ABSTRACT
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
CHAPTER FOUR
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771.
- Related Works
- Design And Implementation Of An N.y.s.c Posting System (case Study (n.y.s.c) Enugu)
- Wireless Traffic Viewer Using J2me
- Design And Implementation Of Voice Organization (a Case Study Of Nokia)
- Designing Transaction Processing System For A Business Organization
- Design And Implementation Of A Computer Based Information System For The Projection Of Student’s Enrolment In Universities
- A Computerized Bank Savings Account, Processing System
- Design And Implementation Of A Computer Based Warehousing Information System (a Case Study Of Nigeria Ports Authority) (npa) Lagos
- Stack Ip: New Packet Marketing And Filtering Mechanics For Ddos And Ip Spoofing Defense
- Neural Network Based Character Pattern Identification System
- Design And Implementation Of A Computer Based Stock Monitoring System, (a Case Study Of Nigeria Stock Exchange Abuja)