ABSTRACT
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
A Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. The network design will be simulated using a packet tracer prototype.
VIRTUAL PRIVATE NETWORK USING JAVA 9 technologies have myriad protocols, terminologies and marketing influences that define them. The technologies can differ in: The protocols they use to tunnel the traffic ; The tunnel's termination point and The levels of security provided.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF STUDY
1.5 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY OF FACT FINDING AND DETAILED DISCUSSION ON THE SUBJECT MATTER.
CHAPTER FOUR
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
4.0 FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER
CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771>.
"A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2676/a-virtual-private-network-using-java-9-a-case-study-of-uba-enugu-2771.
- Related Works
- Design And Implementation Of Project Tracking And Its Portfolio Management System
- Application Of Fuzzy Logic In An Elevator
- Understanding The File Allocation Table [fat] In Windows
- Optical Character Recognition System
- Neural Networks For Handwriting Detection System Using Brain Net
- Design And Implementation Of An On-line Entrance Examination System. (a Case Study Of Enugu State Poset –primary Education Board )
- Concept Of Cellular Internet Protocol
- Design And Implementation Of A Computerised Information System For A Small Business Enterprise (case Study Of Texaco Filling Station)
- Design And Implementation Of Computer Aided Charting And Graphic System For Statistical Presentation
- Design And Implementation Of Network Security (a Case Study Of Uba Enugu)