ABSTRACT
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
CHAPTER FOUR
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771.
- Related Works
- Design And Implementation Of A Computerized Erosion Control Information System Case Study Of Ministry Of Works Enugu)
- Design And Implementation Of Computerised Case Filling System (a Case Study Of Enugu High Court Enugu.)
- Design And Implementation Of On Line Cash Receipt Generating System For A Supermarket. (case Study Of Roban Stores Ltd)
- Xtc: An Active Virtual Queue (avq) Algorithm For Active Queue Management
- Design And Implemention Of A Computerized Hotel Front Office Management System A Case Study Of Hotel Presidental Enugu.
- Design And Implementation Of Distributed System Simulator For Publish-subscribe Model
- Optimal Cryptographic Techniques
- Design And Implementation Of Computerized Hospital Space Management Information System
- Analogue To Digital Conversion System Theory And Application
- Electronic Payment System Security
