+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

A VIRTUAL PRIVATE NETWORK USING JAVA 9 (A CASE STUDY OF UBA ENUGU)

  • Type:Project
  • Pages:57
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)
ABSTRACT
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
 
TABLE OF CONTENTS
TITLE PAGE                                   
CERTIFICATION                               
APPROVAL PAGE                                
DEDICATION                                   
ACKNOWLEDGEMENT                           
ABSTRACT                                   
TABLE OF CONTENTS     
                      
CHAPTER ONE
1.0    INTRODUCTION
1.1    STATEMENT OF THE PROBLEM                   
1.2    PURPOSE OF THE STUDY                       
1.3    AIMS AND OBJECTIVES                       
1.4    SCOPE OF STUDY                           
1.5    DEFINITION OF TERMS    
                   
CHAPTER TWO
2.0    LITERATURE REVIEW

CHAPTER THREE
3.0    METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.           

CHAPTER FOUR
4.0    FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER

CHAPTER FIVE
5.0    SUMMARY, RECOMMENDATION AND CONCLUSION

REFERENCES               

A VIRTUAL PRIVATE NETWORK USING JAVA 9 (A CASE STUDY OF UBA ENUGU)

Share This

Details

Type Project
Department Computer Science
Project ID CPU1314
Price ₦3,000 ($9)
No of Pages 57 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1314
    Price ₦3,000 ($9)
    No of Pages 57 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT We implemented a distributed, peer-to-peer file system in Java using the Chord protocol for efficient location of files stored across a network. Chord is a distributed key lookup technique that scales logarithmically with an increase in the number of storage nodes. Initially, we discovered problems with the Chord algorithms, and... Continue Reading
    ABSTRACT Several network systems are built to communicate with one another as well as made available through service-oriented architectures. In this project, the client server architecture is used to develop a chat application. Firstly a chat application is created for both Client and Server which is based on Transmission Control Protocol (TCP)... Continue Reading
    ABSTRACT Several network systems are built to communicate with one another as well as made available through service-oriented architectures. In this project, the client server architecture is used to develop a chat application. Firstly a chat application is created for both Client and Server which is based on Transmission Control Protocol (TCP)... Continue Reading
    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    ABSTRACT The term virtual library is diffuse enough to be applied to a wide range of collections and organizations, but to be considered a virtual library, a virtual collection of information must be managed by and made accessible to a community of users. Thus, some web sites can be considered virtual libraries, but far from all. Many of the best... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    ABSTRACT A network analysis is an instrument that measures the network parameters of electrical networks. Today, network analysis commonly measure s–parameters because reflection and transmission of electrical networks are easy to measure at high frequencies, but there are other network parameter sets such as y-parameters, z-parameters, and... Continue Reading