Please wait...

Design and Implementation of Virtual Private Network- Final Year Project Report (CSC-404) 

Resource tools

File information File size Options

Original PDF File

187 KB Request

Screen

563 × 800 pixels (0.45 MP)

4.8 cm × 6.8 cm @ 300 PPI

90 KB Request
Resource details

Resource ID

76

Access

Open

Contributed by

Admin User

Author/Contributor

Mallika Sharma, Jenith Shrestha, Jeetendra Manandhar (Supervisor)

Publisher/Credit

Kathmandu: St. Xavier's College

Date

October 2013

Document type

Thesis or project

Department

Computer science

Course

BscCSIT, CSC-404: Project work

Level

Bachelor

Batch

2009

Abstract

This report is about the project of final year. It includes details about the designing
and the implementation of VPN. Since the last projects were to show the overall
knowledge that we have gained during the course period. This project will provide an
introduction, research, theory, analysis, solutions & real time implementation and
idy of Virtual Private Network for Nepal Electricity Authority. It also will provide
tructure of content of this document. It consists, of various concepts, theories and
main terminology to understand and implement a Virtual Private Network.
Virtual private network (VPN) is a private data network that makes use of the
lie telecommunication infrastructure, maintaining privacy through die use of a
leling protocol and security procedures. A virtual private network can be
contrasted with a system of owned or leased lines that can only be used by one
company. The main purpose of a VPN is to give the company the same capabilities
as private leased lines at much lower cost by using the shared public Infrastructure.
Phone companies have provided private shared resources for voice messages for over
a decade. A virtual private network makes it possible to have the same protected
sharing of public resources for data.
The aim is to explain the problems, to identify standardization gaps and to provide
solutions whenever possible. It provides a description and proposes solutions related
to the following items:
• Identification and authentication of the VPN components;
• Identification and authentication of remote (e.g. mobile) users;
• Public Key infrastructure for VPN components;
• Security and key distribution of multicast within VPN;
• Inter-working of IPSec with tunneling protocols.
The Virtual Private Network (VPN) has emerged as one of most promising services
for network providers. However the widespread deployment of IP VPNs has been
delayed by the lack of interoperable implementations and confusion over the high
number of solutions that are described by the term VPN.

Search for similar resources

Remove