Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Three Layer End-To-End Data Transaction Using Firewall


     

   Subscribe/Renew Journal


Firewall is the Specified Version of a router. It allows only valid network that is authorized. All the data packets are analy1zed while entry and leave the network are decided by the firewall to allow or not. When some virus is injected by the attacker such has valid authorized IP address entering through the firewall in that case sequence checker is used to check packet sequence address based on the sequence order. Based on that order only packets are sent to the destination, the sequence checker should be placed on the second layer. For data transmission the Data should be in encrypted manner, the encryption will occur before third layer. Here data can travel in those three layer and reaches the destination in well secured manner.


Keywords

Data Transmission, Security, Network Traffic
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 190

PDF Views: 0




  • Three Layer End-To-End Data Transaction Using Firewall

Abstract Views: 190  |  PDF Views: 0

Authors

Abstract


Firewall is the Specified Version of a router. It allows only valid network that is authorized. All the data packets are analy1zed while entry and leave the network are decided by the firewall to allow or not. When some virus is injected by the attacker such has valid authorized IP address entering through the firewall in that case sequence checker is used to check packet sequence address based on the sequence order. Based on that order only packets are sent to the destination, the sequence checker should be placed on the second layer. For data transmission the Data should be in encrypted manner, the encryption will occur before third layer. Here data can travel in those three layer and reaches the destination in well secured manner.


Keywords


Data Transmission, Security, Network Traffic