Ec Ca
Ec Ca
The internet as a Network Infrastructure, Network Security and Firewalls – Client Server Network Security
– Firewalls and Network Security – Data and Message Security – Encrypted Documents and Electronic
Mail.
Electronic Commerce and World Wide Web, Consumer Oriented E-Commerce, Electronic Payment
Systems
Electronic Data Interchange (EDI), EDI application in business, EDI and E- commerce – EDI
implementation. Intra-organizational Electronic Commerce – Supply Chain Management.
Corporate Digital Library – Advertising and marketing on the Internet – E-Commerce Catalogs or
Directories- On demand Education and Digital Copyright – Applets, Browsers & Software Agents.
Unit I
E-Commerce is defined as those commercial transactions carried out using the Electronic means, in which
goods Or services are delivered either electronically or in their Tangible or intangible form.
Examples of E-Commerce:
E-Commerce
E-Commerce refers to The online transactions (i.e.) buying and selling Of goods and/or Services Over the
internet.
1. Public policy to govern issues such as universal access,privacy and information pricing.
2. Technical standards to dictate the nature of information publishing ,user interfaces and transport in the
interest of compatibility across the entire network Any successful e-commerce will require the I-way
infrastructure in the same way that regular commerce needs interstate highway network to carry goods from
one point to another I-way will be a mesh of interconnected data highways of many forms
Telephone,wires,cable TV wire Radio-based wireless-cellular & satellite
Movies=video + audio
In the electronic ‗highway system‘ multimedia content is stores in the for of electronic documents
These are often digitized
On the I-way messaging software fulfills the role, in any no. of forms: email, EDI, or point-to-point file
transfersEncryption & authentication methods to ensure security
Electronic payment schemes developed to handle complex transactionsThese logistics issues are difficult
in long-established transportation.
1.4. Comparison of Traditional commerce and E-commerce
1.5. ANATOMY OF E-COMMERCE APPLICATIONS
• Multimedia content can be considered both fuel and traffic for electronic commerce Applications.
• The technical definition of multimedia is the use of digital data in more than one format, Such as the
combination of text, audio, video, images, graphics, numerical data, Holograms, and animations in a
computer file/document.
• Multimedia is associated with Hardware components in different networks.
• The Accessing of multimedia content depends on the hardware capabilities of the Customer.
• E-Commerce requires robust servers to store and distribute large amounts of digital content To consumers.
• These Multimedia storage servers are large information warehouses capable of handling Various content,
ranging from books, newspapers, advertisement catalogs, movies, games, & X-ray images.
• These servers, deriving their name because they serve information upon request, must Handle large-scale
distribution, guarantee security, & complete reliability
• The server manages application tasks, storage & security & provides scalability-ability to Add more
clients and client devices (like Personal digital assistants to Pc’s. See in fig.
• The internal processes involved in the storage, retrieval & management of multimedia Data objects are
integral to e-commerce applications.
• A multimedia server is a hardware & software combination that converts raw data into Usable information
& then dishes out.
• It captures, processes, manages, & delivers text, images, audio & video.
• It must do to handle thousands of simultaneous users.
• Include high-end symmetric multiprocessors, clustered architecture, and massive parallel Systems.
3. Video Servers & E-Commerce
The electronic commerce applications related to digital video will include
• Electronic commerce needs a network infrastructure to transport the content-text, audio, video, graphics
etc.
• The network infrastructure that provides such a data transmission facility is called I-Way or information
super highway.
• Thus, information super highways can be defined as the high capacity, electronic and interactive pipeline
to the consumer or business premise that is capable of supporting large number of ecommerce applications
simultaneously.
• It is called interactive because it provides two-way communication between users and service providers
or between one user and another user.
• It is called high-capacity electronic pipeline because it must provide broadband link.
• Historically, the voice and data networks have evolved separately, with voice networks relying on circuit
switching and data networks using packet switching techniques.
• Thus, a business user requiring voice, data, and video conferencing services often had to use three separate
networks- a voice network, a data network, and a videoconferencing network.
• I-way provides integration solution to the shortcoming of the need to have separate network for voice,
data and video services respectively.
• Nowadays information super high way is emerged as basic network infrastructure for all ecommerce
activities due to its capability of providing integrated text, graphics, audio, and video services.
Switch: Because the hub is something of a “drunk,” it can be an inefficient (think about the excess
traffic created) and unsecure device. Imagine if you wish to send sensitive credit card information
over the network – do you really want every node to receive your electronic signal? To alleviate
this, the switch was developed. A switch operates at the Data Link layer of the OSI model. It uses
the MAC sub-layer to forward the relevant frames of information only to the intended recipient.
Messages can still be broadcast, but this is only an option and not the normal condition.
Bridge: A bridge also operates at the Data Link layer (aka Layer 2) and is used to connect two
(similar or dissimilar) physical network segments together, forming a larger inter-network. It can
forward packets or reject them based on their destination (MAC) address. Note: The connected
network segments must have same network ID.
Router: The router operates at the Network layer of the OSI Model and is used to forward packets
across network segments to reach a certain destination address. Do not be confused between a
router and a bridge – a bridge simply forwards packets or frames based on their destination address
from one connected network segment to another. A router can determine where a packet should
be sent to given its final destination (IP address). Usually, routers forward packets to other routers,
but sometimes routers also forward to other pieces of network equipment. A router is usually used
to connect a home computer to an “always-on” Internet connection through the home network.
Gateway: A gateway is any device that serves to interface with other networks using dissimilar
protocols . For example, a gateway might interface between a home network and the Internet or
between a NetBIOS network and an IPX/SPX network. A gateway operates in any of the seven
OSI layers.
WAP: A Wireless Access Point is a device that allows wireless devices to access and to
communicate with the network. It acts as a bridge between the wired, traditional network and other
wireless devices. Alternatively, it can act as a bridge between wireless devices and another, linked
WAP. It typically operates in the Network layer of the OSI model as a sort of router/bridge/switch
combination.
UNIT II
▪Computer Network : Networks are built with a mix of computer hardware and computer
software.
▪A network connects computers, but can also connect other devices such as shared printers,
removable media drives, scanners, and other equipment.
▪Networks enable people to share resources,
▪ Resources include printers, hard disks, and applications. Can greatly reduce the costs of
providing these resources to each person in a company.
Internet as a Network Infrastructure Computer Network Concept
▪ Several terms are used to describe network devices such as hosts, nodes, workstations, peers,
servers, and clients.
Network host
▪ A host (also known as "network host") is a computer or other device that communicates with
others on a network.
▪ Hosts on a network include clients and servers -- that send or receive data, services or
applications.
▪ Hosts typically do not include intermediary network devices like switches and routers, which
are instead often categorized as nodes.
Node
▪ A node is also a broader term that includes anything connected to a network, while a host
requires an IP address. In other words, all hosts are nodes, but network nodes are not hosts unless
they require an IP address to function. Internet as a Network Infrastructure Computer Network
Concept
▪ A typical network like the one in figure alongside has three basic hardware components:
▪ one or more servers or host computers (including microcomputers and mainframes), clients
(PCs), and a circuit or network system, which is the path over which they communicate.
Internet as a Network Infrastructure Computer Network Concept:
Network software
● In addition, servers and clients also need special-purpose network software that enables them
to communicate.
▪ The server stores data and software that the clients can access.
▪ Organization can have several servers working together over the network with client computers
to support the business application.
▪ The client is the input3output hardware device at the user9s end of a communication circuit.
▪ It provides users with access to the network, the data and software on the server, and other
shared resources.
▪ In fact, now a network does not need a computer designated specifically as a server.
▪ Most modern client computers are designed to support the dual roles of both client and server,
sharing resources to the network and, at the same time, accessing resources from the network.
Circuit
▪ The circuit (cable plant or transmission media) is the pathway through which the data or
information travels.
▪ Traditional wired networks typically use copper wire, although fiber-optic cable and wireless
transmission hybrid systems are common.
▪ There are also devices in the circuit that perform special functions such as hubs, switches,
routers, bridges, and gateways.. Internet as a Network Infrastructure Network Device Roles
▪ Figure alongside shows a small network that has four client PCs and three specialized server
PCs connected by a hub or switch and cables that make up the circuit.
▪ In this network, messages move through the hub to and from the computers. All computers
share the same circuit and take turns sending messages I 3 Way is defined as universal affordable
access to high performance network capable of carrying billions of bits per second in the context
of e-commerce.
INTRODUCTION
Network Security protects your network and data from breaches, intrusions and other threats.
This is a vast and overarching term that describes hardware and software solutions as well as
processes or rules and configurations relating to network use, accessibility, and overall threat
protection. Network Security involves access control, virus and antivirus software, application
security, network analytics, types of network-related security (endpoint, web, wireless),
firewalls, VPN encryption and more.
Firewall:
Firewalls control incoming and outgoing traffic on networks, with predetermined security rules.
Firewalls keep out unfriendly traffic and are a necessary part of daily computing. Network
Security relies heavily on Firewalls, and especially Next Generation Firewalls, which focus on
blocking malware and application-layer attacks.
Network Segmentation:
Network segmentation defines boundaries between network segments where assets within the
group have a common function, risk or role within an organization. For instance, the perimeter
gatewaysegments a company network from the Internet. Potential threats outside the network are
prevented,ensuring that an organization9s sensitive data remains inside. Organizations can go
further by definingadditional internal boundaries within their network, which can provide
improved security and accesscontrol.
Email Security:
Email security refers to any processes, products, and services designed to protect your email
accounts and email content safe from external threats. Most email service providers have built-in
email security features designed to keep you secure, but these may not be enough to stop
cybercriminals from accessing your information.
Worms:
Can slow down computer networks by eating up bandwidth as well as slow the efficiency of your
computer to process data. A worm is a standalone malware that can propagate and work
independently of other files, where a virus needs a host program to spread.
Trojan:
A trojan is a backdoor program that creates an entryway for malicious users to access the
computer system by using what looks like a real program, but quickly turns out to be harmful. A
Trojan virus can delete files, activate other malware hidden on your computer network, such as a
virus and steal valuable data.
Spyware:
Much like its name, spyware is a computer virus that gathers information about a person or
organization without their express knowledge and may send the information gathered to a third
party without the consumer9s consent.
lOMoARcPSD|28 488294
Adware:
Can redirect your search requests to advertising websites and collect marketing data about you in
the process so that customized advertisements will be displayed based on your search and buying
history.