TOP DOWN NETWORK DESIGN FOR DATA INTERGRATION A CASE STUDY OF KOGI STATE POLYTECHNIC LOKOJA CAMPUS

0
24

ABSTRACT

The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. How do we ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).

TABLE OF CONTENT

Title page

Approval

Dedication

Acknowledgement

Table of content

Abstract

 

CHAPTER ONE

  • Introduction

1.1  Background of the Study

1.2  Objectives of the Study

1.3  Significance of the Study

1.4  Scope of the Study

1.5  Limitations of the Study

1.6  Definition of Terms

 

CHAPTER TWO

  • Review of Related Literature

2.1  Introduction

2.2  Remote-Access VPN

2.3  Site-to-Site VPN

2.4  VPN Analogy: Each LAN is an Island

2.5  Firewall-based

2.6  VPN Security

­2.7  Security Review of IPSEC and SSL VPNs

2.8  IPSEC and IPSEC VPNs

2.9  SSL and SSL VPNs

2.10 Maturity and Acceptance

2.11 Cryptography

2.12 Client Desktop Integration

 

CHAPTER THREE

  • Network Analysis and Design
    • Introduction
    • Data Communication Problem Faced by NBTE

3.3  Project Scope

3.4  Objective of the VPN Design

3.5  The Proposed VPN

3.6  Conceptual Model of the Proposed Design

3.7 Physical Model of Proposed Design

3.8 Logical Model of the Proposed Design

 

CHAPTER FOUR

  • Network Design Implementation

4.1  Introduction

4.2  ISP & Connectivity Provision

4.3  Routers Interface IP Address Configurations

 

CHAPTER FIVE

  • Summary, Conclusion, and Recommendations

5.1  Summary

5.2  Conclusion

5.3  Recommendations

References

Appendix

 

 

 

CHAPTER ONE

1.0  Introduction

This is the information age. We no longer have to commute physically from one place to another to complete a set of tasks or to gather pieces of information. Everything can be done virtually with a mouse click on an online host. In a way, everything we do in our daily lives is related in one way or another to information access. This has made information sharing almost mandatory and indispensable. These days, a customer can retrieve and compare products or services information promptly online, anytime, anywhere. For competitive reasons, organizations that provide this information have to make the information readily available online.

In other words, the concept of a shared infrastructure is undisputedly important. A shared infrastructure is none other than a public network. At present, the biggest public network is the Internet, which has over 100,000 routes and is still growing rapidly. As more and more companies link up their corporate network to the Internet, we are faced with an inevitable issue—information security. Sharing information on a public network also implies giving access and visibility to everyone who wants to retrieve these data. What if the person who has the accessibility and visibility to the information decides to create havoc? Some of the general threat types that are posed by malicious hackers include eavesdropping, denial of service, unauthorized access, data manipulation, masquerade, session replay, and session hijacking.

VPNs are networks deployed on a public network infrastructure that utilize the same security, management, and quality of service policies that are applied in a private network. VPNs provide an alternative to building a private network for site-to-site communication over a public network or the Internet. Because they operate across a shared infrastructure (Internet) rather than a private network, companies can cost effectively extend the corporate WAN to telecommuters, mobile users, and remote offices as well as to new constituencies, such as customers, suppliers, and business partners.

1.1  Background of the Study

The Top Down Network Design For Data Intergration” is so design to help security information system especially for the management of the present porous security system in the campuses. Presently the polytechnic is not armed with modern data processing and security information system. To help wake it up from its stagnation, my solution is to transform the existing age-long manual information system and embrace latest technology that will avert loss of information, insecurity and delay in data processing.. They do not have any secure and reliable communications infrastructure that connects their offices across the country. WANs connect customer sites via dedicated point-to-point links. This means that multiple independent circuits have to terminate at the corporate network egress, making the deployment non-scalable and difficult to maintain.

VPNs extend the classic WAN by replacing the physical point-to-point links with logical point-to-point links sharing a common infrastructure, allowing all the traffic to be aggregated into a single physical connection. This scenario results in potential bandwidth and cost savings at the network egress. Because customers no longer need to maintain a private network, and because a VPN itself is cheaper to own and offers significant cost savings over private WANs, operation costs are reduced.

VPNs provide an alternative WAN infrastructure that can replace or augment commercial private networks that use leased-line or frame relay/ATM networks. There are two ways business customers can implement and manage their VPNs. They can either roll out their own VPNs and manage them internally, or outsource the VPN management to their service providers for a total VPN package that is tailored to their particular business needs. Last but not least, from the service providers’ perspective, VPNs are a fundamental building block in delivering new value-added services that benefit their business customers as well as themselves. In this instance, the service providers deploy the VPNs for their customers, and the customers need only subscribe to the service providers for the VPN services.

GET THE COMPLETE PROJECT MATERIAL HERE

 

REQUEST FOR NEW PROJECT TOPICSREQUEST NEW PROJECT TOPICS HERE

Welcome to Project, Thesis and Dissertation Services. We are here to help you produce a high-quality and properly documented project and thesis. We ensure that every project meets Nigerian University’s regulations for formatting and style.

If you cannot find your proposed project topic on our project database/library or your project supervisor changed your topic and case study, kindly click the request new project topics button below and fill the short form and our project expert will get in touch with you.

REQUEST NEW PROJECT TOPICS HERE