Design And Simulation Of Secure Virtual Private Network (Vpn) Over An Open Network (Internet) Infratructure (Case Study Of National Board For Technical Education Nbte)
Design And Simulation Of Secure Virtual Private Network (Vpn) Over An Open Network (Internet) Infratructure (Case Study Of National Board For Technical Education Nbte)
The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. How do we ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).
TABLE OF CONTENT
Title page
Approval
Dedication
Acknowledgement
Table of content
Abstract
CHAPTER ONE
1.0Introduction
1.1Background of the Study
1.2Objectives of the Study
1.3Significance of the Study
1.4Scope of the Study
1.5Limitations of the Study
1.6Definition of Terms
CHAPTER TWO
2.0Review of Related Literature
2.1Introduction
2.2Remote-Access VPN
2.3Site-to-Site VPN
2.4VPN Analogy: Each LAN is an Island
2.5Firewall-based
2.6VPN Security
¬2.7 Security Review of IPSEC and SSL VPNs
2.8IPSEC and IPSEC VPNs
2.9SSL and SSL VPNs
2.10Maturity and Acceptance
2.11Cryptography
2.12Client Desktop Integration
CHAPTER THREE
3.0Network Analysis and Design
3.1Introduction
3.2Data Communication Problem Faced by NBTE
3.3Project Scope
3.4 Objective of the VPN Design
3.5The Proposed VPN
3.6Conceptual Model of the Proposed Design
3.7 Physical Model of Proposed Design
3.8 Logical Model of the Proposed Design
CHAPTER FOUR
4.0Network Design Implementation
4.1Introduction
4.2ISP & Connectivity Provision
4.3Routers Interface IP Address Configurations
CHAPTER FIVE
5.0Summary, Conclusion, and Recommendations
5.1Summary
5.2Conclusion
5.3Recommendations
References
Appendix
Design And Simulation Of Secure Virtual Private Network (Vpn) Over An Open Network (Internet) Infratructure (Case Study Of National Board For Technical Education Nbte)
ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
ABSTRACT This study automatically reveals the essence of education to cooperative society because education brings development and knowledge. Education brings about globalization. The Role of National Board for Technical Education which will help the cooperative societies to enhance in growth and development in the society. Questionnaires were... Continue Reading
ABSTRACT A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one... Continue Reading
CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless... Continue Reading
ABSTRACT The quality, efficiency and successes as well as effective productivity in any government parastatal is being determined by the quality of the workforce. In relations to this, a qualitative and effective productivity are being determined by the procedures in recruitment and selections of such workforce. If this be true, which it... Continue Reading
EMPOLYMENT PROCEDURE & ITS EFFECT ON PRODUCTIVITY IN GOVERNMENT PARASTATALS A CASE STUDY OF NATIONAL BOARD FOR TECHNICAL EDUCATION, KADUNA CHAPTER ONE GENERAL INTRODUCTION 1.1 BACKGROUND TO THE STUDY No organization can function without corporate objectives; organizational objectives are normally set for several years ahead. This has... Continue Reading