All Title Author
Keywords Abstract


Algorithm Re-Ordering: a Solution for Abating Internet Bypass

DOI: 10.5923/j.algorithms.20120101.01

Keywords: Algorithm, Flowchart, Policy, Internet, Data Services

Full-Text   Cite this paper   Add to My Lib

Abstract:

The use of mobile data services as a means of communication came into existence through the introduction of 3rd Generation (3G) Technology, it is expected that this technology will continue to increase opportunities for improved revenues and enable new services & tariff generation. Research have shown that the use of third party application like Tor browser, Indian proxy, Your-freedom (http://www.your-freedom.net), Privoxy etc are used to bypass the data services offered by the network providers. This is carried out by leveraging on virtual private network (VPN) technology, distributed network of relays and available free ports. This has limited the revenue derived by the providers in a country where such proliferation is thriving. In Nigeria for example Government on its part have taken some steps to finding solutions to end this menace and related increasing cyber crime activities, but the challenge still remain with us. This work thus postulates an innovative way of abating this activity which has lead to huge loss of revenue in the sector. The approach is a theoretical method in solving the industry-related problem. It narrowed down the problem of the current algorithm to improper algorithm order and thereby proposing an appropriate model to reducing the menace.

Full-Text

comments powered by Disqus