part of the “Using Tunnel” phase 84, theidentification of the requested content of forwarded to the selectedtunnel device, exampled as the tunnel #4 33 d in the example herein.After the content if fetched by the selected tunnel device #4 33 d fromthe web server 22 b, it is forwarded and received by the TB server 71 aspart of a “Receive Content from Tunnel” step 148, which corresponds tothe message path 131 e shown in the messaging chart 130 and performed aspart of the “Content Fetching” phase 85. The handling of the contentrequested is completed by sending the fetched content as a response tothe SP server 72 request as part of a “Send Content to SP” step 149,which corresponds to the message path 131 f shown in the messaging chart130 and performed as part of the “Content Fetching” phase 85.

The SP server 72 generally executes a flowchart 150 shown in FIG. 15 foreach piece of information or content (such as a single URL) requested bythe client device 31 a. The operation starts when a content request isreceived from the client device 31 a as part of a “Receive Request fromClient” step 151, which corresponds to the message path 121 a shown inthe messaging chart 120 and performed as part of the “Content Request”phase 82. The request is forwarded by the SP server 72 to the TB server71 as part of a “Send Request to TB” step 152, which corresponds to themessage path 131 a shown in the messaging chart 120 a, and received bythe TB server 71 as part of the “Receive Request from SF” step 145. Uponthe content arriving to the TB server 71, it is forwarded by the TBserver 71 to the requesting SP server 72 as part of the “Send Content toSF” step 149, and received as part of a “Receive Content from TB” step153, which corresponds to the message path 131 f shown in the messagingchart 130 and performed as part of the “Content Fetching” phase 85. Thereceived content is then sent to the requesting client 31 a as part of a“Send Content to Client” step 154, which corresponds to the message path131 g shown in the messaging chart 130 and performed as part of the“Content Fetching” phase 85.

SSL Sniffing. SSL (Secure Sockets Layer) certificates are used to secureonline communication and transactions with encryption. The SSLencryption technology creates encrypted connections between a user/webbrowser and website/web-server. SSL certificate makes sure that allcommunication that gets transmitted through a browser/website/server isencrypted and decrypted in such a manner that only the sender and therecipient would be able to see it in the decrypted form. SSL sniffingrefers to the intercepting and reading of SSL encrypted traffic using anMITM (Man in the Middle) proxy.

SSL sniffing works in different ways. In some SSL implementations, theMITM proxy is used to redirect the end user in a communication to anon-HTTPS website and then sniff the non-encrypted traffic in that site.At the same time, requests would be relayed to and from the HTTPS sitevia a proxy. The man in the middle can alternatively grab the HTTPStraffic and present a valid HTTPS certificate to the end user. Thecertificate would need to be trusted on the end user machine. This theend user machine would need to be compromised or a trusted certificatehas to be obtained. The man in the middle would then relay traffic tothe actual HTTPS site and at the same time look at the unencryptedtraffic, sitting in the middle of it all. There is another optiontoo—grabbing the encrypted traffic and recording it, in the hope that infuture, technology would help decrypt the data. An implementationexample of SSL Sniffing, which extracts hostname from SSL by parsingTLC/SNI record (sni.js), is described in a web-page by ‘Marek's—totallynot insane—idea of the day’ (dated Jun. 16, 2012) entitled: “DissectingSSL handshake”, which is incorporated in its entirety for all purposesas if fully set forth herein. SSL Sniffing is further described inNetronome Systems, Inc. white-paper published 2010 (February 2010)entitled: “Examining SSL-encrypted Communications”, which isincorporated in its entirety for all purposes as if fully set forthherein.

A system, method and computer program product for guaranteeing a datatransaction over a network using SSL sniffing are disclosed in U.S. Pat.No. 7,853,795 to Dick et al. entitled: “System, method and computerprogram product for guaranteeing electronic transactions”, which isincorporated in its entirety for all purposes as if fully set forthherein. When a data transaction between at least a server and a clientis detected on a network, data transmitted via the network between theserver and client during the data transaction is captured. At least oneidentifier is associated with the captured data. A timestamp is alsogenerated for the captured data. The timestamp includes informationtherein identifying at least a portion of the identifier(s). Thecaptured data, the identifier(s) and the timestamp are stored in one ormore data stores. The identifier(s) associated with the stored captureddata is also mapped to an entry in an index to permit retrieval of thestored data from the data store via the index.

In one example, the message received by the SP server 72 from the clientdevice 31 a as part of the “Receive Request from Client” step 151 isaccording to HTTPS protocol, where part or all of the message isencrypted using TLS or SSL. In such a case, the SP server 72 (or the TBserver 71), may use SSL Sniffing for extracting the content identifier(such as the requested URL), for extracting any attribute valuesincluded in the message, for extracting any other information that isincluded in the message and is required for system operation. The SPserver 72 may use SSL Sniffing that includes parsing the SSL handshake,such as parsing the ClientHello and ServerHello parts of the CONNECTrequest in the TLS handshaking. In an example where the client device 31a sends an HTTPS request that includes ‘CONNECT amazon.com’, the SPserver 72 replies with a message consisting of: ‘HTTP/1.1 200 OK’, andcontinues to apply pkg/util/tls.js Handshake:extract_sni to allfollowing messages from the client device 31 a. If a message containsSNI and it is amazon.com, or the message does not contain SNI—the SPserver 72 sends the ClientHello to Amazon web server (which may be theweb server 22 b), and start listening for the ServerHello while applyingthe Handshake:extract_cert_names to all received messages therefrom,until the certificate part is being received and parsed. If the receivedserver certificate is for amazon.com and not a different/blocked host,the SP server 72 sends a response back to the client device 31 a andbegins tunneling data without parsing.

For each piece of information or content (such as a single URL)requested by a client device, such as the exampled client device 31 a,generally executes a flowchart 160 shown in FIG. 16 . It is noted thatmultiple content fetching operations may be performed in parallel or inseries, as described regarding the flow charts 90 a and 90 b above. Anycontent fetching operation start sending a content request to the SPserver 72 as part of a “Send Request to SP” step 161, and the request isreceived by the SP server 72 as part of the “Receive Request fromClient” step 151. This action corresponds to the message path 121 ashown in the messaging chart 120 and performed as part of the “ContentRequest” phase 82. Upon availability of the requested content at the SPserver 72, the content is sent to the client device 31 a as part of the“Send Content to Client” step 154, and is received by the client device31 a as part of a “Receive Content from SF” step 162, which correspondsto the message path 131 g shown in the messaging chart 130 and performedas part of the “Content Fetching” phase 85. In one example, the clientdevice 31 a need only to know the IP address of the SP server 72, andneed only to identify the requested content and the criteria (if any)for selecting a tunnel for fetching this content. The request messagesent to the SP server 72 may include identification of the requestedcontent, such as a URL.

In one example, the client device 31 a does not impose any limitationsor does not provide any criteria or limitations for selecting a tunneldevice for a specific requested content. In such a case, the tunnelselection by the TB server 71 as part of the “Select Tunnel” step 146 isnot limited by the client, and any internal selection rules ormechanisms may be used. Alternatively or in addition, the client device31 a defines specific limitations or criteria for selecting a tunneldevice for a specific requested content. Such criteria may involvedefining attributes types, and a value of values relating to eachattribute values. In such a case, the tunnel selection by the TB server71 as part of the “Select Tunnel” step 146 is limited by the client, andthe client set limitations will apply in addition to any internalselection rules or mechanisms may be used. Alternatively or in addition,the client device 31 a may define a specific tunnel device, for exampleidentified by a specific IP address, to be used for a specific requestedcontent. For example, the web server 22 b may differently respond to acontent requesting device, based on past interactions with that device.In such a case, the client device 31 a may execute a flow chart 160 ashown in FIG. 16 a . In such a case, an identification of the tunneldevice that was selected as used for fetching the specific content isalso sent from SP server 72 to the client device 31 a, in addition tosending the fetched content from the SP server 72 as part of the “SendContent to Client” step 154, receiving it by the client device 31 a aspart of a “Receive Content from SF” step 162. The tunnel identificationis stored by the client device 31 a as part of a “Save Tunnel IP” step162 a. In a next content fetching cycle initiated by the client device31 a, such as when the content is to be fetched from the same web server22 b, the content request as part of the “Send Request to SP” step 161is appended to further include the specific tunnel device IP address tobe used, retrieved after being stored in prior operation as part of the“Save Tunnel IP” step 162 a, as part of a “Send Tunnel IP to SF” step161 a. The request for a specific tunnel device is then forwarded by theSP server 72 to the TB server 71 as part of the message path 131 a, andthen the TB server 71 selects the requested tunnel device for fetchingthe content, as part of the “Select Tunnel” step 146.

Each of the tunnel devices, such as the tunnel #1 33 a, the tunnel #2 33b, the tunnel #3 33 c, the tunnel #4 33 d, and the tunnel #5 33 e,generally executes a flowchart 170 shown in FIG. 17 . Upon connecting tothe Internet, upon deciding to serve as a tunnel server, or upon havingthe ability to serve as a tunnel device, the tunnel device initiatesconnection to the TB server 71, as part of an “Initiate TB Connection”step 171, respectively corresponding to the message paths 111 a, 111 b,111 c, 111 d, and 111 e. The connection initiation as part of the“Initiate TB Connection” step 171 is responded by the TB server 71 aspart of the “Accept and Open Connection” step 141 in the flow chart 140a, and is performed as part of the “Registration and Connection” phase81. In an arrangement where a tunnel selection is based on attributevalues, the tunnel device send the corresponding values, such as theoperating system type and version (corresponding to the column 102 f inthe table 100), and any other value relating to any other attributetype, as part of a “Send Attribute Value” step 172, so the value(associated with the tunnel device IP address, for example) may be addedto the tunnel registry as part of the tunnels list memory 73, such asadding a row to the table 100 by the TB server 71 as part of the “Add toTable” step 142. After initializing the communication, the tunnel deviceand the TB server 71 sustain a connection, such as a TCP connectionusing the TCP keepalive mechanism, as part of an “Establish Connection”step 173 and the “Establish Connection” step 143, respectivelyillustrated in the messaging chart 110 a as message dashed lines 112 a,112 b, 112 c, 112 d, and 112 e. The establishing of the sustainedconnection between the tunnel device and the TB server 71 completes the“Registration and Connection” phase 81 in the flow chart 80.

In a case where a tunnel device is selected by the TB server 71 as partof the “Select Tunnel” step 146, the TB server 71 send to the selectedtunnel device as part of the “Send Request to Tunnel” step 147 thecontent request, which is received as part of a “Receive Request fromTB” step 174, corresponding to the message path 131 b shown in theexample of selecting the tunnel #4 33 d in the messaging chart 120 b. Inresponse, the selected tunnel device #4 33 d forward the request to therelevant web server, such as the web server 22 b, as part of a “SendRequest to Web Server” step 175, corresponding to the message path 131 cshown in the example of selecting the tunnel #4 33 d in the messagingchart 120 b, thus completing the “Using Tunnel” phase 84 in the flowchart 80 shown in FIG. 8 .

As part of the “Content fetching” phase 85, the content retrieved fromthe web server 22 b (as a response to the request) is received by theselected tunnel device as part of a “Receive Content from Web Server”step 176 (corresponding to message path 131 d in the messaging chart130), and is then forwarded (or ‘tunneled’) to the TB server 71 as partof a “Send Content to TB” step 177, to be received by the TB server 71as part of the “Receive Content from Tunnel” step 148, corresponding tomessage path 131 e in the messaging chart 130.

The operation from “Receive Request from TB” step 174 to the “SendContent to TB” step 177 may be repeated each time the tunnel isselected. The connection established in the “Establish Connection” step173 is sustained after each such content tunneling operation, allowingfor additional tunneling operation to be performed using the sametunnel. The same tunnel may be selected for the same web server 22 b,such as for different URLs of the same web page stored in the web server22 b. Alternatively or in addition, the same tunnel may be used fordifferent web servers, such as for retrieving different web pages or websites associated with different web servers.

In one example, one or more of the tunnel devices are used primarily forpurposes other than serving as tunnel devices. In such a case, thetunnel functionality or operation, such as executing the flow chart 170shown in FIG. 17 , is executed in the background or when the device isidling from other activities, preferably with the knowledge of thetunnel device owner and user, and preferably with minimum interferenceor interaction with other processes, operations, or activities of thetunnel device.

In one example, a tunnel device may be a dedicated device, primarilyinstalled, used, or operated for serving as a tunnel device, such asprimarily (or solely) for executing the tunnel-related flow chart 170shown in FIG. 17 . In one example, the tunnel #1 33 a is such adedicated tunnel device, shown used as a tunnel in a messaging chart 180shown in FIG. 18 . In one example, the dedicated tunnel device #1 33 amay be owned, operated, or used by an entity 76 a which also owns,operates, or uses the TB server 71 and the SP server 72, as pictoriallyillustrated in the arrangement 180 a shown in FIG. 18 a . While a singlededicated device in exampled in the arrangement 180, multiple suchdevices may equally be used, and these dedicated tunnel devices may alsobe owned, operated, or used by the same entity 76 a. The using ofdedicated tunnel devices allows to provide more available tunnelanytime, and reduces the need of relying of availability third partydevices. Further, such dedicated devices may be optimized for theirprimary tunneling functionality.

While the system operation was exampled above where each tunnel deviceis associated with a single IP address, multiple IP addresses may beequally associated with any tunnel device. In one example, the dedicatedtunnel device 33 a shown in the arrangement 180 may be addressed usingmultiple IP addresses, such as by using multihoming. The dedicatedtunnel device 33 a (or any tunnel device) may execute the tunnel process170 for each of the IP addresses, either in parallel or sequentially (ora combination thereof), thus allowing the savings resulting by using asingle hardware device with a single Internet connection executingmultiple tunnel functionalities. Alternatively, multiple Internetconnection may be used, where one or more IP addresses are associatedwith each Internet connection. Dedicated tunnels may be implemented asclient devices, or preferably as server, such as located as part of datacenters. Preferably, the dedicated tunnels, either as client devices oras servers in data centers, are installed in many location around theworld, allowing for better load balancing due to the widespreaddistribution, as well as providing large variety of potential locationsor IP geolocations that may be selected as location attribute values byclient devices. A dedicated tunnel device may be associated with morethan 1,000, 2,000, 5,000, 10,000, 20,000, 50,000 or 100,000 distinct IPaddresses.

Further, tunnel devices may be owned, used, or operated by consumers. Insuch a case, their availability is only controlled by the user. Forexample, by turning off the device, such as at night, or by beinglocated at no Internet connection locations, the tunnel devices becomenot available to be used for tunneling functionality. In contrast,dedicated tunnel devices may be available to be selected and used at anytime, all year round (usually spoken “twenty-four seven”), and as suchmay allow the service provider 76 a to provide stable and consistenttunneling service to client devices. In addition, dedicated tunneldevices that are owned, operated, or controlled by the service provider76 a, obviate the need for distributing the tunnel functionality, suchas a software code that implements the tunnel flow chart 170, to variousdevices.

In general, the tasks performed by the TB server 71, as part of theoperation of the flow chart 140 shown in FIG. 14 , may be partitionedinto two main objectives: Selecting a tunnel device, such as the “SelectTunnel” step 146, and being in the ‘tunneling’ path of fetching thecontent, such as the “Receive Content from Tunnel” step 148 and the“Send Content to SP” step 149. In one exemplary arrangement, the TBserver 71 is focused only on the tunnel selecting operation and is nottaking part in the “Content Fetching” phase 85.

A messaging chart arrangement 190 that supports the obviating of the TBserver from being part of the content fetching path is shown in FIG. 19. In response to the tunnel #4 33 d exampled as being selected andcommunicated by the TB server 71 over the message path 131 b describedabove, the selected tunnel #4 33 d initiates a communication with the SPserver 72 over a message path 191. Any technique or technology may beused for directing the selected tunnel #4 33 d to connect to the SPserver 72, preferably a NAT traversal-based technique. Preferably, afterthe initial communication between the selected tunnel #4 33 d and the SPserver 72 is made, the connection (shown as a dashed line 192) issustained, such as by using TCP keepalive and part of a TCP Connectscheme, similar to, or different from, the connection 111 d that isestablished between the tunnel #4 33 d and the TB server 71. Once theconnection 192 is established and sustained, the SP server 72 mayinitiate communication with the selected tunnel #4 33 d. In one example,the SP server 72 sends the identification of the requested content (suchas a URL) to the selected tunnel #4 33 d, shown as a message path 193 ina messaging chart 190 a in FIG. 19 a Similar to the example shown inFIG. 13 above and the related description, the selected tunnel #4 33 dperforms the tunneling functionality by forwarding the content requestto the web server 22 b over the message path 131 c, and receiving therequested content over the message path 131 d. However, the requestedcontent is then forwarded to the requesting device, namely the SP server72, over a message path 194 illustrated as part of a messaging chart 190b in FIG. 19 b , rather than being forwarded to the TB server 71 overthe message path 131 e as described above. In turn, the received contentfrom the selected tunnel #4 33 d is forwarded by the SP server 72 to therequesting client 31 a over the message path 131 g as described above.

The mechanism of the “Content Fetching” phase 85 that is described inthe messaging chart 190 b involves the selected tunnel #4 33 d receivingthe content from the web server 22 d over the message path 131 d,forwarding the content from the selected tunnel #4 33 d over the messagepath 194 to the SP server 72, which in turn send the fetched content asa response to the requesting client 31 a over the message path 131 g.Such content path is preferred since the ‘tunneling’ via the TB server71 using the message paths 131 e and 131 f is obviated, providing oneless hop of carrying information from the web server 22 b to the clientdevice 31 a, thus providing less latency, higher reliability, and lesscosts associated with the additional traffic, hardware and processingpower required for handling the unnecessary tunneling via the TB server71. Further, such scheme allows to optimize the structure andfunctionalities of the TB server 71 for tunnel selection activities.

In the alternative arrangement described in FIGS. 19-19 b, the TB server71 generally executes a flowchart 200 shown in FIG. 20 , which is basedon the flowchart 140 shown in FIG. 14 . The TB server 71 generallyexecutes in parallel at least the unchanged “Connection Handler” flowchart 140 a and a “Selection Handler” flow chart 201, which may replacethe “Request Handler” flow chart 140 b, which is direct to selecting atunnel device according to a criteria.

As part of processing a content request from the client device 31 a, theTB server 71 receives from the SP server 72, over the message path 131 ashown in the messaging chart 190, criteria (or a criterion) forselecting a tunnel device to be used for delivering the requestedcontent, as part of a “Receive Criteria from SF” step 202. While as partof the “Receive Request from SF” step 145 that is part of the flow chart140 b the TB server 71 was also notified of the identification of therequested content, such identification is not required in thisalternative scheme, since the TB server 71 is no longer part of theactual content request and fetching data paths. In one example, the samemessage, including also the content identification is sent from the SPserver 72 to the TB server 71 over the message path 131 a, so that the“Receive Criteria from SP” step 202 may be rendered to be the same asthe “Receive Request from SF” step 145 described above. After a tunneldevice is selected as part of the “Select Tunnel” step 146, the TBserver 71 sends a message to the selected tunnel #4 33 d over themessage path 131 b, directing it to initiate communication (such as byusing NAT traversal) with the SP server 72, as part of the “Connect andDirect Tunnel” step 203. In the scheme shown in FIG. 19 , the tunnelselection phase 83 is completed, and the involvement of the TB server 71in the fetching process ends after directing the selected tunnel #4 33 din the “Connect and Direct Tunnel” step 203.

In the alternative arrangement described in FIGS. 19-19 b, the SP server72 generally executes a flowchart 210 shown in FIG. 21 , which is basedon the flowchart 150 shown in FIG. 15 . The SP server 72 generallyexecutes the flowchart 210 shown in FIG. 21 for each piece ofinformation or content (such as a single URL) requested by the clientdevice 31 a. The operation starts when a content request is receivedfrom the client device 31 a as part of the “Receive Request from Client”step 151, which corresponds to the message path 121 a shown in themessaging chart 120 and performed as part of the “Content Request” phase82. A request from the client device 31 a may include bothidentification of the requested content and criteria for selecting atunnel device, such as the attribute type to use and the associatedattribute value or values. As part of a “Send Criteria to TB” step 212,the criteria set by the client device 31 a for selection of a tunneldevice, as part of the request, is sent to the TB server 71, without thecontent identification part, over the message path 131 a, to be receivedby the TB server 71 as part of the “Receive Criteria from SP” step 202.Alternatively, the message sent includes the whole content requestinformation, similar to, or identical to, the “Send Request to TB” step152 in the flow chart 150, which corresponds to the message path 131 ashown in the messaging chart 120 a, and received by the TB server 71 aspart of the “Receive Request from SF” step 145. As part of an “Acceptand Open Connection” step 213, the SP server 72 receives a communicationinitiated by the selected tunnel #4 33 d, shown as a message path 191,and the connection between the SP server 72 and the selected tunnel #433 d is sustained as part of an “Establish Connection” step 214. Thesustained connection is illustrated as a message path 192, and may bebased on TCP connection that uses the TCP keepalive mechanism, similarto the connection 111 d between the selected tunnel #4 33 d and the TBserver 71. The sustained connection allows the SP server 72 to initiatecommunication with the tunnel #4 33 d, even in the presence of afiltering device such as a router or the firewall 75.

Using the established connection 192, the SP server 72 forwards thecontent identification to the selected tunnel #4 33 d as part of a “SendRequest to Tunnel” step 215, illustrated as message path 193 in amessaging chart 190 a shown in FIG. 19 a , and in response the selectedtunnel #4 33 d provides ‘tunneling’ by forwarding the request to the webserver 22 b over the message path 131 c, as part of the “Using Tunnel”phase 84. The content fetched by the selected tunnel #4 33 d is in turnsent to the SP server 72, and received over the message path 194illustrated in a messaging chart 190 b shown in FIG. 19 b , as part of a“Receive Content from Tunnel” step 216. Similar to the flow chart 150above, the SP server 72 then forward the fetched content as a responseto the client device 31 a request over the message path 131 g as part ofthe “Send Content to Client” step 154, completing the “Content Fetching”phase 85.

In the alternative arrangement described in FIGS. 19-19 b, the selectedtunnel device, such as the exampled tunnel device #4 33 d, generallyexecutes a flowchart 220 shown in FIG. 22 , which is based on theflowchart 170 shown in FIG. 17 . The selected tunnel device generallyexecutes the flowchart 220 shown in FIG. 22 each time it is selected asa tunnel device by the TB server 71. Using the established connection111 d, the tunnel #4 33 d receives an instruction from the TB server 71(that is sent as part of the “Connect and Direct Tunnel” step 203 of theflow chart 201) to connect to the SP server 72, as part of a “ReceiveDirect from TB” step 221 over the message path 131 b. In response, aspart of a “Initiate SP Connection” step 222, the tunnel device #4 33 dconnects to the SP server 72, and then a sustained connection, shown asthe message path 192, is formed as part of a “Establish Connection” step223, corresponding to the “Establish Connection” step 214 in the flowchart 210. A content request sent by the SP server 72 as part of the“Send Request to Tunnel” step 215 (in the flow chart 210) is received bythe selected tunnel #4 33 d as part of a “Receive Request from SF” step224, illustrated as the message path 193 in the messaging chart 190 ashown in FIG. 19 a . Similar to the flow chart 170 above, the selectedtunnel device forward the request to the relevant web server, such asthe web server 22 b, as part of the “Send Request to Web Server” step175, corresponding to the message path 131 c shown in the example ofselecting the tunnel #4 33 d in the messaging chart 190 a, thuscompleting the “Using Tunnel” phase 84 in the flow chart 80 shown inFIG. 8 .

As part of the “Content fetching” phase 85, the content retrieved fromthe web server 22 b (as a response to the request) is received by theselected tunnel device as part of the “Receive Content from Web Server”step 176 (corresponding to the message path 131 d in the messaging chart130), and is then forwarded (or ‘tunneled’) to the SP server 71 as partof a “Send Content to SP” step 225, and received by the SP server 72 aspart of the “Receive Content from Tunnel” step 216, corresponding tomessage path 194 in the messaging chart 190 b.

Any of the steps or the flow charts to be executed by a tunnel device,may be included as a Software development kit (SDK) that is provided asa non-transitory computer readable medium containing computerinstructions. The SDK may be installed in a respective tunnel device, tobe executed by a processor in that device, appended to another softwareprogram or application installed on the tunnel device.

An attribute type is used herein to include any characteristic, feature,aspect, property, or any other piece of information where one tunneldevice is different from another tunnel device. The attribute type maybe associated with the tunnel device itself, such as its hardware,software, or any combination thereof, the tunnel device environment,such as its location, or a connectivity related feature or capability,such as relating to Internet connectivity. Each available tunnel devicemay be associated with a value (or multiple value, such as a range) foreach attribute type. The attribute values may be stored in the tunnelslist memory 73 that is part of, or connected to, the TB server 71, thatmay be, for example, in the form of the table 100 shown in FIG. 10 .

The table 100 examples in the “Geographic Location” column 102 c anattribute type relating to the location of tunnel devices, which may beactual geographical location or may be based on IP Geolocation. In theexample of the “Geographic Location” column 102 c, the attributes valuesare in the form of cities, such as the city of Munich, Germany in thesecond row 101 b that corresponds to a tunnel device having an IPaddress of 176.94.1.17, and the city of Mumbai, India in the sixth row101 f that corresponds to a tunnel device having an IP address of59.144.192.23. While city is exampled as values, any other physicalgeographical location or region may be used, such as country, state orprovince, city, street address, ZIP code, or any combination thereof.Similarly, an attribute type may correspond to the Internet connectionof a tunnel device, as the table 100 examples in the “ASN” column 102 drelating to the ASN (or ISP name or any other identification). In theexample of the “ASN” column 102 d, the attributes values are in the formof digits that represent the ASN (or ISP), such as the ASN 3215 in thefirst row 101 a that corresponds to a tunnel device having an IP addressof 80.12.105.150, and the ASN 11419 in the seventh row 101 g thatcorresponds to a tunnel device having an IP address of 200.196.224.89.Any other identification of ASN, ISP, or any other Internet connectionrelating mechanism or identity may be equally used.

Another attribute type that may correspond to the technology used forinterconnecting a tunnel device to the Internet, as the table 100examples in the “Connection Type” column 102 e relating to thetechnology or connection scheme. Similarly, the attribute type maycorrespond to a tunnel device hardware or software, type, version, orany combination thereof, such as the table 100 examples in the“Operating System” column 102 f. Alternatively or in addition, anattribute type may correspond to estimated or measured communicationrelated features, such as the bandwidth as exampled in the “BW” column102 g or the “RTT” column 102 h. The BW or RTT may relate to the tunnelestimated or measured communication properties (such as parametersmeasured in previous transactions) with the web server 22 b (such asover the message paths 131 c or 131 d), with the TB server 71 (such asover the message paths 131 b and 131 e), or with the SP server 72 (suchas over the message paths 191 and 194).

In one example, a single attribute type is used for distinguishingbetween the various available tunnel devices. In this case, the clientdevice 31 a, as part of the “Send Request to SF” step 161, sends to theSP server 72 over the message path 121 a a value (or multiple values,such as a range) requested for the selected tunnel that is to be used infetching the requested content. The value (or multiple values, such as arange) is received by the SP server 72 as part of the “Receive Requestfrom Client” step 151, and forwarded to the TB server 71 over themessage path 131 a as part of “Send request to TB” step 152. The value(or multiple values, such as a range) is received by the TB server 71 aspart of the “Receive Request from SF” 145, and is used as a criteria forselecting a tunnel device for this content fetching transaction as partof the “Select Tunnel” step 146. In one example, a single value isrequested, and the TB server 71 thus selects a tunnel device having avalue that is identical to the requested value from the client device 31a.

For example, assuming an attribute type of operating system and a valueof “Window 7”, since there is only a single tunnel, being the tunnelrepresented in the fourth row 101 d having an IP address of83.220.232.67, this tunnel is selected. In a case where multipleavailable tunnel devices in the table 100 are associated with therequested value, one of these available tunnel is selected, such asusing random selection. In another example, few values are requested.For example, assuming an attribute type of ‘connection type’ and valuesof “ADSL or VDSL”, there are three tunnel devices that may be selected,namely the first row 101 a (a tunnel device having an IP address of80.12.105.150), the fourth row 101 d (a tunnel device having an IPaddress of 83.220.232.67), and the seventh row 101 g (a tunnel devicehaving an IP address of 200.196.224.89). Any one of these tunnel devicesmay be selected, such as using random selection. Similarly, the clientdevice 31 a may define a range of values, typically where numeral valuesare involved, such as in the attribute type relating to column “BW” 102g or the “RTT” column 102 h. For example, the client device 31 a maydefine a “RTT” attribute type having a range between 200 ms (minimumvalue) and 400 ms (maximum value), directing the selection of the tunneldevice represented in the six row 101 f (a tunnel device having an IPaddress of 59.144.192.23) or the tunnel device represented in theseventh row 101 g (a tunnel device having an IP address of200.196.224.89), in the example of the table 100. Similarly, the clientdevice 31 a may define only a minimum value, or only a maximum value.For example, a maximum RTT value of 100 ms results in the first row 101a and second row 101 b.

Alternatively or in addition, the selection of the tunnel device to beused (as part of the “Select Tunnel” step 146), or the prioritiesassigned to them, may be based on the available communication attributesor their history. For example, based on the costs associated with theusage of a network, the higher cost network may have lower priority andless used than lower cost or free network. In another example, a highquality network, such as having a higher available bandwidth orthroughput, lower communication errors or packet loss, lower hops todestination, or lower transfer delay time, is having higher prioritythat a lower quality network. The system may use Bit Error Rate (BER),Received Signal Strength Indicator (RSSI), Packet Loss Ratio (PLR),Cyclic Redundancy Check (CRC) and other indicators or measuresassociated with the communication channel associated with a networkinterface, and may be based on, use, or include the methodology andschemes described in RFC 2544 entitled: “Benchmarking Methodology forNetwork Interconnect Devices”, and ITU-T Y.1564 entitled: “EthernetService Activation Test Methodology”, which are both incorporated intheir entirety for all purposes as if fully set forth herein. Thenetwork quality grade may be affected by the history of using such anetwork, for example during a pre-set period before the process ofselection of a network interface. In one example, the network interfacewhere the last proper packet was received from may be selected as theinterface to be used for the next packet to be transmitted. The systemmay further use, or be based on, the schemes and technologies describedin U.S. Pat. No. 7,027,418 to Gan et al. entitled: “Approach forSelecting Communications Channels Based on Performance”, which isincorporated in its entirety for all purposes as if fully set forthherein.

Hence, for any value or range of value defined, a tunnel device to beused may be selected from a set of available tunnel devices, which is asubset of all available tunnel devices that match the requested value orrange of values. In one example, the client device 31 a may use twoattributes types, and a value (or a group of values) associated witheach attribute type. In such a case, two subsets are formed, one foreach attribute, which each subset includes of all available tunneldevices that match the respective requested value (or range of values)for each attribute types. The client device 31 a may further define asubset that is resulted by an operation on the two subsets. For example,the client device 31 a may define to select a tunnel from a set that isa union of the two subsets (an ‘or’ operation), where the union (denotedby U) of a collection of sets is the set of all elements in thecollection, an intersection of the two sets (an ‘and’ operation), wherethe intersection A∩B of two sets A and B is the set that contains allelements of A that also belong to B (or equivalently, all elements of Bthat also belong to A), but no other elements, a set difference orcomplement operation (where the complement of a set A refers to elementsnot in A), or asymmetric difference operation the symmetric difference,also known as the disjunctive union, which is the set of elements whichare in either of the sets and not in their intersection. For example, ina case of defining a value of BW equal or above 1500 Kb/s ‘and’ an RTTbelow 300 ms, the resulted intersection subset includes only the tunneldevice represented in the sixth row 101 f, while in a case of a value ofBW equal or above 1500 Kb/s ‘or’ an RTT below 300 ms, the resulted unionsubset includes all rows except the seventh row 101 g. Similarly, threeor more attributes values may be defined relating to three of moreattribute types.

In one example, the entity 76 or 76 a forms a system that may be used toprovide a service to client devices. The service allows the clientdevice (such as the client device 31 a) to quickly and anonymously fetchcontent from a web server, such as the web server 22 b. The servicelevel may be measured, or the service may be billed for, if applicable,for example, using the following parameters (individually or combined):

Content amount. In this example, the amount of data relating to thecontent fetched from a data server (such as the web server 22 b) ismeasured and logged, by the SP server 72 or the TB server 71.Alternatively or in addition, the client device 31 a may log or send theamount of content fetched. Number of tunnels: The number of tunneldevices that were available to a client device, or the number of tunneldevices that were actually used, may be used as an indication to theservice level. Location: The service level may be measured or billedbased on the country of the data server, from which the content isfetched, is located. Similarly, the service level may be measured orbilled based the country the client device, to which the content isfetched, is located.

In the messaging chart 190 b shown in FIG. 19 b , and in the messagingchart 130 shown in FIG. 13 , a single TB server 71 is used. However,multiple TB servers may equally be used, such as for load balancing orfor performance optimization. In one example, the tunnel list 73, suchas in the form of a table 100, is split among multiple databases storedin, or connected to, multiple servers using database sharding. Such anarrangement is shown in a messaging chart 230 shown in FIG. 23 , whichis based on the corresponding messaging chart 130. In addition to the TBserver 71, a TB server 71 a and a TB server 71 b are connected to theInternet and may be used. While three TB servers are exampled in FIG. 23, two, four, five, or any other number of TB servers may equally beused. The messaging chart 230 examples the SP server 72 selecting the TBserver 71 a, rather than using the TB server 71 as shown in themessaging chart 130. Similar to the former described operation, the SPserver 72 forward a request to the TB server 71 a over a message path131 a 1, and the TB server 71 a may in turn select the tunnel device #433 d, and send a message to it over a message path 131 b 1, followed byestablishing of the connection 111 d 1. Similarly, an arrangementemploying multiple TB servers is shown in a messaging chart 230 a shownin FIG. 23 a , which is based on the corresponding messaging chart 190b, where the TB server 71 a is used instead of the TB server 71.

Each of the TB servers may execute the flow chart 140 shown in FIG. 14or the flow chart 200 shown in FIG. 20 , and may store a table includingtunnel devices, in the form, of the table 100. Preferably, loadbalancing is achieved where the total available tunnel devices (or IPaddresses) are split, such as evenly, between the available TB servers.For example, one third of the available tunnel devices may be associatedwith the TB server 71, another third with the TB server 71 a, and therest third with the TB server 71 b. Preferably, the allocation of tunneldevices (or IP addresses) between the available TB servers may be basedon an attribute type, such as the attribute types described associatedwith the different tunnel devices. In one example, a geographicallocation may be used. The various TB servers may be locatedgeographically distributed around the world, and tunnel devices areallocated based on their perspective geographical location, eitheractual location or IP location. For example, tunnel devices may beallocated to respective TB servers based on their continent, country,region or state, or city. For example, one TB server, such as the TBserver 71, may be located in Europe, handling all tunnel devices havingan actual geographical location, or IP geolocation, within Europe, suchas in Germany or France, a second TB server, such as the TB server 71 a,may be located in North America, handling all tunnel devices having anactual geographical location, or IP geolocation, within North America,such as in U.S.A. or Canada, and a third TB server, such as the TBserver 71 b, may be located in Asia, handling all tunnel devices havingan actual geographical location, or IP geolocation, within Asia such asin China or Thailand. In such a case, the SP server 72 may select theappropriate TB server to use based on the attribute value received fromthe requesting client 31 a over the message path 121 a, as part of the“Receive Request from Client” step 151.

An SP server 72 operation in the case of multiple TB servers arrangementis described in a flow chart 240 shown in FIG. 24 , which is based onthe corresponding flow chart 150 shown in FIG. 15 . As part of a “SelectTB” step 241, a specific TB server, such as the TB server 71 a in theexample of the messaging chart 230, is selected, and the operationcontinues with working with this selected TB server, such as in a “SendRequest to Selected TB” step 242. Similarly, an SP server 72 operationin the case of multiple TB servers arrangement is described in a flowchart 240 a shown in FIG. 24 a , which is based on the correspondingflow chart 210 shown in FIG. 21 . As part of the “Select TB” step 241, aspecific TB server, such as the TB server 71 a in the example of themessaging chart 230, is selected, and the operation continues withworking with this selected TB server, such as in the “Send Request toSelected TB” step 242. The TB server may be randomly selected, as partof the “Select TB” step 241, or may be based on an attribute valuereceived from the client device 31 a, such as geographical location.

A tunnel device operation, such as the elected tunnel device #4 33 d, inthe case of multiple TB servers' arrangement is described in a flowchart 240 b shown in FIG. 24 b , which is based on the correspondingflow chart 170 shown in FIG. 17 . As part of a “Select TB” step 241, aspecific TB server, such as the TB server 71 a in the example of themessaging chart 230, is selected, and the operation continues withworking with this selected TB server, such as in an “Initiate TBConnection” step 171. Similarly, a tunnel device operation in the caseof multiple TB servers arrangement is described in a flow chart 240 cshown in FIG. 24 c , which is based on the corresponding flow chart 220shown in FIG. 22 . As part of the “Select TB” step 241, a specific TBserver, such as the TB server 71 a in the example of the messaging chart230, is selected, and the operation continues with working with thisselected TB server, such as in the “Initiate TB Connection” step 171.The TB server may be randomly selected, as part of the “Select TB” step241, or may be based on an attribute value received from the clientdevice 31 a, such as geographical location.

In one example, a DNS resolution is required for fetching the contentfrom the web server 22 b. In one example, the DNS resolution isperformed by the requesting client 31 a, as illustrated in a messagingchart 250 shown in FIG. 25 . Before requesting the content from the SPserver 72, the client device 31 a uses a DNS server 251 for a DNSresolution, shown as a message path 252 a. Then, the request sent to theSP server 72 over the message path 121 a includes the resolution result,so there is no need for any DNS activity afterwards. Any DNS server maybe used as the DNS server 251 by the client device 31 a. In one example,a specific DNS server 251 is used, which is operated, controlled, ormanaged by an entity 76 b as illustrated in a messaging chart 250 ashown in FIG. 25 a , which also operates, controls, or manage the TBserver 71 and the SP server 72. This entity 76 b may be the same entityas the entity 76 a (or 76) described above. The client device 31 aoperation, including a “DNS Resolution” step 261 is described in a flowchart 260 shown in FIG. 26 , which is based on the corresponding flowchart 160 shown in FIG. 16 .

Alternatively or in addition, the DNS resolution may be performed by theSP server 72, as illustrated in a messaging chart 270 shown in FIG. 27 .Before requesting for a tunnel device allocation or the content from theTB server 71, the SP server 72 use a DNS server 251 for a DNSresolution, shown as a message path 252 b. Then, the request that issent to the selected tunnel device includes the resolution result, sothere is no need for any DNS activity afterwards. The SP server 72operation, including a “DNS Resolution” step 261 is described in a flowchart 280 shown in FIG. 28 , which is based on the corresponding flowchart 150 shown in FIG. 15 . Alternatively or in addition, the SP server72 operation, including a “DNS Resolution” step 261 may be as describedin a flow chart 280 a shown in FIG. 28 a , which is based on thecorresponding flow chart 240 shown in FIG. 24 .

Alternatively or in addition, the DNS resolution may be performed by theselected tunnel device, such as the tunnel device #4 33 d, asillustrated in a messaging chart 290 shown in FIG. 29 . Beforerequesting the content from the web server 22 b, the tunnel device #4 33d uses a DNS server 251 for a DNS resolution, shown as a message path252 c. Then, the request that is sent to the web server 22 b includesthe resolution result. The tunnel device #4 33 d operation, including a“DNS Resolution” step 261 is described in a flow chart 300 shown in FIG.30 , which is based on the corresponding flow chart 170 shown in FIG. 17. Alternatively or in addition, the tunnel device #4 33 d operation,including a “DNS Resolution” step 261 may be as described in a flowchart 300 a shown in FIG. 30 a , which is based on the correspondingflow chart 220 shown in FIG. 22 .

In the example of the messaging chart 180 shown in FIG. 18 above, thetunnel #1 33 a was described as a dedicated device, which is primarilyinstalled and used to serve as a tunnel device, or as concurrentmultiple tunnel devices, each associated with a different IP address.However, one or more of the tunnel devices may be non-dedicated ones,where their primary functionality or use is other than serving as atunnel device. For example, the device may be intended to be owned,controlled, or used by a human operator, for various functionalities. Inone example, the main functionality may be to serve as a smartphone,such as for making telephone call over a cellular network, as exampledin the tunnel #2 33 b. In such a case, the tunnel functionality isassociated with lower priority compared to other tasks orfunctionalities performed by the device. Furthermore, it is preferredthat the tunnel functionality does not affect in any way, the primaryfunctions of the device, and will not interfere or degrade any othertask of functionality provided by the device. Preferably, the tunnelrelated functionality will be operated only when the device is idling,such as not providing any current service or performing any task ofinteraction with the human user, preferably so the effect of performingany tunnel functionality is hardly or not noticed in any way by thehuman operator.

As used herein, the term “idle state” is used to refer to a state inwhich a device and/or one or more resources of the device are not beingused to perform operations considered to be of a sufficiently highpriority, or device resources are not being used at a level ofintensity, that the operations should not be interrupted or competedwith by, or such resources should not be diverted to any extent to, oneor more relatively lower priority operations. In one example, ‘idlestate’ refers to a state where the human user is not interacting withthe device, and hence is not aware of any interfering with any processor task performed. The term “idle condition” is used in connection withsome embodiments to refer to a condition that indicates whether and/oran extent to which the device has entered and/or exited such an idlestate. Preferably, a tunnel device performs its tunnel related tasksonly when in the idle state, so that the human user or operator is notaffected by, or aware of, the tunnel related activity.

An example of a state diagram 310 of a tunnel device, such as the tunnel#2 33 b, the tunnel #3 33 c, the tunnel #4 33 d, or the tunnel #5 33 e,is shown in FIG. 31 . Upon powering the device, a POWER-UP state 311 isestablished, during which the computerized system is initialized, suchas by booting the operating system and connecting to the Internet. Uponcompleting the POWER-UP 311 sequence, when normal, operative, runtimeenvironment is attained, and the device may provide its primaryfunctions or functionalities, the device shifts (shown as a line 315 a)to an ‘ACTIVE’ state 312, and stays in this state as long as theprimarily functions or tasks are used. During the ‘ACTIVE’ state 312, anidle condition is continuously monitored, and when such idle conditionis detected (shown as an ‘IDLE’ Detect line 315 b), the device sends amessage to the TB server 71 regarding entering an ‘IDLE’ state 313 inthe “Notify TB” step 314 a, such as by using the established connection111 d, which is followed (shown as a line 315 c) by entering the ‘IDLE’state 313. Preferably, the tunnel device is selected by the TB server 71(as part of the “Select Tunnel” step 146) during the ‘IDLE’ state 313,allowing for minimum intervention or interfering with the primary tasksand functionalities of the tunnel device.

In one example, the tunnel device connects to the TB server 71 as partof the “Initiate TB Connection” step 171, sends the attribute value aspart of the “Send Attribute Value” step 172, and establishes the TCPconnection as part of the “Establish Connection” step 173 immediatelyafter completing the POWER-UP state 311, as part of the shift to theACTIVE state 312 shown as the shift line 315 a. However, in such a case,the tunnel device may not be selected by the TB server 71 as part of the“Select Tunnel” step 146 as long as the tunnel device has not notifiedthe TB server 71 in the “Notify TB” step 314 a that is in the IDLE state313. In such a case, the status of the available tunnel devices isstored in the TB server 71, in a form of table 330 shown in FIG. 33 ,which is based on the table 100 shown in FIG. 10 . An ‘IDLE’ column 102i id added, denoting by ‘Y” if the respective tunnel device is in the‘IDLE’ state 313, and ‘N’ if the respective tunnel device is not in the‘IDLE’ state 313, such as in the ‘ACTIVE’ state 312. Upon receiving amessage of shifting to IDLE state 313 by the “Notify TB” step 314 a, theTB server 71 changes the respective value in the IDLE column 102 i to‘Y’. Preferably, the TB server 71 selects a tunnel that is in the ‘IDLE’state 313, as noted by the respective value ‘Y’ in the IDLE column 102i, such as from the tunnel devices associated with the first row 101 a,the fourth row 101 d, the fifth row 101 e, and the seventh row 101 g inthe example of the modified table 330.

During the ‘IDLE’ state 313, an idle condition is continuouslymonitored, and when such idle condition is not met (shown as an ‘ACTIVE’Detect line 315 d), the device sends a message to the TB server 71regarding entering an ‘ACTIVE’ state 312 in the “Notify TB” step 314 b,such as by using the established connection 111 d, which is followed(shown as a line 315 e) by re-entering the ‘ACTIVE’ state 312. Uponreceiving a message of shifting to ACTIVE state 312 by the “Notify TB”step 314 b, the TB server 71 changes the respective value in the IDLEcolumn 102 i to ‘N’. Preferably, the TB server 71 does not selects atunnel that is in the ‘IDLE’ state 313, as noted by the respective value‘N’ in the IDLE column 102 i, such as from the tunnel devices associatedwith the second row 101 b, the third row 101 c, and the sixth row 101 fin the example of the modified table 330.

A flow chart 320 of a tunnel device that may be used only when idling isshown in FIG. 32 , corresponding to the flow chart 170 shown in FIG. 17. After establishing a connection as part of the “Establish Connection”step 173, the tunnel device checks, as part of the “IDLE?” step 321 ifit is in the IDLE state 313. In a case where the tunnel device is not inthe IDLE state 313, such as if it is in the ACTIVE state 312, a messagenotifying the unavailability of the tunnel device to serve as a tunnelis sent to the TB server 71 as part of a “Send Status to TB” step 322 b,which may corresponds to the “Notify TB” step 314 b. In a case where thetunnel device is in, or entering, the IDLE state 313, a messagenotifying the availability of the tunnel device to serve as a tunnel issent to the TB server 71 as part of a “Send Status to TB” step 322 a,which may corresponds to the “Notify TB” step 314 a. Upon receiving sucha notification, the TB server 71 may select the tunnel device as part ofthe “Select Tunnel” step 146, and the selected tunnel is contacted aspart of the “Receive Request from TB” step 174. Similarly, a flow chart320 a of a tunnel device that may be used only when idling is shown inFIG. 32 a , corresponding to the flow chart 220 shown in FIG. 22 .

Alternatively or in addition, the tunnel device connects to the TBserver 71, as part the “Initiate TB Connection” step 171, when enteringthe IDLE state 313. For example, the “Notify TB” step 314 a maycorrespond to the “Initiate TB Connection” step 171, so the TB server 71may be aware of the tunnel device availability only when such a deviceis in the IDLE state 313. In such a case, upon the sensing of the‘ACTIVE’ detect 315 d, as part of the “Notify TB” step 314 b, theestablished connection 111 d with the selected tunnel device isdisconnected, such as by stopping the TCP keepalive mechanism, so thatthe TB server 71 is notified that the selected tunnel device is no longavailable to serve as a tunnel device.

Idle detection techniques are disclosed in U.S. Pat. No. 9,244,682 toRowles et al. entitled: “Idle detection”, which is incorporated in itsentirety for all purposes as if fully set forth herein. A set of idleconditions that includes one or more conditions not comprising ortriggered by an absence of user input is monitored. The device isdetermined to be idle based at least in part on results of themonitoring. The device may be determined not to be idle even in theabsence of recent user input. Any of the idle detection techniques thatare disclosed in the U.S. Pat. No. 9,244,682 to Rowles et al. mayequally be used herein. Further, in some embodiments, a user oradministrator configurable set of idle detection conditions applicableto the particular device and/or desired by the user or administrator areused.

In one example, the idle condition will be based on, or use, services ortasks provided by the operating system or other software applicationsthat are concurrently executed in the tunnel device with the tunnelrelated flow chart or functionalities. For example, most operatingsystems will display an idle task, which is a special task loaded by theOS scheduler only when there is nothing for the computer to do. The idletask can be hard-coded into the scheduler, or it can be implemented as aseparate task with the lowest possible priority. An advantage of thelatter approach is that programs monitoring the system status can seethe idle task along with all other tasks; an example is Windows NT'sSystem Idle Process.

A screensaver (or screen saver) is a computer program that blanks thescreen or fills it with moving images or patterns when the computer isnot in use, and is typically a computer program that displays aestheticpatterns or images when the computer is not being used, originallyintended to prevent screenburn. While the original purpose ofscreensavers was to prevent phosphor burn-in on CRT and plasma computermonitors (hence the name), though modern monitors are not susceptible tothis issue, screensavers are still used for other purposes. Screensaversare often set up to offer a basic layer of security, by requiring apassword to re-access the device. Some screensavers use the otherwiseunused computer resources to do useful work, such as processing fordistributed computing projects. The screensaver typically terminatesafter receiving a message from the operating system that a key has beenpressed or the mouse has been moved. In one example, upon executing anidle process or thread (by the operating system or any other softwareapplication), or when a screensaver application is operated, the idlecondition is considered to be met, and respectively upon terminating anidle process or the screensaver operation, the idle condition isconsidered not to be met.

In one example, the idle condition is met when any application otherthan a screen saver is running in “full screen” mode (e.g., movies orvideo games often run in this mode), relating to a display which coversthe full screen without the operating system's typical window-framinginterface, or a window occupying all the available display surface of ascreen. Conversely, a screen may not be powered or may be blanked,suggesting that is not visualized by a human user. In one example, upondisplaying a full screen by a software application the idle condition isconsidered not to be met, since it is assumed that the human user iswatching that screen. However, upon a blanked display or a closed (suchas non-powered) displaying, the idle condition is considered to be met,since it is assumed that the human user is not watching in front of thescreen.

An input device, such as the input device 18 as part of the computersystem 10 shown in FIG. 1 , is a piece of computer hardware equipmentused to provide data and control signals to an information processingsystem such as a computer or information appliance. Such input devicemay be an integrated or a peripheral input device (e.g., hard/softkeyboard, mouse, resistive or capacitive touch display, etc.). Examplesof input devices include keyboards, mouse, scanners, digital cameras andjoysticks. Input devices can be categorized based on the modality ofinput (e.g., mechanical motion, audio, visual, etc.), whether the inputis discrete (e.g. pressing of key) or continuous (e.g., a mouse'sposition, though digitized into a discrete quantity, is fast enough tobe considered continuous), the number of degrees of freedom involved(e.g., two-dimensional traditional mice, or three-dimensional navigatorsdesigned for CAD applications). Pointing devices (such as ‘computermouse’), which are input devices used to specify a position in space,can further be classified according to whether the input is direct orindirect. With direct input, the input space coincides with the displayspace, i.e. pointing is done in the space where visual feedback or thepointer appears. Touchscreens and light pens involve direct input.Examples involving indirect input include the mouse and trackball, andwhether the positional information is absolute (e.g., on a touch screen)or relative (e.g., with a mouse that can be lifted and repositioned).Direct input is almost necessarily absolute, but indirect input may beeither absolute or relative. For example, digitizing graphics tabletsthat do not have an embedded screen involve indirect input and senseabsolute positions and are often run in an absolute input mode, but theymay also be set up to simulate a relative input mode like that of atouchpad, where the stylus or puck can be lifted and repositioned.

In one example, the idle detection is based on receiving any input (orchange of an input) from an input device. For example, a pre-definedtime interval may be used, measured by a dedicated timer or counter orused as a service of the operating system. In case of no input sensedfrom one or more input devices during the pre-defined time interval, theidle condition is considered to be met. Further, the idle condition isconsidered not to be met upon receiving any input from one or more ofthe input devices. Examples include, without limitation, detectingreceipt of a user input, e.g., via mouse movement, touch screeninteraction, button clicks, or keyboard keystrokes. Such idle-detectionmethods can detect if a human-interaction device such as a mouse,keyboard, or touch-screen has not been used for a certain amount oftime.

When portable or handheld devices are involved, the idle condition maybe considered to be met when no motion or acceleration (or a motion oran acceleration below a set threshold) is sensed for a pre-defined timeinterval, using an accelerometer, a motion sensor, or a GPS. The motionsensor may be based on a piezoelectric accelerometer that utilizes thepiezoelectric effect of certain materials to measure dynamic changes inmechanical variables (e.g., acceleration, vibration, and mechanicalshock). Piezoelectric accelerometers commonly rely on piezoceramics(e.g., lead zirconate titanate) or single crystals (e.g., quartz,tourmaline). Piezoelectric quartz accelerometer is disclosed in U.S.Pat. No. 7,716,985 to Zhang et al. entitled: “Piezoelectric QuartzAccelerometer”, U.S. Pat. No. 5,578,755 to Offenberg entitled:“Accelerometer Sensor of Crystalline Material and Method forManufacturing the Same” and U.S. Pat. No. 5,962,786 to Le Traon et al.entitled: “Monolithic Accelerometric Transducer”, which are allincorporated in their entirety for all purposes as if fully set forthherein. Alternatively or in addition, the motion sensor may be based onthe Micro Electro-Mechanical Systems (MEMS, a.k.a. Micro-mechanicalElectrical Systems) technology. A MEMS based motion sensor is disclosedin U.S. Pat. No. 7,617,729 to Axelrod et al. entitled: “Accelerometer”,U.S. Pat. No. 6,670,212 to McNie et al. entitled: “Micro-Machining” andin U.S. Pat. No. 7,892,876 to Mehregany entitled: “Three-axisAccelerometers and Fabrication Methods”, which are all incorporated intheir entirety for all purposes as if fully set forth herein. An exampleof MEMS motion sensor is LIS302DL manufactured by STMicroelectronics NVand described in Data-sheet LIS302DL STMicroelectronics NV, ‘MEMS motionsensor 3-axis —±2g/±8g smart digital output “piccolo” accelerometer’,Rev. 4, October 2008, which is incorporated in its entirety for allpurposes as if fully set forth herein.

Alternatively or in addition, the motion sensor may be based onelectrical tilt and vibration switch or any other electromechanicalswitch, such as the sensor described in U.S. Pat. No. 7,326,866 toWhitmore et al. entitled: “Omnidirectional Tilt and vibration sensor”,which is incorporated in its entirety for all purposes as if fully setforth herein. An example of an electromechanical switch is SQ-SEN-200available from SignalQuest, Inc. of Lebanon, NH, USA, described in thedata-sheet ‘DATASHEET SQ-SEN-200 Omnidirectional Tilt and VibrationSensor’ Updated 2009 Aug. 3, which is incorporated in its entirety forall purposes as if fully set forth herein. Other types of motion sensorsmay be equally used, such as devices based on piezoelectric,piezoresistive and capacitive components to convert the mechanicalmotion into an electrical signal. Using an accelerometer to control isdisclosed in U.S. Pat. No. 7,774,155 to Sato et al. entitled:“Accelerometer-Based Controller”, which is incorporated in its entiretyfor all purposes as if fully set forth herein.

The Global Positioning System (GPS) is a space-based radio navigationsystem owned by the United States government and operated by the UnitedStates Air Force. It is a global navigation satellite system thatprovides geolocation and time information to a GPS receiver anywhere onor near the Earth where there is an unobstructed line of sight to fouror more GPS satellites. The GPS system does not require the user totransmit any data, and it operates independently of any telephonic orInternet reception, though these technologies can enhance the usefulnessof the GPS positioning information. The GPS system provides criticalpositioning capabilities to military, civil, and commercial users aroundthe world. The United States government created the system, maintainsit, and makes it freely accessible to anyone with a GPS receiver. Inaddition to GPS, other systems are in use or under development, mainlybecause of a potential denial of access by the US government. TheRussian Global Navigation Satellite System (GLONASS) was developedcontemporaneously with GPS, but suffered from incomplete coverage of theglobe until the mid-2000s. GLONASS can be added to GPS devices, makingmore satellites available and enabling positions to be fixed morequickly and accurately, to within two meters. There are also theEuropean Union Galileo positioning system, China's BeiDou NavigationSatellite System and India's NAVIC.

The GPS concept is based on time and the known position of specializedsatellites, which carry very stable atomic clocks that are synchronizedwith one another and to ground clocks, and any drift from true timemaintained on the ground is corrected daily. The satellite locations areknown with great precision. GPS receivers have clocks as well; however,they are usually not synchronized with true time, and are less stable.GPS satellites continuously transmit their current time and position,and a GPS receiver monitors multiple satellites and solves equations todetermine the precise position of the receiver and its deviation fromtrue time. At a minimum, four satellites must be in view of the receiverfor it to compute four unknown quantities (three position coordinatesand clock deviation from satellite time).

Each GPS satellite continually broadcasts a signal (carrier wave withmodulation) that includes: (a) A pseudorandom code (sequence of ones andzeros) that is known to the receiver. By time-aligning areceiver-generated version and the receiver-measured version of thecode, the Time-of-Arrival (TOA) of a defined point in the code sequence,called an epoch, can be found in the receiver clock time scale. (b) Amessage that includes the Time-of-Transmission (TOT) of the code epoch(in GPS system time scale) and the satellite position at that time.Conceptually, the receiver measures the TOAs (according to its ownclock) of four satellite signals. From the TOAs and the TOTs, thereceiver forms four Time-Of-Flight (TOF) values, which are (given thespeed of light) approximately equivalent to receiver-satellite rangedifferences. The receiver then computes its three-dimensional positionand clock deviation from the four TOFs. In practice, the receiverposition (in three dimensional Cartesian coordinates with origin at theEarth's center) and the offset of the receiver clock relative to the GPStime are computed simultaneously, using the navigation equations toprocess the TOFs. The receiver's Earth-centered solution location isusually converted to latitude, longitude and height relative to anellipsoidal Earth model. The height may then be further converted toheight relative to the geoid (e.g., EGM96) (essentially, mean sealevel). These coordinates may be displayed, e.g., on a moving mapdisplay, and/or recorded and/or used by some other system (e.g., avehicle guidance system).

In one example, the idle condition may be considered to be met when thecommunication traffic through a network interface, such as over a PAN,LAN, WLAN, WAN or WWAN, is below a threshold.

Portable or handheld devices, such as tablets, laptops, and smartphones,typically use a rechargeable smart battery. A smart battery or a smartbattery pack is a rechargeable battery pack with a built-in BatteryManagement System (BMS), usually designed for use in a portable computersuch as a laptop. Besides the usual plus and minus terminals, it alsohas two or more terminals to connect to the BMS; typically minus is alsoused as BMS “ground”. BMS interface examples are SMBus, PMBus, EIA-232,EIA-485, MIPI BM and Local Interconnect Network. The smarter battery caninternally measure voltage and current, and deduce charge level and SoH(State of Health) parameters, indicating the state of the cells.Externally the smart battery can communicate with a smart batterycharger and a “smart energy user” via the bus interface. The smartbattery can demand that the charging stops, ask for charging, or demandthat the smart energy user stop using power from this battery. There arestandard specifications for smart batteries: Smart Battery System andmany ad-hoc specifications.

A Battery Management System (BMS) is any electronic system that managesa rechargeable battery (cell or battery pack), such as by protecting thebattery from operating outside its Safe Operating Area, monitoring itsstate, calculating secondary data, reporting that data, controlling itsenvironment, authenticating it and/or balancing it. A battery pack builttogether with a battery management system with an external communicationdata bus is a smart battery pack. A smart battery pack must be chargedby a smart battery charger. A BMS may monitor the state of the batteryas represented by various items, such as: Voltage: total voltage,voltages of individual cells, minimum and maximum cell voltage orvoltage of periodic taps; Temperature: average temperature, coolantintake temperature, coolant output temperature, or temperatures ofindividual cells; State of Charge (SOC) or Depth of Discharge (DOD), toindicate the charge level of the battery; State of Health (SOH), avariously-defined measurement of the overall condition of the battery;Coolant flow: for air or fluid cooled batteries; and Current: current inor out of the battery.

In one example, the idle condition may be considered to be met when,based on the BMS output, the battery capacity is above a minimumthreshold. For example, the idle condition may be considered to be metwhen the current capacity of the battery is above 40%, 50%, 60%, 70%,80%, or 90%. In the case where the capacity is estimated or measured tobe below the set threshold, the idle condition may be considered not tobe met. Such threshold provides for not draining the battery by usingthe tunnel functionalities, rendering the device useless or powerlesswhen the human user may want to use it after being used for tunneling.

Any of the methods described herein may provide fast, powerful, andhigh-speed anonymity, in particular IP anonymization when fetchingresources (such as web pages) from a web server. Such anonymization maybe used for anonymous tracking of an activity of competitors forobtaining competitive intelligence, for obtaining pricing intelligenceby tracking competitor prices, for collecting data needed to make acalculated investment decisions, for identifying key changes inbusinesses and markets for risk management, for preventing fraud byanalyzing suspicious activities, or for web-site scrapping.

As described herein, a web browser executed in a client device, such asin the client device #1 31 a, may initiate a request for a content (suchas a web page identified by a URL) that is stored in a web server, suchas the data server #1 22 a. The request may be received, intercepted, oridentified, and direct or non-direct fetching schemes may be used. Asused herein, the term ‘direct fetching’ refers to any fetching of therequested content, where the web server is aware of the identity (suchas the IP address), of the requesting client device. Typically in suchan arrangement, such as exampled in the arrangement 50 a shown in FIG. 5a , the request message sent by the client device (such as HTTP request)reaches the web server unchanged, so that the web server can identifythe IP address of the client device in the ‘Source IP Address’ field 16d of the packets that form the request message. Typically, other thanthe routers and gateways that form the Internet 113, no intermediatedevices, such as another server or another client device, are used for,or are aware of, the content fetching process.

As used herein, the term ‘non-direct fetching’ refers to any fetching ofthe requested content, where the web server is not aware of the identity(such as the IP address), of the requesting client device. Typically insuch an arrangement, the request message sent by the client device (suchas HTTP request) reaches one or more intermediate devices, that sendsthe request to the web server using IP address other than those of therequesting client device, so that the web server cannot identify the IPaddress of the client device. The intermediate device may be a server,such as the proxy server 53 shown as part of the arrangement 50 b shownin FIG. 5 b , the DC proxy server 56 shown as part of the arrangement 50c shown in FIG. 5 c , or the tunnel #4 33 d shown as part of thearrangement 130 shown in FIG. 13 . Alternatively or in addition, theintermediate device may be another client device, such as the tunnel #133 a shown a part of the arrangement 60 in FIG. 6 , or the tunnel #2 33b shown a part of the arrangement 60 a in FIG. 6 a.

Any non-direct fetching scheme herein may comprise, may be based on, ormay be according to, the example of using a proxy server as shown in thearrangement 50 b shown in FIG. 5 b , the example of using a DC proxyserver as shown in the arrangement 50 c shown in FIG. 5 c , the exampleof using a tunnel as shown in the arrangement 60 shown in FIG. 6 , theexamples shown in the ‘604 patent’, the examples shown in PatentCooperation Treaty (PCT) Publication WO 2019/043687, the examples shownin U.S. Pat. No. 9,241,044, or any combination thereof. Any proxy serverherein, such as the proxy server 53 or the proxy server 56, may consistof, may include, may be part of, or may be integrated with, any otherserver described herein.

In one example, multiple proxy servers, such as the proxy server 53shown in FIG. 5 b , may be available for a specific non-direct fetchingscheme. Similarly, multiple DC proxy servers, such as the DC proxyserver 56 shown in FIG. 5 c , may be available for a specific non-directfetching scheme. In such a case, the non-direct fetching scheme ispreceded by the selecting a single server that is used for the fetching.Such server selection may be based on, or may use, random, quazi-random,or deterministic selection. Using random selection allows for loadbalancing, preferably by equally distributing the workload across theelements, which may optimize resource use, maximize throughput, minimizeresponse time, and avoid overload of any single resource. The randomnessmay be based on using a random signal generator. The random signalgenerator may be based on a digital random signal generator having adigital output. Alternatively, the random signal generator may be basedon analog random signal generator having an analog output. Analog randomsignal generator may use a digital random signal generator whose outputis converted to analog using analog to digital converter, or can use arepetitive analog signal generator (substantially not synchronized toany other timing in the system) whose output is randomly time sampled bya sample and hold. A random signal generator (having either analog ordigital output) can be hardware based, using a physical process such asthermal noise, shot noise, nuclear decaying radiation, photoelectriceffect or other quantum phenomena, or can be software based, using aprocessor executing an algorithm for generating pseudo-random numberswhich approximates the properties of random numbers.

Alternatively or in addition, the selection of a server may bedeterministic based. In one example, the elements to select from arelisted in an orderly fashion, such as according to a feature, attribute,or a characteristic, using their associated numerical value (e.g., IPaddress value), according to their alphanumeric identifier (e.g., hostname or location name in ASCII value), according to the order thatjoined the collection or group, or according to the order they wereformerly selected from the group or collection. In such a case, theservers are sequentially selected according to the list order. In oneexample, a LIFO (last in first out) like scheme may be used, where thelastly selected server is re-selected, and upon its unavailability, theone server that was selected before the last is selected. Alternativelyor in addition, a FIFO (first in first out) like scheme is used, wherethe oldest formerly selected server selected.

In one example, the selection of an IP address from the list 58 to beused by the DC Proxy Server 56 as shown in FIG. 5 c , for use in aspecific non-direct fetching scheme may be based on, or may use, random,quazi-random, or deterministic selection. Using random selection allowsfor load balancing, preferably by equally distributing the workloadacross the elements, which may optimize resource use, maximizethroughput, minimize response time, and avoid overload of any singleresource. The randomness may be based on using a random signalgenerator. The random signal generator may be based on a digital randomsignal generator having a digital output. Alternatively, the randomsignal generator may be based on analog random signal generator havingan analog output. Analog random signal generator may use a digitalrandom signal generator whose output is converted to analog using analogto digital converter, or can use a repetitive analog signal generator(substantially not synchronized to any other timing in the system) whoseoutput is randomly time sampled by a sample and hold. A random signalgenerator (having either analog or digital output) can be hardwarebased, using a physical process such as thermal noise, shot noise,nuclear decaying radiation, photoelectric effect or other quantumphenomena, or can be software based, using a processor executing analgorithm for generating pseudo-random numbers which approximates theproperties of random numbers.

Any randomness used typically further provides anonymity anduntraceability, as well as load-balancing. Randomness is commonlyimplemented by using random numbers, defined as a sequence of numbers orsymbols that lack any pattern and thus appear random, are oftengenerated by a random number generator. Randomness is described, forexample, in IETF RFC 1750 “Randomness Recommendations for Security”(December 1994), which is incorporated in its entirety for all purposesas if fully set forth herein. A random number generator (having eitheranalog or digital output) can be hardware based, using a physicalprocess such as thermal noise, shot noise, nuclear decaying radiation,photoelectric effect or other quantum phenomena. Alternatively, or inaddition, the generation of the random numbers can be software based,using a processor executing an algorithm for generating pseudo-randomnumbers which approximates the properties of random numbers.

Alternatively or in addition to using randomness, the selection of aserver, such as the selection of the proxy server 53 shown in FIG. 5 b ,or the DC proxy server 56 shown in FIG. 5 c , may be based ongeographical location. Such geographical location may be determined byusing geolocation. For example, an element, such as a proxy server or aDC proxy server, or an IP address from any IP addresses list, may beselected based on the location of the requesting client, such as theclient device #1 31 a, the web server, such as the data server #1 22 a,or any other device. For example, an element may be selected as being inthe area as the requesting client device, or as the web server, such asbeing in the same continent, country, state, region, city, postal/zipcode, latitude, longitude, or Timezone. Similarly, an element may beselected as estimated to being the geographically closest to therequesting client device or to the web server.

Alternatively or in addition, an element may be manually selected by auser. For example, a list of the available alternatives may be displayedto the user, such as the user of the client device #1 31 a, and the userselects the elements from the list of the available alternatives.Further, an element may be selected based on former performance relatingto former non-direct fetching actions.

General fetching of content over the Internet typically involves sendinga content request (such as URL) by a requesting device to a contentstoring device (or to a device that in turn fetch the content), and inresponse receiving the requested content (such as web-page or web-sitecontent) over the Internet from the content storing device to therequesting device. In the example of direct fetching shown as thearrangement 50 a shown in FIG. 5 a , the content request is sent fromthe client device #1 31 a over the Internet, shown as the path 55 a, tothe web server 22 a, which in return response by sending the requestedcontent to the requesting client device #1 31 a over the Internet, shownas the path 55 b.

In an example of a non-direct fetching scheme, such as by using theproxy server 53 as shown as the arrangement 50 b shown in FIG. 5 b ,there are two fetching actions involved. First, the content request issent from the client device #1 31 a over the Internet, shown as the path54 a, to the proxy server 53, which in turn fetches the content, andresponds by sending the fetched requested content to the requestingclient device #1 31 a over the Internet, shown as the path 54 d. Theproxy server 53 fetches the content requested by the client device 31 aby sending the received content request over the Internet, shown as thepath 54 b, to the data server #1 22 a (typically a web server), whichresponds by sending the requested content to the proxy server 53 overthe Internet, shown as the path 54 c. Similarly, the DC Proxy server 56serves as an intermediate device for fetching content from the dataserver #1 22 a to the requesting client device #1 31 a in the example ofa non-direct fetching scheme using DC proxy server, as shown as thearrangement 50 c shown in FIG. 5 c . Similarly, a client device mayserve as an intermediate device for fetching content from the dataserver #2 22 b to the requesting client device #1 31 a in the example ofa non-direct fetching scheme using an SP server 72 or a TB server 71, asshown as the arrangement 130 shown in FIG. 13 . Similarly, non-directfetching may be based on the '604 patent that uses an accelerationserver 23 for managing the traffic in the network, may be based on theexamples shown in Patent Cooperation Treaty (PCT) Publication WO2019/043687, or the examples shown in U.S. Pat. No. 9,241,044, or anycombination thereof.

In most cases, a content request as part of a fetching is responded byproperly receiving the requested content. However, in some cases, thefetching action is unsuccessful, and the requested content is notreceived. For example, the Internet is not a guaranteed network service,but rather a best delivery effort, so that unspecified variable bitrate, latency, and packet loss, may be experienced, such as due totraffic load. Further, there may be a hardware or software failure inany device along the fetching route, such as in any router along thepath, or in the web server from which the content is requested. Further,a content fetching may fail due to bandwidth management or trafficshaping used in order to smooth down peaks in network usage.Furthermore, a web server (program) has defined load limits and canhandle only a limited number of concurrent client connections or canserve only a certain maximum number of Requests-Per-Second (RPS), and incase of server overload it becomes unresponsive causing content requeststo fail. Further, content fetching may fail due to a Denial-of-Serviceattack (DoS attack) or Distributed Denial-of-Service attack (DDoSattack), as well as MITM attack. Further, web servers may be unavailabledue to urgent maintenance or upgrade, hardware or software failures, orback-end (e.g., database) failures.

Some web sites implement technology to try and block publicly availableinformation to be accessed by an automated data collection processes.However, the web-site operators and other entities may require anautomated access for the public information for legitimate businessreasons, such as quality assurance, verification, price comparison,tracking publicly posted information about issues concerning thecompany, and staying updated on relevant news stories. Such access andprocessing may also essential for the vast majority of journalists andresearches, which wish to rely on the ever growing data resource whichis the Internet. One or more of the methods herein may be used for suchautomated data collection processes.

In many cases, the failure of a content fetching action may beintermittent or temporary. In such a case, a retry, such as by anadditional attempt, of the fetching action may be useful, and therepeated fetching action is expected to result in a proper contentfetching. Such attempts may be repeated number of times, untilsuccessfully completed. The attempts may be the same as the originalprocess, such as by repeating the same URL and sending to the samedestination.

Alternatively or in addition, the attempts may use different parameters,attributes, or characteristics, and may use different paths, differentroutes, or different intermediate devices for fetching the content.Further, different fetching schemes may be used in the retries actions.

An example of a flow chart 340 of up to Nmax times repeating of acontent fetching process is shown in FIG. 34 . The number Nmax may beequal to, or more than, 1, 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50, or100. Alternatively or in addition, the number Nmax may be less than 2,3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50, 100, 150, or 200.

An URL (or any other content identifier) for a content (such as web-pageor web-site) is identified as part of an “Identify URL” step 341. Suchidentification or interception of any content or URL request may be inthe form of a filter driver (or any other intermediate driver), enablingthe interception as part of the OS kernel. Alternatively or in addition,the interception may be in the form of extension or a plug-in of therequesting application, such as a browser plug-in or a browser extensionin the case where the application is a web browser. Alternatively or inaddition, the interception of the request may use hooking of therequesting application, or of the communication-related application.Alternatively or in addition, the application and the steps describedherein may communicate using an Inter-Process Communication (IPC), suchas a file sharing, a signal, a socket, a pipe, a message queue, a sharedmemory, a semaphore, or memory mapped file. In Windows environment, theIPC may be based on a clipboard, a Component Object Model (COM), datacopy, a DDE protocol, or mailslots.

In an example of a non-direct fetching, the flow chart 340 may beexecuted, in part or in whole, as part of an intermediate device, suchas the proxy server 53 shown as part of the arrangement 50 b shown inFIG. 5 a , the DC proxy server 56 shown as part of the arrangement 50 cshown in FIG. 5 c , or the tunnel #4 33 d shown as part of thearrangement 130 shown in FIG. 13 . Alternatively or in addition, theflow chart 340 may be executed, in part or in whole, by a client device,such as the tunnel #1 33 a shown a part of the arrangement 60 in FIG. 6, or the tunnel #2 33 b shown a part of the arrangement 60 a in FIG. 6 a. In a case of any non-direct fetching, the URL identification as partof the “Identify URL” step 341, may comprise receiving the URL fromanother device, such as the requesting client device #1 31 a or anotherintermediary device.

A counter N is defined, and assigned a value of 1 as part of an “N=1”step 342. A first attempt for fetching is initiated by sending theidentified URL (identified as part of the “Identify URL” step 341) aspart of the “Send URL” step 343. The identified URL may be sent to thetarget web server, such as in a direct fetching scheme, or to anintermediate device, such as in a non-direct fetching scheme. A responseto the sent URL is received as part of a “Receive Response” step 344,and is checked as part of a “Success ?” step 345. For example, one ormore criterions may be used for deciding whether a proper content isfetched in the fetching action as part of the “Success ?” step 345.

In one example, the determining that a response is not a proper responseto the URL request of the “Send URL” request 343, as part of the“Success ?” step 345, is based on checking the response HTTP statuscode. For example, if a status code 2xx is received, such as the statuscode ‘200 OK’, this may be used to indicate that the URL request wassuccessfully received. However, if the HTTP status code received is anerror related status code, such as 4xx (400 to 499) client error (suchas the HTTP 404 error message) or 5xx (500 to 599) server error, it mayindicate that the request was not properly fulfilled. Alternatively orin addition, if URL redirection is identified, such as indicated by a‘3xx Redirection’ status code, it may be used as an indication that therequest was not properly fulfilled.

Alternatively or in addition, the determining that a response is not aproper response to the URL request of the “Send URL” request 343, aspart of the “Success ?” step 345, may use a timeout mechanism. In such amechanism, a specified period of time that will be allowed to elapsebefore receiving a proper response to the URL request of the “Send URL”request 343, is used. Upon sending the request of the “Send URL” request343, a timer is initiated, and if a proper response to the URL request,as part of the “Receive Response” step 344, is not received before thetimer lapses, a timeout is declared, indicating that the request was notproperly fulfilled. Such timeout mechanism may be the same as, similarto, or the same as, the HTTP timeout mechanism, or may be independentand different from it.

Alternatively or in addition, the determining that a response is not aproper response to the URL request of the “Send URL” request 343, aspart of the “Success ?” step 345, may be based on checking the receivedcontent (such as a web page) in response to the request. A pre-definedcriterion may be used, relating to a feature, parameter, orcharacteristic of the received content. For example, a size of thereceived content may be used as a criterion, where the expected size ofsuch a content may be estimated. In the case the received contentsubstantially exceeds, or is substantially lower, that the expected size(such as by 10%, 20%, 50%, or more), it may be used as an indicationthat the request was not properly fulfilled. For example, if theexpected size of the fetched content is 15 MB, then a content receivedhaving size of 4 MB or 50 MB may be considered as error. Similarly, thecriterion may relates to the content type, arrangement, or any otherfeature associated with a content or file.

Upon deciding that the fetching action is successful and that a propercontent is fetched, the fetched content is used as part of a “Use/SendContent” step 346. For example, if the URL was identified as part of webbrowser application in a client device (such as the client device #1 31a) as part of the “Identify URL” step 341, then the received content isforwarded and returned to the web browser as a response, to be used byit. If the URL was received from another requesting device, then thereceived content is sent as response to the requesting device as part ofthe “Use/Send Content” step 346.

Upon deciding that the fetching action is unsuccessful and that a propercontent is not fetched, then the N value is compared to the predefinedNmax value as part of a “N=Nmax ?” step 347. In the case where it isdetermined that N=Nmax, meaning that Nmax attempts or tries were made,and all of them failed to properly fetch the required content, thefetching action is considered as unsuccessful, and various actions maybe performed as part of an “Error” block 340 b. In a case where it isdetermined that N<Nmax, meaning that Nmax attempts or tries were not yetmade, the value of N is incremented by 1 as part of a “N←N+1” step 348a, and the fetching is repeated by returning to the “Send URL” step 343.Hence, the steps of “Send URL” step 343, “Receive Response” step 344,and the “Success ?” step 345 are repeated until the fetching issuccessful, but no more than Nmax times. The “N=1” step 342, “Send URL”step 343, “Receive Response” step 344, the “Success ?” step 345, and the“N=Nmax ?” step 347 are defined as part of a flow chart “RepetitiveFetching” 340 a, which is part of the global flow chart 340, andinvolves repetitive fetching of an identified URL until the content isproperly received or until Nmax attempts or tries were performed.

Upon deciding that the fetching action is unsuccessful and that a propercontent is not fetched, various actions may be taken as part of the“Error” block 340 b. For example, if the URL was identified as part ofweb browser application (or any other application) such as in a clientdevice (for example, in the client device #1 31 a) as part of the“Identify URL” step 341, then an error message is forwarded and returnedto the web browser (or to any other requesting application) as aresponse, to be used by it, as part of a “Notify Application” step 349b. Alternatively or in addition, if the URL was received from anotherrequesting device, then an error message is sent as response to therequesting device as part of the “Send Error Message” step 349 c. In acase where there is an interaction with a human user, the user may benotified, such as by displaying an error message or other notificationto the user, as part of a “Notify User” step 349 a.

An example of multiple attempts of fetching content in a direct fetchingscheme is illustrated in a messaging flow chart 350 shown in FIG. 35 ,which is based on the direct fetching scheme 50 a shown in FIG. 5 a . Insuch an arrangement, the flow chart 340 is performed by the clientdevice #1 31 a. In the example of the chart 350, as well in otherexamples herein, Nmax is equal to 3. However, any value of Nmax may beequally used. Typically in such a case, the “Identify URL” step 341 maycomprise intercepting the URL as part of the web browser operation.

In the first fetching attempt, associated with N=1 in the flow chart340, a content request message 55 a (such as URL) is sent to the dataserver #1 22 a, which respond by a message 55 b. In a case where thefirst fetching is successful, as determined in the “Success ?” step 345as part of the repetitive fetching flow chart 340 a, then the fetchingprocess ends and the content is used by the requesting application, suchas the web browser, in the client device #1 31 a. In a case of firstfetching failure, as determined in the “Success ?” step 345 as part ofthe repetitive fetching flow chart 340 a, then N is increased to a valueof 2 and the fetching is repeated, shown as a content request message 55c (such as URL) that is sent to the data server #1 22 a, which respondby a message 55 d. In a case where the second fetching is successful, asdetermined in the “Success ?” step 345 as part of the repetitivefetching flow chart 340 a, then the fetching process ends and thecontent is used by the requesting application, such as the web browser,in the client device #1 31 a. In a case of second fetching attemptfailure, as determined in the “Success ?” step 345 as part of therepetitive fetching flow chart 340 a, then N is increased to a value of3 and the fetching is repeated, shown as a content request message 54 e(such as URL) that is sent to the data server #1 22 a, which respond bya message 54 f. In a case where the third fetching attempt issuccessful, as determined in the “Success ?” step 345 as part of therepetitive fetching flow chart 340 a, then the fetching process ends andthe content is used by the requesting application, such as the webbrowser, in the client device #1 31 a. In a case of third fetchingfailure, as determined in the “Success ?” step 345 as part of therepetitive fetching flow chart 340 a, then an error 340 b is assumed andassociated actions are performed.

An example of multiple attempts of fetching content in a proxy serverbased non-direct fetching scheme is illustrated in a messaging flowchart 350 a shown in FIG. 35 a , which is based on the direct fetchingscheme 50 b shown in FIG. 5 b . In one example, in such an arrangementthe flow chart 340 is performed by the proxy server 53. In the exampleof the chart 350 a, as well in other examples herein, Nmax is equal to3. However, any value of Nmax may be equally used. Typically in such acase, the “Identify URL” step 341 may comprise receiving the URL requestfrom the client device #1 31 a shown as the path 54 a.

In the first fetching attempt, associated with N=1 in the flow chart340, a content request message 54 b (such as URL) is sent to the dataserver #1 22 a, which respond by a message 54 c. In a case where thefirst fetching is successful, as determined in the “Success ?” step 345as part of the repetitive fetching flow chart 340 a, then the fetchingprocess ends and the content is relayed to the client device #1 31 aover the path 54 d. In a case of first fetching failure, as determinedin the “Success ?” step 345 as part of the repetitive fetching flowchart 340 a, then N is increased to a value of 2 and the fetching isrepeated, shown as a content request message 54 e (such as URL) that issent to the data server #1 22 a, which respond by a message 54 f. In acase where the second fetching is successful, as determined in the“Success ?” step 345 as part of the repetitive fetching flow chart 340a, then the fetching process ends and the content is relayed to theclient device #1 31 a over the path 54 d. In a case of second fetchingattempt failure, as determined in the “Success ?” step 345 as part ofthe repetitive fetching flow chart 340 a, then N is increased to a valueof 3 and the fetching is repeated, shown as a content request message 54g (such as URL) that is sent to the data server #1 22 a, which respondby a message 54 h. In a case where the third fetching attempt issuccessful, as determined in the “Success ?” step 345 as part of therepetitive fetching flow chart 340 a, then the fetching process ends andthe content is relayed to the client device #1 31 a over the path 54 d.In a case of third fetching failure, as determined in the “Success ?”step 345 as part of the repetitive fetching flow chart 340 a, then anerror 340 b is assumed and associated actions are performed.

The messages flow 350 a shown in FIG. 35 a exampled the using ofmultiple fetching attempts to retrieve content by the proxy server 53from the data server #1 22 a. Alternatively or in addition, multiplefetching attempts may be used for fetching content by the client device#1 31 a from the proxy server 53. Such a configuration 350 b is shown inFIG. 35 b , showing an example of Nmax=2, meaning no more than 2fetching attempts are used. However, any value of Nmax may be equallyused. Further, the number of attempts to retrieve content by the proxyserver 53 from the data server #1 22 a may be equal to, or differentfrom, the number of attempts to retrieve content by the client device #131 a from the proxy server 53. For example, Nmax may be equal 5 for thenumber of attempts to retrieve content by the proxy server 53 from thedata server #1 22 a, while Nmax may be equal 7 for the number ofattempts to retrieve content by the client device #1 31 a from the proxyserver 53. Further, Nmax may be equal 1, meaning only a single fetchingattempt, for each of the fetching schemes. Further, the proxy server 53may perform multiple attempts to fetch content from the data server #122 a for any one content request by the client device #1 31 a receivedat the proxy server 53.

In the first fetching attempt, associated with N=1 in the flow chart340, a content request message 54 a (such as URL) is sent to the proxyserver 53, which respond by a message 54 d. In a case where the firstfetching is successful, as determined in the “Success ?” step 345 aspart of the repetitive fetching flow chart 340 a, then the fetchingprocess ends and the content is used by the client device #1 31 a. In acase of first fetching failure, as determined in the “Success ?” step345 as part of the repetitive fetching flow chart 340 a, then N isincreased to a value of 2 and the fetching is repeated, shown as acontent request message 57 a (such as URL) that is sent to the proxyserver 53, which respond by a message 57 d. In a case where the secondfetching is successful, as determined in the “Success ?” step 345 aspart of the repetitive fetching flow chart 340 a, then the fetchingprocess ends and the content is used by the client device #1 31 a aspart of the “Use/Send Content” step 346. In a case of a second fetchingfailure, as determined in the “Success ?” step 345 as part of therepetitive fetching flow chart 340 a, then an error 340 b is assumed andassociated actions are performed.

The messaging chart 350 b is exampled regarding multiple attempts whenusing non-direct content fetching scheme using a proxy server 53, usingmultiple attempts by the intermediate device (exampled as the proxyserver 53 shown in FIG. 35 b ) for fetching content from the data server#1 22 a, using multiple attempts by the client device #1 31 a forfetching content from the intermediate device, or both. Similarly,multiple attempts may be used when using non-direct content fetchingscheme using a DC proxy server 56, as shown in a messaging chart 350 cshown in FIG. 35 c . In such a configuration, the scheme may involveusing multiple attempts by the intermediate device (exampled as theproxy server 56 shown in FIG. 35 c ) for fetching content from the dataserver #1 22 a, using multiple attempts by the client device #1 31 a forfetching content from the intermediate device, or both.

The messaging chart 350 b examples using multiple attempts when usingnon-direct content fetching scheme using a proxy server 53, and themessaging chart 350 c examples using multiple attempts when usingnon-direct content fetching scheme using a DC proxy server 56.Similarly, a messaging chart 350 d shown in FIG. 35 d examples usingmultiple attempts when using non-direct content fetching scheme usingthe tunnel device #1 33 a as an intermediate device, based on themessaging chart 60 shown in FIG. 6 . Three multiple attempts are shownfor fetching a content by the tunnel device #1 33 a, shown as thecontent request 61 b that is responded by the response 61 c, followed bya content request 61 e that is responded by a response 61 f, followed bya content request 61 g that is responded by a response 61 h. Threeattempts are shown, which may correspond to Nmax=3, or may suggest thatNmax>3 and successful fetching at the third attempt. Similarly, threemultiple attempts are shown for fetching a content by the client device#1 31 a from the tunnel device #1 33 a, shown as the content request 61a that is responded by the response 61 d, followed by a content request61 i that is responded by the response 61 j, followed by a contentrequest 61 k that is responded by a response 611. Three attempts areshown, which may corresponds to Nmax=3, or may suggest that Nmax>3 andsuccessful fetching at the third attempt. While shown for Nmax=3, anynumber of Nmax may be used, and different Nmax numbers may be used foreach fetching. While direct fetching is exampled in the messaging chart350 d for the communication between the client device #1 31 a and thetunnel device #1 33 a, it is noted that these links may be implementedusing addition intermediate devices, as described herein, in the ‘604patent’, in the Patent Cooperation Treaty (PCT) Publication WO2019/043687, in U.S. Pat. No. 9,241,044, or any combination thereof.

The messaging chart 350 b and the messaging chart 350 c example usingmultiple attempts when communicating with the client device #1 31 a,with the data server #1 22 a, or both. In one example, multiple fetchingattempts may be equally used, in addition or as alternative, between anytwo devices which are part of any fetching scheme between any clientdevice #1 31 a and any data server #1 22 a. Such an example of amessaging chart 360 is shown in FIG. 36 , where multiple fetchingattempts are performed between the SP server 72 and TB server 71, basedon the messaging chart 130 shown in FIG. 13 . The attempts shown includethe content request 131 a, which is answered by the response 131 f,followed by a request 131 g which is answered by a response 131 h, whichis followed by a request 131 i which is answered by a response 131 j.Three attempts are exampled in the chart 360, which may corresponds toNmax=3, or may suggest that Nmax>3 and successful fetching at the thirdattempt.

Multiple attempts may be used when using non-direct content fetchingscheme using a DC proxy server 56, as shown in the messaging chart 350 cshown in FIG. 35 c . In one example, all the request messages, shown inthe messaging chart 350 c, may use the same IP address selected from theIP addresses list 58, which may be selected as discussed herein.Alternatively or in addition, a different IP address is selected foreach fetching attempt. Such mechanism by a DC proxy server, such as theDC proxy server 56, may use a flow chart 370 that is shown in FIG. 37 ,which is based on the flow chart 340 shown in FIG. 34 . For eachfetching attempt, as part of a repetitive fetching flow chart 371, whichis based on the flow chart 340 a shown in FIG. 34 , a different IPaddress is selected from the list 58 as part of a “Select IP” step 372,and the following “Send URL” step 343 a is using the selected IPaddress. An example of a corresponding messaging chart 370 a is shown inFIG. 37 a , where the first URL request 54 b as part of the firstattempt uses the IP address IP #3 58 c, the second URL request 54 e aspart of the second attempt uses the IP address IP #5 58 e, and the thirdURL request 54 g as part of the third attempt uses the IP address IP #258 b. Any mechanism used for selecting an IP address may equally be usedin this configuration for each fetching attempt. Further, while exampledwhere each of the individual fetching attempts uses a different IPaddress, equally more than a single fetching attempt may use the same IPaddress, while other fetching attempts may use other selected IPaddress. For example, in case of Nmax equal to 7, the first two attemptsmay use IP address IP #6 58 f, the following 4 fetching attempts may useIP address IP #1 58 a, and the last (seventh) attempt may use IP addressIP #1 58 a.

The messaging chart 350 b shown in FIG. 35 b examples multiple attemptswhen using non-direct content fetching scheme using a proxy server 53.Multiple attempts by the client device #1 31 a are used to the sameproxy server 53. In one example, each of, or part of, the multiplerequest messages as part of the fetching attempts may use differentproxy servers. Such mechanism by a client device, such as by the clientdevice #1 31 a, may use a flow chart 380 that is shown in FIG. 38 ,which is based on the flow chart 340 shown in FIG. 34 . In one example,for each fetching attempt, as part of a repetitive fetching flow chart381, which is based on the flow chart 340 a shown in FIG. 34 , adifferent proxy server is selected from a list as part of a “SelectServer” step 382, and as part of a following “Send URL” step 343 b, therequest message is sent to the selected proxy server. An example of acorresponding messaging chart 380 a is shown in FIG. 38 a , where thefirst URL request 54 a as part of the first attempt is sent to the proxyserver 53, which is the first selected one as described above, while asecond URL request 383 a as part of the second attempt is sent to asecond selected proxy server 53 a, which forwards the request message tothe data server #1 22 a over a path 383 b, following by a response fromthe data server #1 22 a to the proxy server 53 a over a path 383 c,followed by forwarding the response to the client device #1 31 a over apath 383 d. Any mechanism used for selecting a proxy server from a listmay equally be used in this configuration for each fetching attempt.Further, each fetching action between the client device #1 31 a and theproxy server 53, between the client device #1 31 a and the proxy server53 a, may use any of the multiple fetching scheme described herein.While the using of two proxy servers is exampled, any number of proxyservers may be equally used. Further, while exampled where each of theindividual fetching attempts uses a different proxy server, equally morethan a single fetching attempt may use the same proxy server, whileother fetching attempts may use other selected proxy servers. Forexample, in case of Nmax equal to 6, the first two attempts may use theproxy server 53, the following single fetching attempt may use the proxyserver 53 a, and the last 3 fetching attempts may use a third proxyserver.

While the messaging chart 380 a shown in FIG. 38 a examples multipleattempts when using non-direct content fetching scheme using multipleproxy servers, the same configuration may equally apply to usingmultiple DC proxy servers, such as the DC Proxy server 56 and a DC proxyserver 56 a, as illustrated in a messaging view 380 b shown in FIG. 38 b. In such a scheme, a DC proxy server is selected as part of the “SelectServer” step 382. Similarly, the same configuration may equally apply tousing multiple SP servers, such as the SP server 72 and a SP server 72a, as illustrated in a messaging view 380 c shown in FIG. 38 c . In sucha scheme, a SP server is selected as part of the “Select Server” step382. Further, the fetching of content from the data server #1 22 a mayuse selecting tunnels as described herein.

While exampled above selecting different servers for fetching attempts,client devices or tunnel devices may equally be selected. Such mechanismby a client device, such as by the client device #1 31 a, may use a flowchart 390 that is shown in FIG. 39 , which is based on the flow chart340 shown in FIG. 34 . In one example, for each fetching attempt, aspart of a repetitive fetching flow chart 391, which is based on the flowchart 340 a shown in FIG. 34 , a different client or tunnel device isselected from a list as part of a “Select Tunnel” step 392, and as partof a following “Send URL” step 343 c, the request message is sent to theselected tunnel device. An example of a corresponding messaging chart390 a is shown in FIG. 39 a , where the first URL request 61 a as partof the first attempt is sent to the tunnel device #1 33 a, which is thefirst selected tunnel as described above, while a second URL request 62d as part of the second attempt is sent to a second selected tunneldevice #2 33 b, and a third URL request 65 a as part of the thirdattempt is sent to a third selected tunnel device #3 33 c. Any mechanismfor selecting a tunnel device may be used in this configuration.

A generic repetitive fetching flow chart 401 is illustrated as part of ageneral multiple fetching attempts flow chart 400 shown in FIG. 40 . Ageneric “Fetching Scheme” step 402 may comprise the steps of sending theURL and receiving a response, according to a specific content fetchingscheme, and may correspond to include the “Send URL” step 343 and the“Receive Response” step 344 shown as part of the repetitive fetchingflow chart 340 a in FIG. 34 . Alternatively or in addition, the generic“Fetching Scheme” step 402 may correspond to the repetitive fetchingflow chart 371 shown in FIG. 37 , to the repetitive fetching flow chart381 shown in FIG. 38 , to the repetitive fetching flow chart 391 shownin FIG. 39 , or any combination thereof. A ‘Success’ is declared whenthe generic repetitive fetching flow chart 401 is completed uponsuccessful retrieving the requested content from the target web server,and then used or forwarded as part of the “Use/Send Content” step 346. A‘Fail’ is declared in case where the Nmax attempts were finalizedwithout properly retrieving the requested content, and then Error block340 b actions may be performed.

In order to increase the probability for successful content fetching, itmay be beneficial to try various fetching schemes sequentially, whereupon failure of one fetching scheme, another distinct scheme is used. Anexample of such a flow chart 410 is shown in FIG. 41 . After identifyinga request for URL as part of the “Identify URL” step 341, a firstfetching scheme is used as part of a “Repetitive Fetching #1” step 401a. If successful, then the “Use/Send Content” step 346 is performed. Ifthe first fetching scheme failed, a second distinct fetching scheme isused as part of a “Repetitive Fetching #2” step 401 b. If the secondfetching scheme is successful, then the “Use/Send Content” step 346 isperformed. If the second fetching scheme failed, a fetching schemedistinct from the first and second schemes is used. Up to ‘n’ fetchingschemes may be sequentially used. Only in case the last fetching schemeas part of a “Repetitive Fetching #n” step 401 n fails, a ‘Fail’response is declared, and the ‘Error’ 340 b actions may be performed.Each of the ‘n’ fetching schemes may be any of the fetching schemesdescribed herein. For example, one of the fetching schemes may be directfetching, while each of the other fetching schemes may be a non-directfetching scheme, such as proxy server based, DC proxy server based, ortunnel based. The numbed of distinct fetching schemes used may be equalto, or more than, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, or 20. Further,the numbed of distinct fetching schemes used may be less than, 2, 3, 4,5, 6, 7, 8, 9, 10, 12, 15, 20, 25.

Typically, web servers provide the same response to the same URLrequest. However, some web server may provide different responses to thesame URL requests. For example, a web server may provide differentcontent according to the IP address from which the URL request wasreceived, or according to the geographical location, such as a country,associated with the IP address of the device that requests the URL. Suchweb server operation may render the fetched content unreliable orsuspected, and it may be beneficial to identify such operation of a webserver. Similarly, it may be beneficial to identify that a web serverprovide different content, such as a personalized content, to differentrequesters.

An example of a flow chart 420 for identifying a web server thatresponds differently to the same URL request is shown in FIG. 42 .Suspected URLs or suspected web servers are first defined, and may bestored in a list. In one example, all URLs and all web servers may beconsidered as suspected. As part of, or following, URL request as partof an “Identify URL” step 341, the URL (or the associated web server) ischecked if identified as suspected, such as being included in thesuspected URL list or in the suspected web servers list, as part of an“Identify Defined URL” step 424. In the case the URL (or related webserver) is defined as suspected, then the content is fetched using anyfetching scheme as part of a “Fetching Scheme #1” step 402 a, and thefetched content is stored in memory as part of a “Store Content” step426. Then another fetching action is performed as part of a “FetchingScheme #2” step 402 b. The fetching as part of the “Fetching Scheme #2”step 402 b may be different from the fetching scheme performed as partof the “Fetching Scheme #1” step 402 a. For example, a different schememay be used, such as using direct fetching scheme in the “FetchingScheme #1” step 402 a and a non-direct fetching scheme in the “FetchingScheme #2” step 402 b. Alternatively or in addition, the same fetchingscheme may be used, such as a PC proxy server based non-direct fetchingscheme, but different IP addresses are selected to be used in theactions.

As part of a “Same Content ?” step 423, the content retrieved as part ofthe “Fetching Scheme #2” step 402 b is compared to the content retrievedas part of the “Fetching Scheme #1” step 402 a that was stored as partof the “Store Content” step 426. In the case the same content wasfetched in both operations, then the web server is assumed to providethe same content to all same URL requests, and the content fetched isused as part of the “Use/Send Content” step 346. However, in case wherea difference between the content received in the two fetching action isidentified, then the web server is assumed not to provide the samecontent to all same URL requests, and accordingly such notification ismade as part of the Error 340 c actions.

The flow chart 420 shown in FIG. 42 requires two fetching actions to beperformed each time a suspected URL (or fetching from a suspected webserver) is to be fetched. Using such multiple fetching actions consumesvarious resources, such as processing time, and may degrade fetchingspeed. Alternatively or in addition, a suspected URL (or web server) maynot be continuously checked, but only periodically or every Mmaxfetching samples. A flow chart 420 a shown in FIG. 42 a illustratedchecking a suspected URL #1 only every Mmax fetching actions. It isnoted that a same number, or different number, Mmax may be used for eachURL or each web site checking. For each suspected URL or web site, thevalue of Mmax may be equal to, or more than, 2, 3, 4, 5, 6, 7, 8, 9, 10,12, 15, 20, 50, 70, 100, 150, 200, 250, 300, 400, 500, 700, or 1000.Further, the value of Mmax may be less than, 3, 4, 5, 6, 7, 8, 9, 10,12, 15, 20, 50, 70, 100, 150, 200, 250, 300, 400, 500, 700, 1000, or2000.

A counter M is used, and is assigned a value of 1 as part of an “M=1”step 421. As part of, or following, an URL request as part of an“Identify URL” step 341, the URL (or the associated web server) ischecked if identified as suspected, such as being included in thesuspected URL list or in the suspected web servers list, as part of an“Identify As URL #1” step 425. The Mmax value associated with thatsuspected URL is further determined as part of the “Identify As URL #1”step 425. While exampled for a specific URL (URL #1), the flow chart 420a may equally apply to a suspected web server. In such a case, the Mmaxvalue refers to all the URLs fetched from that suspected web server. Thecontent is fetched for the suspected URL #1 using any fetching scheme aspart of a “Fetching Scheme #1” step 402 a. As part of a “M=Mmax ?” step347 a, the number of fetching action performed is compared to the setvalue of Mmax. If less than Mmax fetching operations were performed(M<Mmax), then M is increased by 1 as part of a “M←M+1” step 422, andthe operation resumed to normal operation, until the next time the URL#1 is required to be fetched as part of the “Identify As URL #1” step425. However, in case of M=Mmax, meaning that Mmax fetching actions wereperformed, the fetched content is stored in memory as part of a “StoreContent” step 426.

Another fetching action is then performed as part of a “Fetching Scheme#2” step 402 b. The fetching as part of the “Fetching Scheme #2” step402 b may be different from the fetching scheme performed as part of the“Fetching Scheme #1” step 402 a. For example, a different scheme may beused, such as using direct fetching scheme in the “Fetching Scheme #1”step 402 a and a non-direct fetching scheme in the “Fetching Scheme #2”step 402 b. Alternatively or in addition, the same fetching scheme maybe used, such as a PC proxy server based non-direct fetching scheme, butdifferent IP addresses are selected to be used in the actions.

As part of a “Same Content ?” step 423, the content retrieved as part ofthe “Fetching Scheme #2” step 402 b is compared to the content retrievedas part of the “Fetching Scheme #1” step 402 a that was stored as partof the “Store Content” step 426. In the case the same content wasfetched in both operations, then the web server is assumed to providethe same content to all same URL requests, and the content fetched isused as part of the “Use/Send Content” step 346, and the M value isreset to 1 as part of the “M=1” step 421. However, in case where adifference between the content received in the two fetching action isidentified, then the web server is assumed not to provide the samecontent to all same URL requests, and accordingly such notification ismade as part of the Error 340 c actions.

Each of the fetching actions or fetching schemes herein, or any partthereof, such as the “Repetitive Fetching” flow chart 401 shown in FIG.40 , the “Repetitive Fetching #1” 401 a shown in FIG. 41 , the“Repetitive Fetching #2” 401 b shown in FIG. 41 , the “RepetitiveFetching #n” 401 n shown in FIG. 41 , the “Fetching Scheme #1” 402 ashown in FIGS. 42-42 a, the “Fetching Scheme #2” 402 b shown in FIGS.42-42 a, may consist of, may be based on, may be part of, may beintegrated with, or may be according to, the direct fetching schemeexampled in the messaging chart 50 a shown in FIG. 5 a , as exampled inthe messaging chart 350 shown in FIG. 35 , any other direct fetchingscheme described in any publication included or mentioned in thebackground section above, or any combination thereof.

Alternatively or in addition, each of the fetching actions or fetchingschemes herein, or any part thereof, such as the “Repetitive Fetching”flow chart 401 shown in FIG. 40 , the “Repetitive Fetching #1” 401 ashown in FIG. 41 , the “Repetitive Fetching #2” 401 b shown in FIG. 41 ,the “Repetitive Fetching #n” 401 n shown in FIG. 41 , the “FetchingScheme #1” 402 a shown in FIGS. 42-42 a, the “Fetching Scheme #2” 402 bshown in FIGS. 42-42 a, may consist of, may be based on, may be part of,may be integrated with, or may be according to, the non-direct fetchingscheme based on one or more proxy servers, as exampled in the messagingchart 50 b shown in FIG. 5 a , as exampled in the messaging chart 350 ashown in FIG. 35 a , as exampled in the messaging chart 380 a shown inFIG. 38 a , as exampled in the ‘604 patent’, as exampled in PatentCooperation Treaty (PCT) Publication WO 2019/043687, as exampled in U.S.Pat. No. 9,241,044, as described in any publication included ormentioned in the background section above, or any combination thereof.

Alternatively or in addition, each of the fetching actions or fetchingschemes herein, or any part thereof, such as the “Repetitive Fetching”flow chart 401 shown in FIG. 40 , the “Repetitive Fetching #1” 401 ashown in FIG. 41 , the “Repetitive Fetching #2” 401 b shown in FIG. 41 ,the “Repetitive Fetching #n” 401 n shown in FIG. 41 , the “FetchingScheme #1” 402 a shown in FIGS. 42-42 a, the “Fetching Scheme #2” 402 bshown in FIGS. 42-42 a, may consist of, may be based on, may be part of,may be integrated with, or may be according to, the non-direct fetchingscheme based on one or more DC proxy servers, as exampled in themessaging chart 50 c shown in FIG. 5 c , as exampled in the messagingchart 350 b shown in FIG. 35 b , as exampled in the messaging chart 380b shown in FIG. 38 b , as exampled in the messaging chart 370 a shown inFIG. 37 a , as exampled in the ‘604 patent’, as exampled in PatentCooperation Treaty (PCT) Publication WO 2019/043687, as exampled in U.S.Pat. No. 9,241,044, as described in any publication included ormentioned in the background section above, or any combination thereof.

Alternatively or in addition, each of the fetching actions or fetchingschemes herein, or any part thereof, such as the “Repetitive Fetching”flow chart 401 shown in FIG. 40 , the “Repetitive Fetching #1” 401 ashown in FIG. 41 , the “Repetitive Fetching #2” 401 b shown in FIG. 41 ,the “Repetitive Fetching #n” 401 n shown in FIG. 41 , the “FetchingScheme #1” 402 a shown in FIGS. 42-42 a, the “Fetching Scheme #2” 402 bshown in FIGS. 42-42 a, may consist of, may be based on, may be part of,may be integrated with, or may be according to, the non-direct fetchingscheme based on one or more tunnel devices, that may be client devices,as exampled in the messaging charts 60-60 b shown in FIGS. 6-6 b, asexampled in the messaging chart 350 d shown in FIG. 35 d , as exampledin the messaging chart 380 d shown in FIG. 38 d , as exampled in themessaging chart 390 a shown in FIG. 39 a , as exampled in the ‘604patent’, as exampled in Patent Cooperation Treaty (PCT) Publication WO2019/043687, as exampled in U.S. Pat. No. 9,241,044, as described in anypublication included or mentioned in the background section above, orany combination thereof.

Any identification of any content or URL request herein may beintercepted and routed to be handled as part of the ‘client’ applicationor process. Such interception may be in the form of a filter driver (orany other intermediate driver), enabling the interception as part of theOS kernel. Alternatively or in addition, the interception may be in theform of extension or a plug-in of the requesting application, such as abrowser plug-in or a browser extension in the case where the applicationis a web browser. Alternatively or in addition, the interception of therequest may use hooking of the requesting application, or of thecommunication-related application. Alternatively or in addition, theapplication and the steps described herein may communicate using anInter-Process Communication (IPC), such as a file sharing, a signal, asocket, a pipe, a message queue, a shared memory, a semaphore, or memorymapped file. In Windows environment, the IPC may be based on aclipboard, a Component Object Model (COM), data copy, a DDE protocol, ormailslots.

Any IP address may be selected based on estimated as being in the samearea as the client device, the web server, or both. Any IP address maybe selected based on estimated as being in the same continent, country,state, region, city, postal/zip code, latitude, longitude, or Timezoneas the client device or the web server. Alternatively or in addition,any IP address may be selected based on being the recent one to beselected, or based on being the least recent to be selected.Alternatively or in addition, any IP address may be manually selected bythe user, and any method herein may further comprise displaying to theuser the multiple IP addresses, and selecting, by the user, the selectedIP address from the group.

Each of the devices denoted herein as servers, such as the proxy server53, the DC proxy server 56, the SP server 72, the TB server 71, the webserver 22 b, or the dedicated tunnel 33 a (when implemented as aserver), may function as a server in the meaning of client/serverarchitecture, providing services, functionalities, and resources, toother devices (clients), commonly in response to the clients' request.Each of the server devices may further employ, store, integrate, oroperate a server-oriented operating system, such as the MicrosoftWindows Server® (2003 R2, 2008, 2008 R2, 2012, or 2012 R2 variant),Linux™ (or GNU/Linux) variants (such as Debian based: Debian GNU/Linux,Debian GNU/kFreeBSD, or Debian GNU/Hurd, Fedora™, Gentoo™, Linspire™,Mandriva, Red Hat® Linux available from Red Hat, Inc. headquartered inRaleigh, N.C., U.S.A., Slackware®, SuSE, or Ubuntu®), or UNIX®,including commercial UNIX® variants such as Solaris™ (available fromOracle Corporation headquartered in Redwood City, Calif., U.S.A.), AIX®(available from IBM Corporation headquartered in Armonk, N.Y., U.S.A.),or Mac™ OS X (available from Apple Inc. headquartered in Cupertino,Calif., U.S.A.), or free variants such as FreeBSD®, OpenBSD, andNetBSD®. Alternatively or in addition, each of the devices denotedherein as servers, may equally function as a client in the meaning ofclient/server architecture.

Devices that are not denoted herein as servers, such as client devices(such as the client device 31 a) or any of the tunnel devices (includingthe dedicated tunnel 33 a when implemented as a server), may typicallyfunction as a client in the meaning of client/server architecture,commonly initiating requests for receiving services, functionalities,and resources, from other devices (servers or clients). Each of thethese devices may further employ, store, integrate, or operate aclient-oriented (or end-point dedicated) operating system, such asMicrosoft Windows® (including the variants: Windows 7, Windows XP,Windows 8, and Windows 8.1, available from Microsoft Corporation,headquartered in Redmond, Wash., U.S.A.), Linux, and Google Chrome OSavailable from Google Inc. headquartered in Mountain View, Calif.,U.S.A. Further, each of the these devices may further employ, store,integrate, or operate a mobile operating system such as Android(available from Google Inc. and includes variants such as version 2.2(Froyo), version 2.3 (Gingerbread), version 4.0 (Ice Cream Sandwich),Version 4.2 (Jelly Bean), and version 4.4 (KitKat), iOS (available fromApple Inc., and includes variants such as versions 3-7), Windows® Phone(available from Microsoft Corporation and includes variants such asversion 7, version 8, or version 9), or Blackberry® operating system(available from BlackBerry Ltd., headquartered in Waterloo, Ontario,Canada). Alternatively or in addition, each of the devices that are notdenoted herein as servers, may equally function as a server in themeaning of client/server architecture.

The method and system described herein allows for a client device (suchas the client device 31 a operation described in the flow chart 160 inFIG. 16 or the flow chart 160 a in FIG. 16 a ) to effectively fetchcontent from a data server (such as the web server 22 b). The method andsystem may be used by the client device for supporting an application,such as a web browser application, when the application is requestingcontent from the Internet in general, and from a data server inparticular. The request for Internet-related content may be interceptedby the ‘client’ application and process, initiating the client flowchart160 shown in FIG. 16 , or the flowchart 160 a shown in FIG. 16 a . Inone example, the client device uses a communication-related applicationto be used by the application when no ‘client’ application is present,such as HTTP stack handling application. The request from the requestingapplication to the communication-related application is intercepted androuted to be handled as part of the ‘client’ application or process.Such interception may be in the form of a filter driver (or any otherintermediate driver), enabling the interception as part of the OSkernel. Alternatively or in addition, the interception may be in theform of extension or a plug-in of the requesting application, such as abrowser plug-in or a browser extension in the case where the applicationis a web browser. Alternatively or in addition, the interception of therequest may use hooking of the requesting application or of thecommunication-related application. Alternatively or in addition, theapplication and the steps described herein may communicate using anInter-Process Communication (IPC), such as a file sharing, a signal, asocket, a pipe, a message queue, a shared memory, a semaphore, or memorymapped file. In Windows environment, the IPC may be based on aclipboard, a Component Object Model (COM), a data copy, a DDE protocol,or mailslots.

Examples of web browsers include Microsoft Internet Explorer (availablefrom Microsoft Corporation, headquartered in Redmond, Wash., U.S.A.),Google Chrome which is a freeware web browser (developed by Google,headquartered in Googleplex, Mountain View, Calif., U.S.A.), Opera™(developed by Opera Software ASA, headquartered in Oslo, Norway), andMozilla Firefox® (developed by Mozilla Corporation headquartered inMountain View, Calif., U.S.A.). The web-browser may be a mobile browser,such as Safari (developed by Apple Inc. headquartered in Apple Campus,Cupertino, Calif., U.S.A), Opera Mini™ (developed by Opera Software ASA,headquartered in Oslo, Norway), and Android web browser.

Any communication between any two nodes may use the Socket Secure(SOCKS), WebSocket (ws), which may be WebSocket Secure (wss), or HTTPProxy protocol. Further, any communication between any two nodes may usethe HTTP or HTTPS protocol. In one example, a communication between theclient device 31 a or any tunnel device (such as the tunnel #1 33 a, thetunnel #2 33 b, the tunnel #3 33 c, the tunnel #4 33 d, or the tunnel #533 e) and any server, such as the TB server 71, the SP server 72, or theWeb Server 22 b, may use the SOCKS, WebSocket or HTTP Proxy protocol,wherein the respective device, such as the client device 31 a or thetunnel device, executes the respective SOCKS, WebSocket or HTTP Proxyclient side protocol, and the respective server executes the respectiveSOCKS, WebSocket or HTTP Proxy server side protocol. Alternatively or inaddition, the respective device, such as the client device 31 a or thetunnel device, executes the respective SOCKS, WebSocket or HTTP Proxyserver side protocol, and the respective server executes the respectiveSOCKS, WebSocket or HTTP Proxy client side protocol. Further, acommunication between the client device 31 a or any tunnel device (suchas the tunnel #1 33 a, the tunnel #2 33 b, the tunnel #3 33 c, thetunnel #4 33 d, or the tunnel #5 33 e) and any server, such as the TBserver 71, the SP server 72, or the Web Server 22 b, may use the HTTP(or HTTPS) protocol, wherein the respective device, such as the clientdevice 31 a or the tunnel device, executes the HTTP (or HTTPS) clientside protocol, and the respective server executes the HTTP (or HTTPS)server side protocol. Alternatively or in addition, the respectivedevice, such as the client device 31 a or the tunnel device, executesthe HTTP (or HTTPS) server side protocol, and the respective serverexecutes the HTTP (or HTTPS) client side protocol.

The term ‘network element’ (or ‘element’) or ‘network node’ (or ‘node’)is used herein to include, but not limited to, the client device 31 a, atunnel device (such as the tunnel device #1 33 a), the proxy server 53,the DC proxy server 56, the SP server 72, the TB server 71, or a webserver (such as the web server #1 22 a). Any memory, storage, database,or cache mentioned herein may consist of, comprise, use, or be includedin, the local cache as described in U.S. Pat. No. 8,135,912 to Shribmanet al., entitled: “System and Method of Increasing Cache Size”.

Any device, component, or apparatus herein, may be structured as, may beshaped or configured to serve as, or may be integrated with, a wearabledevice. In one example, any one or more of the tunnel devices herein,such as the tunnel device #1 33 a, the tunnel device #2 33 b, or thetunnel device #3 33 c, may consist of, may comprise, may be integratedwith, or may be part of, a wearable device. Similarly, any one or moreof the client devices herein, such as the client device #1 31 a, or theclient device #2 31 b, may consist of, may comprise, may be integratedwith, or may be part of, a wearable device. Any wearable device or anyapparatus or device herein may be wearable on an organ such as on theperson head, and the organ may be eye, ear, face, cheek, nose, mouth,lip, forehead, or chin. Alternatively or in addition, wearable device orany apparatus or device herein may be constructed to have a formsubstantially similar to, may be constructed to have a shape allowingmounting or wearing identical or similar to, or may be constructed tohave a form to at least in part substitute for, headwear, eyewear, orearpiece. Any headwear herein may consist of, may be structured as, ormay comprise, a bonnet, a headband, a cap, a crown, a fillet, a haircover, a hat, a helmet, a hood, a mask, a turban, a veil, or a wig. Anyeyewear herein may consist of, may be structured as, or may comprise,glasses, sunglasses, a contact lens, a blindfold, or a goggle. Anyearpiece herein may consist of, may be structured as, or may comprise, ahearing aid, a headphone, a headset, or an earplug. Alternatively or inaddition, any enclosure herein may be permanently or releasablyattachable to, or may be part of, a clothing piece of a person. Theattaching may use taping, gluing, pinning, enclosing, encapsulating, apin, or a latch and hook clip, and the clothing piece may be a top,bottom, or full-body underwear, or a headwear, a footwear, an accessory,an outwear, a suit, a dress, a skirt, or a top.

Any system or device herein may use a virtualization. Any system ordevice herein may further comprise a Virtual Machine (VM) executing avirtualized application. Any device herein, or any part thereof, such asthe client device, the web server, at least one of the tunnel devices,the first server, or the second server, may be implemented as virtualhardware as part of the VM. At least one of any action or step herein byany device may be executed as part of the virtualized application.

Any network herein may be used with a virtualization, and any networkherein may be executed as a virtualized network as part of a VirtualMachine (VM). The virtualization may be implemented by a host computerthat may implement the VM, and any method herein may further compriseexecuting, by the host computer, a hypervisor or a Virtual MachineMonitor (VMM), and the virtualized may use or interface virtualhardware. Any virtualization herein may include, may be based on, or mayuse, full virtualization, para-virtualization, or hardware assistedvirtualization. For example, any communication between two entitiesselected from a group consisting of the client device, the web server,at least one of the multiple tunnel devices, the first server, and thesecond server, may be executed as a virtualized network as part of aVirtual Machine (VM).

Any method herein, any step herein, any flow-chart herein, or any partthereof, may be used with a virtualization, and at least one of thesteps or methods herein may be executed as part of a virtualizedapplication as part of a Virtual Machine (VM). Any device herein, suchas the analyzer device, the first device, or any part thereof, may beimplemented as virtual hardware. Any virtualization herein may be usedwith an host computer that implements the VM, and may further comprisingexecuting, by the host computer, a hypervisor or a Virtual MachineMonitor (VMM). Any virtualized application herein or any or hardwarevirtualization herein may use or may interface virtual hardware. Anyvirtualization herein may include, may be based on, or may use, fullvirtualization, para-virtualization, or hardware assistedvirtualization.

Any operating system herein may be used with a virtualization, and anyoperating system herein may be executed as a guest operating system aspart of a Virtual Machine (VM). The virtualization may be implemented bya host computer that may implement the VM, and any method herein mayfurther comprise executing, by the host computer, a hypervisor or aVirtual Machine Monitor (VMM), and the guest operating system may use orinterface virtual hardware. Any such virtualization herein may include,may be based on, or may use, full virtualization, para-virtualization,or hardware assisted virtualization.

Any element or entity herein, such as the client device, the web server,at least one of the multiple tunnel devices, the first server, and thesecond server, may be implemented as virtualized entity. Anyvirtualization may include, may be based on, or may use, desktopvirtualization, network virtualization, storage virtualization,application virtualization, server virtualization, or any combinationthereof. Further, any virtualization herein may include, may be basedon, or may use, full virtualization, para-virtualization, or hardwareassisted virtualization. Further, any virtualization herein may include,may be based on, or may use, a Virtual Machine (VM) on a host computerthat executes a hypervisor or Virtual Machine Monitor (VMM), and theoperating system may be a guest operating system that may use orinterface a virtual hardware.

Any method herein may be used with a virtualization, where at least oneof the steps may be executed as part of a virtualized application aspart of a Virtual Machine (VM). Alternatively or in addition, the clientdevice or any part thereof, the web server or any part thereof, at leastone of the multiple tunnel devices or any part thereof, the first serveror any part thereof, or the second server or any part thereof, may beimplemented as virtual hardware. Further, any method herein may be usedwith a host computer that may implement the VM, and any method hereinmay further comprise executing, by the host computer, a hypervisor or aVirtual Machine Monitor (VMM), and any virtualized application herein orany hardware herein may use or may interface virtual hardware. Anyvirtualization herein may include, may be based on, or may uses, fullvirtualization, para-virtualization, or hardware assistedvirtualization. At least two devices that may be selected from a groupconsisting of the client device, the web server, at least one of themultiple tunnel devices, the first server, and the second server, may beimplemented as virtual hardware, and the at least two devices may bevirtualized by the same host computer that implements the VM.

The steps described herein may be sequential, and performed in thedescribed order. For example, in a case where a step is performed inresponse to another step, or upon completion of another step, the stepsare executed one after the other. However, in case where two or moresteps are not explicitly described as being sequentially executed, thesesteps may be executed in any order, or may be simultaneously performed.Two or more steps may be executed by two different network elements, orin the same network element, and may be executed in parallel usingmultiprocessing or multitasking.

As used herein, the term “parallel” in the content of two time periodsmeans that the two time periods are at least partly overlapping. In thecontent of parallel executing of actions, operations, or activities(such as processes, tasks, or transfers), the term “parallel” means thetime periods associated with the actions or activities, are at leastpartly overlapping. For example, parallel actions may include a casewhere a second action is initiated before the first action is completed.Any parallel action, activity, or operation herein may use multitaskingor multiprocessing, or otherwise using common or separate processingresources. Any parallel executing of actions, operations, or activitiesmay be independent or dependent, such as by using shared resources. Atime period of an action, operation, or activity starts when the actionor activity is initiated, and ends when the action, operation, oractivity is completed. In one example, the completion is defined by anevent, action, or occurrence that is responsive to the action,operation, or activity. For example, a content fetching action may becompleted when the content request is transmitted to the Internet by therequesting device, when the content request reaches or is received byanother device, or when the requested content (or a failure statusresponse) is received by the requesting device.

For example, any two actions or steps of sending, any two actions orsteps of receiving, any two actions or steps of selecting, any twoactions or steps of processing, or any combination thereof, may beperformed in full or in part in parallel by the same entity (e.g.,server, client, or tunnel) or separated entities, using multitasking ormultiprocessing. Similarly, any steps of sending and receiving, sendingand selecting, sending and processing, receiving and selecting,receiving and processing, or any combination thereof, may be performedin full or in part in parallel by the same entity (e.g., server, client,or tunnel) or separated entities, using multitasking or multiprocessing.The term ‘sequential’ herein means not in parallel, such as when twotime periods are not overlapping, but rather follow each other withoutany overlapping.

Any selecting of an element (or multiple elements) from a collection ora group of elements herein, such as the selecting of a tunnel device(for example, by selecting its associated IP address) as part of the“Tunnel Selection” step 83 shown as part of the flow chart 80 or the“Select Tunnel” step 146 shown as part of the flow chart 140 b, as wellas any other selection herein, may be based on random, quazi-random, ordeterministic selection. Similarly, the selection of a sub-group or alabel (such as VIP label) may be based on random, quazi-random, ordeterministic selection. Similarly, in case of availability of multipleproxy servers such as the proxy server 53, the selection of the proxyserver to use may be based on random, quazi-random, or deterministicselection. Similarly, the selection of a sub-group or a label (such asVIP label) may be based on random, quazi-random, or deterministicselection. Similarly, the selecting of IP address from the IP addresseslist 58 by the DC proxy server 56, may be based on random, quazi-random,or deterministic selection. Similarly, the selection of a sub-group or alabel (such as VIP label) may be based on random, quazi-random, ordeterministic selection.

Any selection herein of any IP address from any list, any selection ofany device from any list, or any selection of any scheme, such as anyfetching scheme, may be based on, or may use, load balancing. Further,any selection herein of any IP address from any list may be based on, ormay use, random selection. Any random selection herein may use, or maybe based on, one or more random numbers generated by a random numbergenerator, and the random number generator may be hardware based,software based, or any combination thereof. Any random number generatorherein may be using thermal noise, shot noise, nuclear decayingradiation, photoelectric effect, or quantum phenomena. Alternatively orin addition, any random number generator herein may be based onexecuting an algorithm for generating pseudo-random numbers.

Using random selection may allow for load balancing, preferably byequally distributing the workload across the elements, which mayoptimize resource use, maximize throughput, minimize response time, andavoid overload of any single resource. The randomness may be based onusing a random signal generator. The random signal generator may bebased on a digital random signal generator having a digital output.Alternatively, the random signal generator may be based on analog randomsignal generator having an analog output. Analog random signal generatormay use a digital random signal generator whose output is converted toanalog using analog to digital converter, or can use a repetitive analogsignal generator (substantially not synchronized to any other timing inthe system) whose output is randomly time sampled by a sample and hold.A random signal generator (having either analog or digital output) canbe hardware based, using a physical process such as thermal noise, shotnoise, nuclear decaying radiation, photoelectric effect or other quantumphenomena, or can be software based, using a processor executing analgorithm for generating pseudo-random numbers which approximates theproperties of random numbers.

Any randomness used typically further provides anonymity anduntraceability, as well as load-balancing. Randomness is commonlyimplemented by using random numbers, defined as a sequence of numbers orsymbols that lack any pattern and thus appear random, are oftengenerated by a random number generator. Randomness is described, forexample, in IETF RFC 1750 “Randomness Recommendations for Security”(December 1994), which is incorporated in its entirety for all purposesas if fully set forth herein. A random number generator (having eitheranalog or digital output) can be hardware based, using a physicalprocess such as thermal noise, shot noise, nuclear decaying radiation,photoelectric effect or other quantum phenomena. Alternatively, or inaddition, the generation of the random numbers can be software based,using a processor executing an algorithm for generating pseudo-randomnumbers which approximates the properties of random numbers.

Alternatively or in addition, the selection may be deterministic based.In one example, the elements to select from are listed in an orderlyfashion, such as according to a feature, attribute, or a characteristic,using their associated numerical value (e.g., IP address value),according to their alphanumeric identifier (e.g., host name or locationname in ASCII value), according to the order that joined the collectionor group, or according to the order they were formerly selected from thegroup or collection. In such a case, the elements are sequentiallyselected according to the list order. In one example, a LIFO (last infirst out) like scheme may be used, where the lastly selected entity isre-selected, and upon its unavailability, the one entity that wasselected before the last is selected. Alternatively or in addition, aFIFO (first in first out) like scheme is used, where the oldest formerlyselected entity selected.

Any input from a human user herein may use an input component thatcomprises, or consists of, a piece of computer hardware equipment usedto provide data and control signals to an information processing systemsuch as a computer or information appliance. Such input component 18 maybe an integrated or a peripheral input device (e.g., hard/soft keyboard,mouse, resistive or capacitive touch display, etc.). Examples of inputcomponents include keyboards, mouse, scanners, digital cameras andjoysticks. Input component 18 can be categorized based on the modalityof input (e.g., mechanical motion, audio, visual, etc.), whether theinput is discrete (e.g. pressing of key) or continuous (e.g., a mouse'sposition, though digitized into a discrete quantity, is fast enough tobe considered continuous), the number of degrees of freedom involved(e.g., two-dimensional traditional mice, or three-dimensional navigatorsdesigned for CAD applications). Pointing devices (such as ‘computermouse’), which are input components used to specify a position in space,can further be classified according to whether the input is direct orindirect. With direct input, the input space coincides with the displayspace, i.e., pointing is done in the space where visual feedback or thepointer appears. Touchscreens and light pens involve direct input.Examples involving indirect input include the mouse and trackball, andwhether the positional information is absolute (e.g., on a touch screen)or relative (e.g., with a mouse that can be lifted and repositioned).Direct input is almost necessarily absolute, but indirect input may beeither absolute or relative. For example, digitizing graphics tabletsthat do not have an embedded screen involve indirect input and senseabsolute positions and are often run in an absolute input mode, but theymay also be set up to simulate a relative input mode like that of atouchpad, where the stylus or puck can be lifted and repositioned.Further, the input component 18 may include dedicated hard controls forfrequently used/accessed functions (e.g., repeat system message).

A tangible machine-readable medium (such as a storage) may have a set ofinstructions detailing part (or all) of the methods and steps describedherein stored thereon, so that when executed by one or more processors,may cause the one or more processors to perform part of, or all of, themethods and steps described herein. Any of the network elements may be acomputing device that comprises a processor and a computer-readablememory (or any other tangible machine-readable medium), and thecomputer-readable memory may comprise computer-readable instructionssuch that, when read by the processor, the instructions causes theprocessor to perform the one or more of the methods or steps describedherein.

Any part of, or the whole of, any of the methods described herein may beprovided as part of, or used as, an Application Programming Interface(API), defined as an intermediary software serving as the interfaceallowing the interaction and data sharing between an applicationsoftware and the application platform, across which few or all servicesare provided, and commonly used to expose or use a specific softwarefunctionality, while protecting the rest of the application. The API maybe based on, or according to, Portable Operating System Interface(POSIX) standard, defining the API along with command line shells andutility interfaces for a software compatibility with variants of Unixand other operating systems, such as POSIX.1-2008 that is simultaneouslyIEEE STD. 1003.1™—2008 entitled: “Standard for InformationTechnology—Portable Operating System Interface (POSIX®) Description”,and The Open Group Technical Standard Base Specifications, Issue 7, IEEESTD. 1003.1™, 2013 Edition.

Any server, client, tunnel, or other device herein, such as the SPserver 72, the TB server 71, the proxy server 53, the DC proxy server56, the client device 31 a, the tunnel device #1 33 a, the tunnel device#2 33 b, the tunnel device #3 33 c, the tunnel device #4 33 d, thetunnel device #5 33 e, or any combination thereof, may execute part of,or whole of, any one or more of the JavaScript program modules,subroutines, programs, or functions included in U.S. ProvisionalApplication Ser. No. 62/809,847, which was filed on Feb. 25, 2019, inU.S. Provisional Application Ser. No. 62/855,036, which was filed on May31, 2019, and in U.S. Provisional Application Ser. No. 62/948,265.

Any device herein, such as the first device, may consist of, maycomprise, may be part of, or may be integrated with, a server device,which may consist of, may comprise, may be part of, or may be integratedwith, a proxy server. Any proxy server may consist of, may comprise, maybe part of, or may be integrated with, an HTTP proxy server, a web-proxyserver, a caching proxy, an open-source caching proxy server, acloud-based proxy server, an open proxy server, a forwarding proxyserver, a reverse proxy server, a transparent proxy server, anon-transparent proxy server, an anonymous proxy server, a translationproxy server, a SOCKS proxy server, a CGI web proxy server, a suffixproxy server, an I2P anonymous proxy server, a DNS proxy server, or anycombination thereof.

Any device, such as client device or a server device, or network elementherein may comprise, consist of, or include a Personal Computer (PC), adesktop computer, a mobile computer, a laptop computer, a notebookcomputer, a tablet computer, a server computer, a handheld computer, ahandheld device, a Personal Digital Assistant (PDA) device, a cellularhandset, a handheld PDA device, an on-board device, an off-board device,a hybrid device, a vehicular device, a non-vehicular device, a mobile orportable device, a non-mobile or a non-portable device. Further, anydevice or network element herein may comprise, consist of, or include amajor appliance (white goods) and may be an air conditioner, dishwasher,clothes dryer, drying cabinet, freezer, refrigerator, kitchen stove,water heater, washing machine, trash compactor, microwave oven andinduction cooker. The appliance may similarly be a ‘small’ appliancesuch as TV set, CD or DVD player, camcorder, still camera, clock, alarmclock, video game console, HiFi or home cinema, telephone or answeringmachine.

Any system or apparatus herein may further be operative for storing,operating, or using, an operating system. Any system herein may comprisea Virtual Machine (VM) for virtualization, and the operating system maybe executed as a guest operating system. Any system herein may furthercomprise a host computer that implements the VM, and the host computermay be operative for executing a hypervisor or a Virtual Machine Monitor(VMM), and the guest operating system may use or may interface virtualhardware. Any virtualization herein, such as any operating systemvirtualization, may include, may be based on, or may use, fullvirtualization, para-virtualization, or hardware assistedvirtualization.

The term ‘host’ or ‘network host’ is used herein to include, but notlimited to, a computer or other device connected to a computer network,such as the Internet. A network host may offer information resources,services, and applications to users or other nodes on the network, andis typically assigned a network layer host address. Computersparticipating in networks that use the Internet Protocol Suite may alsobe called IP hosts, and computers participating in the Internet arecalled Internet hosts, or Internet nodes. Internet hosts and other IPhosts have one or more IP addresses assigned to their networkinterfaces. The addresses are configured either manually by anadministrator, automatically at start-up by means of the Dynamic HostConfiguration Protocol (DHCP), or by stateless address autoconfigurationmethods. Network hosts that participate in applications that use theclient-server model of computing, are classified as server or clientsystems. Network hosts may also function as nodes in peer-to-peerapplications, in which all nodes share and consume resources in anequipotent manner.

The arrangements and methods described herein may be implemented usinghardware, software or a combination of both. The term “softwareintegration” or any other reference to the integration of two programsor processes herein, is used herein to include, but not limited to,software components (e.g., programs, modules, functions, processes,etc.) that are (directly or via another component) combined, working orfunctioning together or form a whole, commonly for sharing a commonpurpose or set of objectives. Such software integration can take theform of sharing the same program code, exchanging data, being managed bythe same manager program, executed by the same processor, stored on thesame medium, sharing the same GUI or other user interface, sharingperipheral hardware (such as a monitor, printer, keyboard and memory),sharing data or a database, or being part of a single package. The term“hardware integration” or integration of hardware components is usedherein to include, but not limited to, hardware components that are(directly or via another component) combined, working or functioningtogether or form a whole, commonly for sharing a common purpose or setof objectives. Such hardware integration can take the form of sharingthe same power source (or power supply) or sharing other resources,exchanging data or control (e.g., by communicating), being managed bythe same manager, physically connected or attached, sharing peripheralhardware connection (such as a monitor, printer, keyboard and memory),being part of a single package or mounted in a single enclosure (or anyother physical collocating), sharing a communication port, or used orcontrolled with the same software or hardware. The term “integration”herein is used herein to include as applicable, but not limited to, asoftware integration, a hardware integration, or any combinationthereof.

Any networking protocol may be utilized for exchanging informationbetween the network elements (e.g., clients, tunnels, peers, servers)within the network (such as the Internet). For example, it iscontemplated that communications can be performed using TCP/IP.Generally, HTTP and HTTPS are utilized on top of TCP/IP as the messagetransport envelope. These two protocols are able to deal with firewalltechnology better than other message management techniques. However,partners may choose to use a message-queuing system instead of HTTP andHTTPS if greater communications reliability is needed. A non-limitingexample of a message queuing system is IBM's MQ-Series or the MicrosoftMessage Queue (MSMQ). The system described hereinafter is suited forboth HTTP/HTTPS, message-queuing systems, and other communicationstransport protocol technologies. Furthermore, depending on the differingbusiness and technical requirements of the various partners within thenetwork, the physical network may embrace and utilize multiplecommunication protocol technologies. Any network herein, such as thefirst network or the second network, may be implemented as a virtualizednetwork as part of a Virtual Machine (VM). Any system herein maycomprise a host computer that implements the VM. The host computer mayfurther be operative for executing a hypervisor or a Virtual MachineMonitor (VMM). Any virtualized network herein may use or may interfacevirtual hardware. Any virtualization herein may include, may be basedon, or may use, full virtualization, para-virtualization, or hardwareassisted virtualization.

Any data identifying herein, such as an identifying of a URL or a URLrequest, may be based on, or may use extracting, using SSL sniffing.

The term “port” refers to a place of access to a device, electricalcircuit or network, where energy or signal may be supplied or withdrawn.The term “interface” of a networked device refers to a physicalinterface, a logical interface (e.g., a portion of a physical interfaceor sometimes referred to in the industry as a sub-interface—for example,such as, but not limited to a particular VLAN associated with a networkinterface), and/or a virtual interface (e.g., traffic grouped togetherbased on some characteristic—for example, such as, but not limited to, atunnel interface). As used herein, the term “independent” relating totwo (or more) elements, processes, or functionalities, refers to ascenario where one does not affect nor preclude the other. For example,independent communication such as over a pair of independent data routesmeans that communication over one data route does not affect norpreclude the communication over the other data routes.

Some embodiments may be used in conjunction with various devices,network elements, and systems, for example, a Personal Computer (PC), adesktop computer, a mobile computer, a laptop computer, a notebookcomputer, a tablet computer, a server computer, a handheld computer, ahandheld device, a Personal Digital Assistant (PDA) device, a cellularhandset, a handheld PDA device, an on-board device, an off-board device,a hybrid device, a vehicular device, a non-vehicular device, a mobile orportable device, a non-mobile or non-portable device, a wirelesscommunication station, a wireless communication device, a wirelessAccess Point (AP), a wired or wireless router, a wired or wirelessmodem, a wired or wireless network, a Local Area Network (LAN), aWireless LAN (WLAN), a Metropolitan Area Network (MAN), a Wireless MAN(WMAN), a Wide Area Network (WAN), a Wireless WAN (WWAN), a PersonalArea Network (PAN), a Wireless PAN (WPAN), devices and/or networksoperating substantially in accordance with existing IEEE 802.11,802.11a, 802.11b, 802.11g, 802.11k, 802.11n, 802.11r, 802.16, 802.16d,802.16e, 802.20, 802.21 standards and/or future versions and/orderivatives of the above standards, units and/or devices which are partof the above networks, one way and/or two-way radio communicationsystems, cellular radio-telephone communication systems, a cellulartelephone, a wireless telephone, a Personal Communication Systems (PCS)device, a PDA device which incorporates a wireless communication device,a mobile or portable Global Positioning System (GPS) device, a devicewhich incorporates a GPS receiver or transceiver or chip, a device whichincorporates an RFID element or chip, a Multiple Input Multiple Output(AMMO) transceiver or device, a Single Input Multiple Output (SIMO)transceiver or device, a Multiple Input Single Output (MISO) transceiveror device, a device having one or more internal antennas and/or externalantennas, Digital Video Broadcast (DVB) devices or systems,multi-standard radio devices or systems, a wired or wireless handhelddevice (e.g., BlackBerry, Palm Treo), a Wireless Application Protocol(WAP) device, or the like.

While the communication sessions between the elements herein, such asbetween servers and clients, are exampled to be over the Internet 113using Internet Protocol (IP) or TCP/IP, any other communicationprotocols may be equally used, such as a Local Area Network (LAN), aWireless LAN (WLAN), a Metropolitan Area Network (MAN), a Wireless MAN(WMAN), a Wide Area Network (WAN), a Wireless WAN (WWAN), a PersonalArea Network (PAN), a Wireless PAN (WPAN), devices and/or networksoperating substantially in accordance with existing IEEE 802.11,802.11a, 802.11b, 802.11g, 802.11k, 802.11n, 802.11r, 802.16, 802.16d,802.16e, 802.20, 802.21 standards. For example, each of, or all of, thecommunication path 111 a between the tunnel device #1 33 a and the TBserver 71, the communication path 111 b between the tunnel device #2 33b and the TB server 71, the communication path 111 c between the tunneldevice #3 33 c and the TB server 71, the communication path 111 dbetween the tunnel device #4 33 d and the TB server 71, and thecommunication path 111 e between the tunnel device #5 33 e and the TBserver 71, may use any one of the protocols associated with a Local AreaNetwork (LAN), a Wireless LAN (WLAN), a Metropolitan Area Network (MAN),a Wireless MAN (WMAN), a Wide Area Network (WAN), a Wireless WAN (WWAN),a Personal Area Network (PAN), a Wireless PAN (WPAN), devices and/ornetworks operating substantially in accordance with existing IEEE802.11, 802.11a, 802.11b, 802.11g, 802.11k, 802.11n, 802.11r, 802.16,802.16d, 802.16e, 802.20, 802.21 standards. Similarly, each of, or allof, the communication path 121 a between the client device 31 a and theSP server 72, the communication path 131 a between the SP server 72 andthe TB server 71, the communication path 131 c or 131 d between thetunnel device #4 33 d and the web server 22 b, and the communicationpath 191 or 192 between the SP server 72 and the tunnel device #4 33 d,may use a Local Area Network (LAN), a Wireless LAN (WLAN), aMetropolitan Area Network (MAN), a Wireless MAN (WMAN), a Wide AreaNetwork (WAN), a Wireless WAN (WWAN), a Personal Area Network (PAN), aWireless PAN (WPAN), devices and/or networks operating substantially inaccordance with existing IEEE 802.11, 802.11a, 802.11b, 802.11g,802.11k, 802.11n, 802.11r, 802.16, 802.16d, 802.16e, 802.20, 802.21standards.

As used herein, the terms “program”, “programmable”, and “computerprogram” are meant to include any sequence or human or machinecognizable steps which perform a function. Such programs are notinherently related to any particular computer or other apparatus, andmay be rendered in virtually any programming language or environmentincluding, for example, C/C++, Fortran, COBOL, PASCAL, assemblylanguage, markup languages (e.g., HTML, SGML, XML, VoXML), and thelikes, as well as object-oriented environments such as the Common ObjectRequest Broker Architecture (CORBA), Java™ (including J2ME, Java Beans,etc.) and the likes, as well as in firmware or other implementations.Generally, program modules include routines, programs, objects,components, data structures, etc., that performs particular tasks orimplement particular abstract data types. The term “application program”(also referred to as ‘application’, ‘software application’, or‘application software’) is used herein to include, but not limited to, acomputer program designed to perform a specific function directly for auser, or for another application program. Application software istypically a set of one or more programs designed to carry out operationsfor a specific application. Commonly, an application software isdependent on system software that manages and integrates computercapabilities, but does not directly perform tasks that benefit the user,such as an operating system, to execute. Examples of types ofapplication software may include accounting software, media players, andoffice suites. Applications may be bundled with the computer and itssystem software, or may be published separately, and further may bedeveloped and coded as a proprietary, or as an open-source, software.Most applications are designed to help people perform an activity.

The terms “task” and “process” are used generically herein to describeany type of running programs, including, but not limited to a computerprocess, task, thread, executing application, operating system, userprocess, device driver, native code, machine or other language, etc.,and can be interactive and/or non-interactive, executing locally and/orremotely, executing in foreground and/or background, executing in theuser and/or operating system address spaces, a routine of a libraryand/or standalone application, and is not limited to any particularmemory partitioning technique. The steps, connections, and processing ofsignals and information illustrated in the figures, including, but notlimited to any block and flow diagrams and message sequence charts, maytypically be performed in the same or in a different serial or parallelordering and/or by different components and/or processes, threads, etc.,and/or over different connections and be combined with other functionsin other embodiments, unless this disables the embodiment or a sequenceis explicitly or implicitly required (e.g., for a sequence of readingthe value, processing the value—the value must be obtained prior toprocessing it, although some of the associated processing may beperformed prior to, concurrently with, and/or after the read operation).Where certain process steps are described in a particular order or wherealphabetic and/or alphanumeric labels are used to identify certainsteps, the embodiments are not limited to any particular order ofcarrying out such steps. In particular, the labels are used merely forconvenient identification of steps, and are not intended to imply,specify or require a particular order for carrying out such steps.Furthermore, other embodiments may use more or less steps than thosediscussed herein. They may also be practiced in distributed computingenvironments where tasks are performed by remote processing devices thatare linked through a communications network. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

The corresponding structures, materials, acts, and equivalents of allmeans plus function elements in the claims below are intended to includeany structure, or material, for performing the function in combinationwith other claimed elements as specifically claimed. The description ofthe present invention has been presented for purposes of illustrationand description, but is not intended to be exhaustive or limited to theinvention in the form disclosed. The present invention should not beconsidered limited to the particular embodiments described above, butrather should be understood to cover all aspects of the invention asfairly set out in the attached claims. Various modifications, equivalentprocesses, as well as numerous structures to which the present inventionmay be applicable, will be readily apparent to those skilled in the artto which the present invention is directed upon review of the presentdisclosure.

All publications, standards, patents, and patent applications cited inthis specification are incorporated herein by reference as if eachindividual publication, patent, or patent application were specificallyand individually indicated to be incorporated by reference and set forthin its entirety herein.

Any of the arrangements or actions described herein (or any partthereof) may be implemented as a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention. The computer readable storage medium may be atangible device that can retain and store instructions for use by aninstruction execution device. The computer readable storage medium maybe, for example, but is not limited to, an electronic storage device, amagnetic storage device, an optical storage device, an electromagneticstorage device, a semiconductor storage device, or any suitablecombination of the foregoing. A non-exhaustive list of more specificexamples of the computer readable storage medium includes the following:a portable computer diskette, a hard disk, a Random Access Memory (RAM),a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory(EPROM or Flash memory), a Static Random Access Memory (SRAM), aportable Compact Disc Read-Only Memory (CD-ROM), a Digital VersatileDisk (DVD), a memory stick, a floppy disk, a mechanically encoded devicesuch as punch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Any computer readable program instructions described herein may bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. Any network herein maycomprise copper transmission cables, optical transmission fibers,wireless transmission, routers, firewalls, switches, gateway computersand/or edge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,Instruction-Set-Architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network mentioned herein. In some embodiments, electroniccircuitry including, for example, programmable logic circuitry,Field-Programmable Gate Arrays (FPGA), or Programmable Logic Arrays(PLA) may execute the computer readable program instructions byutilizing state information of the computer readable programinstructions to personalize the electronic circuitry, in order toperform aspects of the present invention.

Aspects of the various arrangements described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. Further, each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, may be implemented by computerreadable program instructions.

Any computer readable program instructions or steps herein may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce amachine, such that the instructions, which execute via the processor ofthe computer or other programmable data processing apparatus, createmeans for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks. These computer readable programinstructions may also be stored in a computer readable storage mediumthat can direct a computer, a programmable data processing apparatus,and/or other devices to function in a particular manner, such that thecomputer readable storage medium having instructions stored thereincomprises an article of manufacture including instructions whichimplements aspects of the function/act specified in the flowchart and/orblock diagram block or blocks. The computer readable programinstructions may also be loaded onto a computer, other programmable dataprocessing apparatus, or other device to cause a series of operationalsteps to be performed on the computer, other programmable apparatus orother device to produce a computer implemented process, such that theinstructions which execute on the computer, other programmableapparatus, or other device implements the functions/acts specified inthe flowchart and/or block diagram block or blocks.

The flowchart and block diagrams in the figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

Any program described herein may be identified based upon theapplication for which they are implemented in a specific embodiment ofthe invention. However, it should be appreciated that any particularprogram nomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

1. A method for obtaining over the Internet by a requesting device,using a group of devices, a web-page that is stored in a web server andis identified by a Uniform Resource Locator (URL), the methodcomprising: (a) selecting, by the requesting device, a device from thegroup; (b) sending, by the requesting device to the selected device overthe Internet, a Hypertext Transfer Protocol (HTTP) request thatcomprises the URL; (c) receiving, by the requesting device from theselected device over the Internet, a response in response to the sendingof the HTTP request; and (d) identifying and checking, by the requestingdevice, a HTTP status code for determining whether the response is aproper response that comprises the web-page, until the response isdetermined to be a proper response, repeating steps (a)-(d) N times,wherein N>1, using a different selected device in each repetition,responsive to determining in all the repetitions that the response isnot a proper response, returning or sending an error message, andwherein N is equal to, or more than, 2, 3, or
 4. 2. The method accordingto claim 1, wherein the communication over the Internet between therequesting device and each of the respective selected devices is basedon, uses, or is compatible with, Hypertext Transfer Protocol (HTTP) orHypertext Transfer Protocol Secure (HTTPS) protocol or connection. 3.The method according to claim 2, wherein the requesting device serves asan HTTP or HTTPS client.
 4. The method according to claim 2, whereineach of the respective selected devices serves as an HTTP or HTTPSclient.
 5. The method according to claim 1, wherein the HTTP requestcomprises, or consists of, an HTTPS request.
 6. The method according toclaim 1, wherein the error message comprises an HTTP message.
 7. Themethod according to claim 1, wherein the web-page includes, consists of,or comprises, a part or whole of, a computer file, audio data, voicedata, multimedia data, video data, an image, a computer program, or anycombination thereof. The method according to claim 1, wherein N is equalto, or more than 5, 7, 10, 15, 20, 25, 30, 40, 50, or
 100. 8. The methodaccording to claim 1, wherein the response is determined as a properresponse responsive to a status code of 2xx, and wherein the response isdetermined as not being a proper response responsive to a status code of4xx or 5xx.
 9. The method according to claim 1, further comprising, byat least one of, or by each of, the selected devices: receiving, by theselected device from the requesting device over the Internet, therespective HTTP request, in response to the sending by the requestingdevice of the respective HTTP request, and responsive to the receivingof the HTTP request by the selected device: (e) sending, by the selecteddevice to the web server over the Internet, the respective HTTP request;(f) receiving, by the selected device from the web server over theInternet, a respective response in response to the sending of the HTTPrequest; and (g) sending, by the selected device to the requestingdevice over the Internet, the received respective response.
 10. Themethod according to claim 9, further comprising repeating steps (e)-(g)M times, wherein M>1 or M=1.
 11. The method according to claim 10,further comprising for each repetition step (h) identifying andchecking, by the selected device, a HTTP status code for determiningwhether the response is a proper response that comprises the web-page.12. The method according to claim 11, further comprising until theresponse is determined to be a proper response, repeating steps (e)-(g)M times, wherein M>1.
 13. The method according to claim 12, furthercomprising responsive to determining in all the repetitions that theresponse is not a proper response, sending, by the selected device tothe requesting device over the Internet, an additional error message.14. The method according to claim 13, wherein M is equal to, or morethan, 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50, or 100, or wherein M isless than 2, 3, 4, 5, 7, 10, 15, 20, 25, 30, 40, 50, 100, 150, or 200.15. The method according to claim 9, further comprising operating, bythe selected device, a web browser.
 16. The method according to claim15, wherein the sending, by the selected device to the web server overthe Internet, of the respective HTTP request, is performed as part ofthe operating of the web browser.
 17. The method according to claim 1,wherein the response is determined as not being a proper responseresponsive to a status code of HTTP 404 error message.
 18. The methodaccording to claim 1, wherein the checking of the response furthercomprises using a timeout mechanism, wherein the response is determinedas not being a proper response in response to not receiving a properresponse after elapsed defined time period after an initiation of thesending.
 19. The method according to claim 1, wherein the checkingcomprises checking if an URL redirection is identified, and wherein theresponse is determined as not being a proper response in response todetecting the URL redirection, and wherein the URL redirection isidentified by checking that an HTTP status code received is 3xxRedirection.
 20. The method according to claim 1, for use with acriterion, wherein the checking of the response further comprisesverifying if the response received satisfy the criterion, and whereinthe criterion relates to a feature, characteristic, or type, of thereceived response, or wherein the criterion comprises a value, and theresponse is determined as not being a proper response in response tocomparing the response feature, characteristic, or type, to the value.21. The method according to claim 1, wherein more than 2 repetitions areperformed, and wherein the same device from the group is selected forall the repetitions.
 22. The method according to claim 1, wherein morethan 2 repetitions are performed, and wherein different devices from thegroup are selected in the repetitions.
 23. The method according to claim1, for use with a list that comprises Internet Protocol (IP) addressesof the devices in the group, wherein the selecting of a device from thegroup comprises, or consists of, selecting the respective IP address ofthe selected device.
 24. The method according to claim 23, wherein atleast one of, or each one of, the devices in the group is a clientdevice that is housed in a single enclosure that is a hand-heldenclosure or a portable enclosure.
 25. The method according to claim 23,wherein at least one of, or each one of, the devices in the group is aclient device that is integrated in part or entirely in an appliance.26. The method according to claim 23, wherein at least one of, or eachone of, the devices in the group consists of, comprises, is integratedwith, or is part of, a wearable device that is wearable on a person. 27.The method according to claim 23, wherein at least one of, or each oneof, the devices in the group is a client device that is operative forstoring, operating, or using an operating system or a mobile operatingsystem.
 28. The method according to claim 1, wherein the selecting isbased on, or uses, random selection.
 29. The method according to claim1, wherein the selecting is based on, or uses, an estimated geographicallocation of the selected device.
 30. The method according to claim 29,further comprising estimating the geographical location of the selecteddevice.
 31. The method according to claim 30, wherein the estimatinguses geolocation or IP geolocation that is based on W3C GeolocationApplication Programming Interface (API).
 32. The method according toclaim 29, wherein a device is selected based on estimated as beingassociated to being in a same area as the requesting device or as theweb server.
 33. The method according to claim 1, wherein the requestingdevice is part of, or is integrated in part or entirely, in anappliance.
 34. The method according to claim 1, wherein the requestingdevice, consists of, comprises, is integrated with, or is part of, awearable device that is wearable on a person.
 35. The method accordingto claim 1, wherein the requesting device consists of, comprises, ispart of, or is integrated with, a client device.
 36. The methodaccording to claim 35, further comprising storing, operating, or using,by the requesting device or by one or more of the devices in the group,a client operating system.
 37. The method according to claim 36, whereinthe client operating system consists of, comprises, or is based on,Microsoft Windows 7, Microsoft Windows XP, Microsoft Windows 8,Microsoft Windows 8.1, Linux, Google Chrome OS, or any combinationthereof.
 38. The method according to claim 1, wherein the requestingdevice consists of, comprises, is part of, or is integrated with, aserver device.
 39. The method according to claim 1, wherein at least oneof, or each one of, the devices in the group, consists of, comprises, ispart of, or is integrated with, a server device.
 40. The methodaccording to claim 38, wherein the server device consists of, includes,is part of, or is integrated with, a proxy server, wherein the proxyserver consists of, includes, is part of, or is integrated with, an HTTPproxy server, a web-proxy server, a caching proxy, an open-sourcecaching proxy server, a cloud-based proxy server, an open proxy server,a forwarding proxy server, a reverse proxy server, a transparent proxyserver, a non-transparent proxy server, an anonymous proxy server, atranslation proxy server, a SOCKS proxy server, a CGI web proxy server,a suffix proxy server, an I2P anonymous proxy server, a DNS proxyserver, or any combination thereof.
 41. The method according to claim 1,further comprising operating, by the requesting device, a web browserapplication.
 42. The method according to claim 41, further comprisingidentifying, by the requesting device, the URL as part of the operatingof the web browser.
 43. The method according to claim 42, wherein theerror message is sent or returned to the web browser.
 44. The methodaccording to claim 42, further comprising, responsive to determiningthat the response is a proper response, using, by the web browser, theresponse.
 45. The method according to claim 41, wherein at least one ofthe steps is performed as part of a plug-in or an extension integratedwith the web browser.
 46. The method according to claim 45, wherein atleast one of the steps performed by the requesting device is integratedwith the web browser in a form of a plug-in or an extension, or whereinthe identifying of the HTTP request uses a plug-in or an extension tothe web browser.
 47. The method according to claim 46, wherein theintegration is by hooking to the web browser, wherein the integration isin a filter driver form, or wherein the web browser and the steps arecommunicating using an Inter-Process Communication (IPC).
 48. The methodaccording to claim 42, wherein the identifying of the HTTP request useshooking to the web browser, a filter driver form, or using anInter-Process Communication (IPC).
 49. The method according to claim 48,wherein the IPC is using a file sharing, a signal, a socket, a pipe, amessage queue, a shared memory, a semaphore, or memory mapped file, orwherein the IPC is using a clipboard, a Component Object Model (COM), adata copy, a DDE protocol, or mailslots.
 50. The method according toclaim 1, wherein the communication over the Internet between therequesting device and one or more of the selected devices is based on,uses, or is compatible with, Socket Secure (SOCKS) protocol orconnection.
 51. The method according to claim 50, wherein the SOCKSprotocol or connection is according to, based on, or is compatible with,SOCKS4, SOCKS4a, or SOCKS5, or wherein the SOCKS protocol or connectionis according to, based on, or is compatible with, IETF RFC 1928, IETFRFC 1929, IETF RFC 1961, or IETF RFC
 3089. 52. The method according toclaim 1, wherein the communication over the Internet between therequesting device and one or more of the selected devices is based on,uses, or is compatible with, WebSocket (ws) or WebSocket Secure (wss)protocol or connection.
 53. The method according to claim 1, furthercomprising storing, operating, or using, by the requesting device, a webbrowser.
 54. The method according to claim 53, wherein the web browserconsists of, comprises of, or is based on, Microsoft Internet Explorer,Google Chrome, Opera™, or Mozilla Firefox®.
 55. The method according toclaim 53, wherein the web browser consists of, comprises of, or is basedon, a mobile web browser.
 56. The method according to claim 55, whereinthe mobile web browser consists of, comprises of, or is based on,Safari, Opera Mini™, or Android web browser.