ABSTRACT
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
CHAPTER FOUR
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771.
- Related Works
- How To Improve Security Electronic Voting
- Design And Implementation Of Webified Internet Relay Chat (case Study Of Dhl Enugu)
- Text To Speech Technology
- Real Time Application
- Prospects Of Cloud Computing In Nigeria
- Design And Simulation Of Computer Piagonistic System (a Case Study Of Ibm Pg)
- Design And Implementation Of A Microprocessor- Based Simulation Industrial Arm
- Design And Implementation Of Online Job Consultancy Services (case Study Of Careers Nigeria)
- Design And Implementation Of Web Based Recruitment Portal (a Case Study Of Nigeria Civil Service Commission Enugu)
- Protocol Scrubbing Network Security Through Transparent Flow Modification (case Study Of Pressure World Cafe)