![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Three Layer End-To-End Data Transaction Using Firewall
Subscribe/Renew Journal
Firewall is the Specified Version of a router. It allows only valid network that is authorized. All the data packets are analy1zed while entry and leave the network are decided by the firewall to allow or not. When some virus is injected by the attacker such has valid authorized IP address entering through the firewall in that case sequence checker is used to check packet sequence address based on the sequence order. Based on that order only packets are sent to the destination, the sequence checker should be placed on the second layer. For data transmission the Data should be in encrypted manner, the encryption will occur before third layer. Here data can travel in those three layer and reaches the destination in well secured manner.
Keywords
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 305
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 0