ABSTRACT
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
CHAPTER FOUR
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771.
- Related Works
- Design And Implementation Of A Computerized Bill Of Quantity System For Quantity Surveyors (a Case Study Of Okolo, Okolo & Co. Enugu)
- Design And Implementation Of A Computerized Payroll System For A Government Paraslatal
- Watermark Based Digital Right Management
- Design Of Student Identity Card System
- Design And Complementation Of A Computer-based Security Information System A Case Study Of Security Departmetn I.m.t Enugu
- Design And Implementation Of Computerized Medical Duties Scheduling System. (a Case Study Of University Of Nigeria Teaching Hospital)
- Design And Implementation Of Online Voting System In Sug Elections
- Design And Implementation Of A Virtual Library System
- Design And Implementation Of A Computer Software For The Solution Of Linear Equation
- Design And Implementation Of A Computerized Sales Accounting System (a Case Study Of Mr Biggs, Okpara Avenue Enugu