Preloader

Office Address

74B Obafemi Awolowo Avenue Isale Igbehin Abeokuta Ogun State

Phone Number

+234 916 579 9994
+234 916 579 9994

Email Address

info@globalascents.com
globalascents@gmail.com

SIMULATION OF SECURE VIRTUAL PRIVATE NETWORK (VPN) OVER AN OPEN NETWORK (INTERNET) INFRATRUCTURE

₦3,000.00 ₦5,000.00

The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. How do we ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).

In stock Categories : Projects Materials

Title page

Approval

Dedication

Acknowledgement

Table of content

Abstract

 

CHAPTER ONE

  1. Introduction

1.1  Background of the Study

1.2  Objectives of the Study

1.3  Significance of the Study

1.4  Scope of the Study

1.5  Limitations of the Study

1.6  Definition of Terms

 

CHAPTER TWO

  1. Review of Related Literature 

2.1  Introduction

2.2  Remote-Access VPN

2.3  Site-to-Site VPN

2.4  VPN Analogy: Each LAN is an Island

2.5  Firewall-based

2.6  VPN Security

­2.7   Security Review of IPSEC and SSL VPNs

2.8  IPSEC and IPSEC VPNs

2.9  SSL and SSL VPNs

2.10 Maturity and Acceptance

2.11 Cryptography

2.12 Client Desktop Integration

 

CHAPTER THREE

  1. Network Analysis and Design

    1. Introduction

    2. Data Communication Problem Faced by NBTE 

3.3  Project Scope 

3.4   Objective of the VPN Design 

3.5  The Proposed VPN 

3.6  Conceptual Model of the Proposed Design

3.7  Physical Model of Proposed Design

3.8  Logical Model of the Proposed Design

 

CHAPTER FOUR

  1. Network Design Implementation 

4.1  Introduction

4.2  ISP & Connectivity Provision 

4.3  Routers Interface IP Address Configurations 

 

CHAPTER FIVE

  1. Summary, Conclusion, and Recommendations

5.1  Summary

5.2  Conclusion

5.3  Recommendations

       References

       Appendix 

Add your review

Your email address will not be published. Required fields are marked *

Please login to write review!

Upload photos

Looks like there are no reviews yet.

Request A Call Back

Ever find yourself staring at your computer screen a good consulting slogan to come to mind? Oftentimes.

shape