ABSTRACT
The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. How do we ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).
TABLE OF CONTENT
Title page
Approval
Dedication
Acknowledgement
Table of content
Abstract
CHAPTER ONE
1.0 Introduction
1.1 Background of the Study
1.2 Objectives of the Study
1.3 Significance of the Study
1.4 Scope of the Study
1.5 Limitations of the Study
1.6 Definition of Terms
CHAPTER TWO
2.0 Review of Related Literature
2.1 Introduction
2.2 Remote-Access VPN
2.3 Site-to-Site VPN
2.4 VPN Analogy: Each LAN is an Island
2.5 Firewall-based
2.6 VPN Security
¬2.7 Security Review of IPSEC and SSL VPNs
2.8 IPSEC and IPSEC VPNs
2.9 SSL and SSL VPNs
2.10 Maturity and Acceptance
2.11 Cryptography
2.12 Client Desktop Integration
CHAPTER THREE
3.0 Network Analysis and Design
3.1 Introduction
3.2 Data Communication Problem Faced by NBTE
3.3 Project Scope
3.4 Objective of the VPN Design
3.5 The Proposed VPN
3.6 Conceptual Model of the Proposed Design
3.7 Physical Model of Proposed Design
3.8 Logical Model of the Proposed Design
CHAPTER FOUR
4.0 Network Design Implementation
4.1 Introduction
4.2 ISP & Connectivity Provision
4.3 Routers Interface IP Address Configurations
CHAPTER FIVE
5.0 Summary, Conclusion, and Recommendations
5.1 Summary
5.2 Conclusion
5.3 Recommendations
References
Appendix
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2016, 08). Design And Simulation Of Secure Virtual Private Network (vpn) Over An Open Network (internet) Infratructure (case Study Of National Board For Technical Education Nbte).. ProjectStoc.com. Retrieved 08, 2016, from https://projectstoc.com/read/7832/design-and-simulation-of-secure-virtual-private-network-vpn-over-an-open-network-internet-infratructure-case-study-of-national-board-for-technical-education-nbte-214
"Design And Simulation Of Secure Virtual Private Network (vpn) Over An Open Network (internet) Infratructure (case Study Of National Board For Technical Education Nbte)." ProjectStoc.com. 08 2016. 2016. 08 2016 <https://projectstoc.com/read/7832/design-and-simulation-of-secure-virtual-private-network-vpn-over-an-open-network-internet-infratructure-case-study-of-national-board-for-technical-education-nbte-214>.
"Design And Simulation Of Secure Virtual Private Network (vpn) Over An Open Network (internet) Infratructure (case Study Of National Board For Technical Education Nbte).." ProjectStoc.com. ProjectStoc.com, 08 2016. Web. 08 2016. <https://projectstoc.com/read/7832/design-and-simulation-of-secure-virtual-private-network-vpn-over-an-open-network-internet-infratructure-case-study-of-national-board-for-technical-education-nbte-214>.
"Design And Simulation Of Secure Virtual Private Network (vpn) Over An Open Network (internet) Infratructure (case Study Of National Board For Technical Education Nbte).." ProjectStoc.com. 08, 2016. Accessed 08, 2016. https://projectstoc.com/read/7832/design-and-simulation-of-secure-virtual-private-network-vpn-over-an-open-network-internet-infratructure-case-study-of-national-board-for-technical-education-nbte-214.
- Related Works
- Using The Computer System In Crime Investigation
- Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification
- Design And Implementation Of Computerized Banking Monitor Information System (a Case Study Of Central Bank Plc Enugu).
- Design And Implementation Of A Web-based Legal Practitioner Application System
- Reading And Writing Avi File Using Steganography
- Protocol Scrubbing Network Security Through Transparent Flow Modification (case Study Of Pressure World Cafe)
- Search-web Base Search Engine
- Design And Implementation Of A Case Filling System For A Drug Monitoring Agency (a Case Study Of Ndlea Area Office Enugu)
- Incremental Deployment Service Of Hop By Hop Multicast Routing Protocol (case Study Of Pressure World Cafe )
- Image Processing And Its Applications