DESIGN AND SIMULATION OF SECURE VIRTUAL PRIVATE NETWORK (VPN) OVER AN OPEN NETWORK (INTERNET) INFRATRUCTURE (CASE STUDY OF NATIONAL BOARD FOR TECHNICAL EDUCATION NBTE)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1512
  • Access Fee: ₦5,000 ($14)
  • Pages: 58 Pages
  • Format: Microsoft Word
  • Views: 1K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT
The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. How do we ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).

TABLE OF CONTENT
Title page
Approval
Dedication
Acknowledgement
Table of content
Abstract

CHAPTER ONE
1.0 Introduction
1.1 Background of the Study
1.2 Objectives of the Study
1.3 Significance of the Study
1.4 Scope of the Study
1.5 Limitations of the Study
1.6 Definition of Terms

CHAPTER TWO
2.0 Review of Related Literature 
2.1 Introduction
2.2 Remote-Access VPN 
2.3 Site-to-Site VPN 
2.4 VPN Analogy: Each LAN is an Island
2.5 Firewall-based
2.6 VPN Security
¬2.7 Security Review of IPSEC and SSL VPNs
2.8 IPSEC and IPSEC VPNs
2.9 SSL and SSL VPNs
2.10 Maturity and Acceptance
2.11 Cryptography
2.12 Client Desktop Integration

CHAPTER THREE
3.0 Network Analysis and Design
3.1 Introduction
3.2 Data Communication Problem Faced by NBTE 
3.3 Project Scope 
3.4 Objective of the VPN Design 
3.5 The Proposed VPN 
3.6 Conceptual Model of the Proposed Design
3.7 Physical Model of Proposed Design
3.8 Logical Model of the Proposed Design

CHAPTER FOUR
4.0 Network Design Implementation 
4.1 Introduction
4.2 ISP & Connectivity Provision 
4.3 Routers Interface IP Address Configurations 

CHAPTER FIVE
5.0 Summary, Conclusion, and Recommendations
5.1 Summary
5.2 Conclusion
5.3 Recommendations
References
Appendix
DESIGN AND SIMULATION OF SECURE VIRTUAL PRIVATE NETWORK (VPN) OVER AN OPEN NETWORK (INTERNET) INFRATRUCTURE (CASE STUDY OF NATIONAL BOARD FOR TECHNICAL EDUCATION NBTE)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1512
  • Access Fee: ₦5,000 ($14)
  • Pages: 58 Pages
  • Format: Microsoft Word
  • Views: 1K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1512
    Fee ₦5,000 ($14)
    No of Pages 58 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT This study automatically reveals the essence of education to cooperative society because education brings development and knowledge. Education brings about globalization. The Role of National Board for Technical Education which will help the cooperative societies to enhance in growth and development in the society. Questionnaires were... Continue Reading
    ABSTRACT This study automatically reveals the essence of education to cooperative society because education brings development and knowledge.  Education brings about globalization.  The Role of National Board for Technical Education which will help the cooperative societies to enhance in growth and development in the society.  Questionnaires... Continue Reading
    ABSTRACT A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one... Continue Reading
    ABSTRACT A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one... Continue Reading
    ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    Call Us
    whatsappWhatsApp Us