Application of Virtual Private Network (VPN) In Electricity Industry : Current School News

Application of Virtual Private Network (VPN) In Electricity Industry.

ADS! Download JAMB CBT Software Now for FREE!

Application of Virtual Private Network (VPN) In Electricity Industry.

ABSTRACT

The project describe the application of VIRTUAL PRIVATE NETWORK in electricity industry case study Kano Electricity Distribution Company, While this chapter provides the introduction, aim and objective.

Chapter 2’ discuss about the development and emergence of the technology (Virtual Private Network), its Cost and the market trends with the changes of time, the Virtual Private Network Infrastructure and the Security it provides to safe guard the company data or information.

Chapter 3 will describe the approach used for the findings and the reason for choosing the type of approach. Chapter 4 aims to supplement previous chapters by a detailed questionnaire, which is designed to target Kano Electricity Distribution Company.

Chapter 5 will provide an analysis of the practical information i.e. findings of the research from chapter 4 and the primary research done in the previous chapters.

A list of recommendation will be suggested after the detailed analysis. Chapter 6 will give a brief summary on the result and the recommendations.

TABLE OF CONTENTS

TITLE PAGE. i

DECLARATION. ii

CERTIFICATION. iii

DEDICATION. iv

ACKNOWLEDGEMENT. v

ABTRACT. x

CHAPTER ONE

OVERVIEW OF THE PROJECT

1.0    Introduction. 1

1.1    Background of the Study. 1

1.2    Concept of the Internet 3

1.3    Reason for Choosing the Topic. 4

1.4    Aim and Objective. 5

CHAPTER TWO

LITERATURE REVIEW

2.0    Virtual Private Network (VPN) & Kano Electricity Distribution Company (Kedco) 7

2.1    The Emergence of VPN. 7

2.2    What Is VPN?. 8

2.3    The Need to Develop VPN. 9

2.4    Types of VPN. 10

2.4.1    Layer 2 VPN’s. 10

2.4.2    Layer 3 VPN’s. 10

2.5    VPN Architecture. 11

2.5.1    Site -to-Site Intranet VPNs. 11

2.5.2 Remote Access VPNs. 13

2.5.3 Extranet VPNs. 13

2.6    Tunneling. 14

2.7    Tunneling Protocols. 15

2.8    VPN Firewall and Gateways. 16

2.9    Investigation of Broader Context. 18

2.9.1    VPN’S and KEDCO In View. 18

2.9.2    Application of VPN In Kedco. 19

2.9.3    Site-To-Site VPN Via Interswitch. 19

2.9.4    Remote Access VPN in KEDCO. 20

2.10  Industrial Use OF VPN. 20

2.10.1   VPN Market Trends. 20

2.10.2   Products Based On VPN. 21

2.10.3   Interoperability. 22

2.11  Communication Approach and Network. 22

2.11.1   Internal communication. 22

2.11.2   Selected external communication. 23

2.11.3   Communication with public and external audiences. 23

2.12  Outlining Electricity Industry Requirements. 23

2.13  Overview of  VPN For Kedco. 25

CHAPTER THREE

RESEARCH METHODOLOGY

3.0    Introduction. 27

3.1    Research Approach. 29

3.1.1       Deductive Research Approach. 29

3.1.2    Inductive Research Approach. 29

3.1.3    Implemented Research Approach. 30

3.2    Research Strategy. 30

3.2.1    Quantitative Research. 30

3.2.3    The Questionnaire. 30

3.2.3    Advantages and Drawbacks (Questionnaire) 31

3.2.4    Qualitative research. 31

3.2.5    Interview. 32

3.2.6    Target audience. 32

3.2.7    Advantages and drawbacks (Interview) 32

3.2.8    Ethical considerations. 33

CHAPTER FOUR

DATA COLLECTION AND ANALYSIS

4.0    Questionnaire and Response. 35

4.1    Questionnaire Design. 35

4.1    Interview and Response. 36

4.2    Data Analysis And Findings. 36

4.2.1 Data collected. 37

4.3    Participant / Audience Type. 38

4.4    Research Analysis. 38

4.4.1    Benefits of VPN: 39

4.4.2    Limitation of VPN. 40

4.4.3    Innovative Solutions for Electricity Industries. 41

4.4.4    Drawbacks in Kano Electricity Distribution Company (KEDCO) 42

4.4.5    Overcoming the drawbacks. 44

4.5    Critical Success Factor 46

4.6    Conclusion of Project 47

4.7    Recommendation & Suggestions. 48

CHAPTER FIVE. 50

CRITICAL EVALUATION. 50

5.0    Critical Evaluation. 50

5.1    Research Approach. 50

5.2    Time Management 51

5.3    Problems Faced. 52

5.3.1    Project dimensions. 52

5.3.2    Critical phases in research. 52

5.3.3    Report formation. 53

5.3.4    Personal Issues. 54

5.4    Learning Outcome. 54

5.5    What Could Have Been Achieved With More Time?. 56

5.6    Project Deliverables. 56

5.6.1    Usefulness of research. 56

5.7    Limitation /Drawbacks. 57

5.8       Resources. 59

5.9    Future Work. 60

5.10  Short Summary and Conclusion. 60

REFERENCES. 61

APPENDIX I 63

QUESTIONNAIRE. 64

INTRODUCTION

The business of electric power distribution in Nigeria began in 1896 under the Public Works Department (PWD) by the colonial government. Electricity Corporation of Nigeria (ECN) was then established in 1950/51 later merge with Niger Dams Authority (NDA established in 1962) to form Nigerian Electric Power Authority (NEPA) in 1972.

Characterized by total industry inefficiency, such as, inadequate supply and low revenue generation, the Federal Government unbundled the monopoly of NEPA and signed into law the Electricity Sector Reform Act in 2005.

The then NEPA metamorphosed in to Power Holding Company of Nigeria (PHCN) which was unbundled vertically in to Generation, Transmission and Distribution and further horizontally in to eighteen different Successor Companies.

Kano Electricity Distribution Company (KEDCO) which is mandated to distribute electricity in Jigawa, Kano and Katsina States is one of the Eleven Distribution Companies (Disco) out of the eighteen successor companies.

REFERENCES

AHUJA, V.,(1998). VPNs by the Numbers: Securing the Savings, Data Communications, Vol.27, No.12.

BERINATO, S.,(1998). VPN Prices Diving, PC week, Vol.15, No.31.

BIRD, T., (1998), Building VPNs: The Ten Point Plan, Data Communications, Vol.27, No.9.

BURNES, G., and STROLLER, G.,(1999). Virtual Private Networking: The Next Revolution in Corporate productivity, Shiva Corporation.

CHOU, W. (2005). Inside SSL: The secure sockets layer protocol. IT professional.

DERFLER Jr Frank, and FREED, Leis (2005). How networks work. 7th ed. Indianapolis: QUE.

Dumas, B. M. and Schwartz, M. (2009).Principles of computer networks and communications. Upper Saddle River, NJ: Pearson/Prentice Hall.

GILL, J. and JOHNSON, P. (2002).Research Methods for Managers, 3 ed., London, California and New Delhi: Sage.

HELD, Gilbert (2004).Virtual private networking: A construction, operation and utilization guide. USA: John Wiley and Sons, Ltd.

HELD, Gilbert, (1998), Internetworking LANS and WANS: Concepts, Techniques and Methods,, 2nd ed., John Wiley and Sons.

HELD, Gilbert. (1997). Virtual LANS: Construction, Implementation and Management, John Wiley and Sons.

MAIWALD, Eric (2001). Network security :A beginner’s guide. New York; London, Osborne/McGraw-Hill. Network professional’s library.

MAIWALD, Eric (2003). Fundamentals of network security. New York; London, McGraw-Hill/Osborne. Information security series.

MASON Andrew (2004). CCSP Self-Study: Cisco Secure Virtual Private Networks(CSVPN). 2nd ed. Indianapolis: Cisco Press.

SAUNDERS, Mark. et al. (2003).3rd ed., Research Methods for Business Students, England, Pearson Education Limited.

SHELLY, Gary.B. B., et al. (2010). Discovering the Internet: complete concepts and technologies. 3rd ed. Boston: Course Technologies, Cengage Learning.

YAUN, Ruixi  and STRAYER, Timothy (2001). Virtual Private Networks Technologies and Solutions.US: Addison-Wesley.

CSN Team.

Join Over 5 Million Subscribers Today!


=> FOLLOW US ON INSTAGRAM | FACEBOOK & TWITTER FOR LATEST UPDATE

Tags:

Comments are closed.

%d bloggers like this: