SlideShare una empresa de Scribd logo
1 de 70
Internetworking
•   Internetworking involves connecting two or
    more distinct computer networks or network
    segments via a common routing technology.
    The result is called an internetwork (often
    shortened to internet).
•   The most notable example of internetworking
    is the Internet (capitalized), a network of
    networks based on many underlying hardware
    technologies,     but     unified   by     an
    internetworking protocol standard, called the
    Internet Protocol Suite (TCP/IP).
• An internetwork is a collection of individual
  networks, connected by intermediate
  networking devices, that functions as a
  single large network. Internetworking refers
  to the industry, products, and procedures
  that meet the challenge of creating and
  administering internetworks. Figure 1-1
  illustrates some different kinds of network
  technologies that can be interconnected by
  routers and other networking devices to
  create an internetwork.
Basics of Internetworking

• Gives an illusion of a single (direct link)
  network
• Built on a set of distributed heterogeneous
  networks
• Abstraction typically supported by
  software
Internetwork properties

• Supports heterogeneity: Hardware, OS,
  network type, and

• topology independent

• Scales to global connectivity
Internet Protocol (IP)
• Network- level protocol for the Internet
• Operates on all hosts and routers
• Protocol stack has an “hourglass” shape
Protocols
• Protocols are sets of rules that define how
  different parts of a network interact to allow
  devices to communicate with one another. They
  provide a ‘common language’ to allow different
  vendors’ computer equipment to communicate
  with each other. The different devices can use
  completely different software, provided that each
  device’s software can agree on the meaning of
  the data. Protocols can describe low-level details
  of machine-to-machine interfaces (like the order
  in which bits and bytes are sent across the wire)
  or high-level exchanges between allocation
  programs (the way in which two programs
  transfer a file across the Internet).
Internet Protocols
• The Internet Protocol defines a
  connectionless data delivery service
  between networked devices. Packets of
  data are sent as datagrams across the
  network. Large packets may be broken
  into several datagrams which are each
  sent individually across the network. Each
  datagram carries its full destination
  address and control information.
• To route packets in an internetwork, IP
  uses a dynamic routing protocol called the
  Routing Information Protocol (RIP). Today
  RIP is the most commonly used Interior
  Gateway Protocol (IGP) in theInternet
  community. The primary function of RIP is
  to inform routers about other routers on
  the network.
Serial Line Internet Protocol
               (SLIP)
• SLIP transmits IP packets over serial
  lines. If using SLIP, the network must use
  TCP/IP as its primary means of
  communication between resources. A
  SLIP connection only allows one
  communication application to be active at
  any one time.
Simple Mail Transport Protocol
             (SMTP)

• SMTP transfers e-mail from one server to
  another across the network.
• End users must use the Post Office
  Protocol (POP) to transfer the
• messages to their machines.
File Transfer Protocol (FTP)

• FTP provides a way to move files between
  computer systems. It is a widely used way
  of transferring files to and from the Internet
  and is relatively simple to operate.
WWW Structure
• Clients use browser application to send URIs via HTTP to
  servers requesting a Web page
• Web pages constructed using HTML (or other markup
  language) and consist of text, graphics, sounds plus
  embedded files
• Servers (or caches) respond with requested Web page
   – Or with error message
• Client’s browser renders Web page returned by server
   – Page is written using Hyper Text Markup Language (HTML)
   – Displaying text, graphics and sound in browser
   – Writing data as well
• The entire system runs over standard networking protocols
  (TCP/IP, DNS,…)
HTTP Basics

• Protocol for client/server communication
  – The heart of the Web
  – Very simple request/response protocol
     • Client sends request message, server replies with response
       message
  – Stateless
  – Relies on URI naming mechanism
WWW Pages and Browsing
• A web browser is a software application which enables
  a user to display and interact with text, images, videos,
  music, games and other information typically located on
  a Web page at a website on the World Wide Web or a
  local area network. Text and images on a Web page can
  contain hyperlinks to other Web pages at the same or
  different website. Web browsers allow a user to quickly
  and easily access information provided on many Web
  pages at many websites by traversing these links. Web
  browsers format HTML information for display, so the
  appearance of a Web page may differ between
  browsers.
Security
• When a computer connects to a network
  and begins communicating with others, it
  is taking a risk. Internet security involves
  the protection of a computers internet
  account and files from intrusion of an
  outside user. Basic security measures
  involve protection by well selected
  passwords, change of file permissions and
  back up of computers data.
• A network security policy is a generic document that
  outlines rules for computer network access, determines
  how policies are enforced and lays out some of the basic
  architecture of the company security/ network security
  environment. The document itself is usually several
  pages long and written by a committee. A security policy
  goes far beyond the simple idea of "keep the bad guys
  out". It's a very complex document, meant to govern data
  access, web-browsing habits, use of passwords and
  encryption, email attachments and more. It specifies
  these rules for individuals or groups of individuals
  throughout the company.
• Security policy should keep the malicious users out and
  also exert control over potential risky users within your
  organization. The first step in creating a policy is to
  understand what information and services are available
  (and to which users), what the potential is for damage
  and whether any protection is already in place to prevent
  misuse.
• In addition, the security policy should dictate a
  hierarchy of access permissions; that is, grant
  users access only to what is necessary for the
  completion of their work.
• While writing the security document can be a
  major undertaking, a good start can be achieved
  by using a template. National Institute for
  Standards and Technology provides a security-
  policy guideline.
• The policies could be expressed as a set of
  instructions that could be understood by special
  purpose network hardware dedicated for
  securing the network.
E- Commerce
• UK Government
   “E-Commerce is the exchange of information across
     electronic networks at any stage in the supply chain
     whether within an organisation , between businesses,
     between business & consumers, or between public
     and private sectors whether paid or unpaid”
• Zwass (1998)
  “ E-Commerce is the sharing of business information ,
  maintaining business relationships & conducting
  business transactions by means of telecommunications
  networks”
E-Business & E-Commerce
• IBM’s Definition of E-Business
   – “The transformation of key business processes
     through the use of internet technologies”
• R. Kalakota (1999)
  “E-Commerce is buying & selling activities over digital
  media”
   – E-Business – encompasses e-commerce &
     “includes the front & back-office applications that form
     the engine for modern business. Its not just about e-
     commerce transactions, it’s about redefining old
     business models with the aid of technology to
     maximise customer value”
Rules of E-Business
•   Rule 1 – Technology is no longer an afterthought in forming
    business strategy – It’s the actual cause & driver
         • Whilst computers didn’t fundamentally alter business foundations – the
           internet does.
•   Rule 2 - Ability to streamline, structure, influence and control the
    flow of information is more powerful & cost-effective than moving &
    manufacturing physical products
         • intangibles are becoming more valuable - branding, customer relationship,
           integration
•   Rule 3 – Inability to overthrow the dominant, outdated business
    design often leads to failure.
         • move to outsourcing & high levels of internal integration
•   Rule 4 – Goal of new business design is to create flexible
    outsourcing alliances between companies that not only off load
    costs but also make customers ecstatic.
         • Speed, Convenience, Personalisation, Price
•   Rule 5 – e-Commerce is enabling companies to listen to their
            customers and become either the cheapest, the most
                   familiar, or the best
         • Wal-Mart, McDonalds, Coca–Cola, Amex – What have you done for me ?
•   Rule 6 – Use technology to innovate, entertain, and enhance the
           entire transaction process from selection to receipt & service
         • Amazon,.
•   Rule 7 – Future e-business design models will increasingly use
          reconfigurable e-business community models to best meet
          customer’s needs.
         • Integrated customer centric business models – supporting complex business
           designs – IF, Cahoot, Amazon, E-Trade
•   Rule 8 – Management’s task is to align business strategies,
           processes and applications , fast, right and all at once – very
           difficult
Electronic commerce
• To many people the term electronic commerce,
  – often shortened to e-commerce, is equivalent
  – to shopping on the web.
• The term electronic business is sometimes used
  – to capture the broader notion of e-commerce.
• In this course, we will use e-commerce in its
  – broadest sense. It encompasses both web
  – shopping and other business conducted
  – electronically.
Electronic commerce
• Banks have used electronic funds transfers
  – (EFTs), also called wire transfers, for decades.

• Businesses have been engaging in electronic
  – data interchange for years. EDI occurs when
  – one business transmits computer readable data
  – in a standard format to another business.
• We will define e-commerce as the use of electronic
• data transmission to implement or enhance any
• business activity.

• Example (Figure 1-4): A buyer sends an electronic
• purchase order to a seller. The seller then sends an
• electronic invoice back to the buyer.

• When used appropriately, electronic transmission
• can save both time and money.
Impact of e-commerce
• E-commerce is changing the way
  traditional
• commerce is conducted:
• Technology can help throughout the
  process
  – including promotion, searching, selecting,
  – negotiating, delivery, and support.
• The value chain is being reconfigured.
Advantages of e-commerce
•   For the seller:
•   Increases sales/decreases cost
•   Makes promotion easier for smaller firms
•   Can be used to reach narrow market segments

•   For the buyer:
•   Makes it easier to obtain competitive bids
•   Provides a wider range of choices
•   Provides an easy way to customize the level of
    – detail in the information obtained
Advantages of e-commerce
• In general:
• Increases the speed and accuracy with which
  – businesses can exchange information
• Electronic payments (tax refunds, paychecks,
  – etc.) cost less to issue and are more secure
• Can make products and services available in
  – remote areas
• Enables people to work from home, providing
  – scheduling flexibility
Advantages of e-commerce
• Some business processes are not suited to
  – e-commerce, even with improvements in
  – technology
• Many products and services require a critical
  – mass of potential buyers (e.g. online grocers)
• Costs and returns on e-commerce can be
  – difficult to quantify and estimate
• Cultural impediments: People are reluctant to
  – change in order to integrate new technology
• The legal environment is uncertain: Courts and
  – legislators are trying to catch up
Disadvantages of e-commerce
• Some business processes are not suited to
  – e-commerce, even with improvements in
  – technology
• Many products and services require a critical
  – mass of potential buyers (e.g. online grocers)
• Costs and returns on e-commerce can be
  – difficult to quantify and estimate
• Cultural impediments: People are reluctant to
  – change in order to integrate new technology
• The legal environment is uncertain: Courts and
  – legislators are trying to catch up
E-Commerce Market Place
Electronic Commerce is part of an evolving approach to
business that could eventually involve the application of
Information & Communication Technology (ICT) to the
Product and Distribution of goods and services on a
global scale.

Electronic Commerce can be used to support fully
automated transactions, but, for immediate future at
least, it also encompasses many partially automated
transactions involving human and physical interfaces and
intermediaries of various kinds.
Participating Groups in E-Commerce

• Electronic Commerce can occur within
  and between three basic participant
  groups-
  – Business
  – Government
  – Individuals
  At present and by a large margin, most e-
    commerce occurs on a B-to_B level.
Economic Potential of E-Commerce

• E-Commerce is the marriage between a rapidly
  evolving technical environments and an
  increasingly pervasive set of ideas as to how
  markets should function.
• However markets involve complex interaction
  between specific business/ organizational
  factors and general economic, social and
  political factors.
• At this point in time, Economic Potential of E-
  commerce can only be evaluated against a
  backdrop of rapid change on all of these fronts.
Forces behind E-Commerce
• Internet Acceptance is the Driving Force
  Behind e-Commerce
• Increased Awareness
• Significant improvements in Infrastructure
• Increased     Competition      among       the
  organization and thus in search of the
  technologies and ways to take the edge over
  others.
• Customer Oriented markets
E-Commerce Framework
E-Commerce Framework
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv

Más contenido relacionado

La actualidad más candente

Ch1 introducing computer systems
Ch1 introducing computer  systemsCh1 introducing computer  systems
Ch1 introducing computer systemscs001
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course IntroKaushik Panta
 
Information Technology
Information TechnologyInformation Technology
Information Technologyhari_2u1986
 
Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersUjjwal 'Shanu'
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1Abdul_jabbar_k
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information TechnologySubair Ali
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspaceCBAKhan
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyWanBK Leo
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internetFrankie Jones
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networksAlidHasan4
 

La actualidad más candente (20)

Lab 1 computer intro1
Lab 1   computer intro1Lab 1   computer intro1
Lab 1 computer intro1
 
Computer Basics and Hardware
Computer Basics and HardwareComputer Basics and Hardware
Computer Basics and Hardware
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Computer and its types
Computer and its typesComputer and its types
Computer and its types
 
Ch1 introducing computer systems
Ch1 introducing computer  systemsCh1 introducing computer  systems
Ch1 introducing computer systems
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
Information Technology Basics
Information Technology BasicsInformation Technology Basics
Information Technology Basics
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to Computers
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Web application
Web applicationWeb application
Web application
 
Unit I
Unit IUnit I
Unit I
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information Technology
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 

Destacado

Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking OverviewShisir123
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking deviceRay Mkindo
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworkingMd. Mashiur Rahman
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworkingAbDul ThaYyal
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete IntroductionAhmar Hashmi
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

Destacado (12)

Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking device
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete Introduction
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar a Unit Iv

History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTCIgor Zboran
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .amritpal singh
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxrocky781582
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technologySharmila Devi
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfTadeseBeyene
 
Enterprise private network
Enterprise private networkEnterprise private network
Enterprise private networkKhuzaima Shahid
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_worksarun nalam
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITDeepraj Bhujel
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptxTadeseBeyene
 
It infrastructure and emerging technologies
It infrastructure and emerging technologiesIt infrastructure and emerging technologies
It infrastructure and emerging technologiesSUBHODIP PAL
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Leng Kimlieng
 

Similar a Unit Iv (20)

Chap006
Chap006Chap006
Chap006
 
Chapter 6 telecommunications and networks
Chapter 6  telecommunications and networksChapter 6  telecommunications and networks
Chapter 6 telecommunications and networks
 
Unit 2
Unit 2Unit 2
Unit 2
 
Internet
InternetInternet
Internet
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
data communication
data communicationdata communication
data communication
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
Enterprise private network
Enterprise private networkEnterprise private network
Enterprise private network
 
Ecommerce_Ch3.ppt
Ecommerce_Ch3.pptEcommerce_Ch3.ppt
Ecommerce_Ch3.ppt
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - IT
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
 
It infrastructure and emerging technologies
It infrastructure and emerging technologiesIt infrastructure and emerging technologies
It infrastructure and emerging technologies
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...
 

Más de Anshumali Singh (20)

Unit3rd
Unit3rdUnit3rd
Unit3rd
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2(Cont.)
Unit2(Cont.)Unit2(Cont.)
Unit2(Cont.)
 
Unit2
Unit2Unit2
Unit2
 
Shai 2
Shai 2Shai 2
Shai 2
 
Shai
ShaiShai
Shai
 
Outputdevice
OutputdeviceOutputdevice
Outputdevice
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture2
Lecture2Lecture2
Lecture2
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Unit Iv

  • 1. Internetworking • Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). • The most notable example of internetworking is the Internet (capitalized), a network of networks based on many underlying hardware technologies, but unified by an internetworking protocol standard, called the Internet Protocol Suite (TCP/IP).
  • 2. • An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. Figure 1-1 illustrates some different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork.
  • 3.
  • 4. Basics of Internetworking • Gives an illusion of a single (direct link) network • Built on a set of distributed heterogeneous networks • Abstraction typically supported by software
  • 5. Internetwork properties • Supports heterogeneity: Hardware, OS, network type, and • topology independent • Scales to global connectivity
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Internet Protocol (IP) • Network- level protocol for the Internet • Operates on all hosts and routers • Protocol stack has an “hourglass” shape
  • 19. Protocols • Protocols are sets of rules that define how different parts of a network interact to allow devices to communicate with one another. They provide a ‘common language’ to allow different vendors’ computer equipment to communicate with each other. The different devices can use completely different software, provided that each device’s software can agree on the meaning of the data. Protocols can describe low-level details of machine-to-machine interfaces (like the order in which bits and bytes are sent across the wire) or high-level exchanges between allocation programs (the way in which two programs transfer a file across the Internet).
  • 20. Internet Protocols • The Internet Protocol defines a connectionless data delivery service between networked devices. Packets of data are sent as datagrams across the network. Large packets may be broken into several datagrams which are each sent individually across the network. Each datagram carries its full destination address and control information.
  • 21.
  • 22.
  • 23. • To route packets in an internetwork, IP uses a dynamic routing protocol called the Routing Information Protocol (RIP). Today RIP is the most commonly used Interior Gateway Protocol (IGP) in theInternet community. The primary function of RIP is to inform routers about other routers on the network.
  • 24. Serial Line Internet Protocol (SLIP) • SLIP transmits IP packets over serial lines. If using SLIP, the network must use TCP/IP as its primary means of communication between resources. A SLIP connection only allows one communication application to be active at any one time.
  • 25. Simple Mail Transport Protocol (SMTP) • SMTP transfers e-mail from one server to another across the network. • End users must use the Post Office Protocol (POP) to transfer the • messages to their machines.
  • 26. File Transfer Protocol (FTP) • FTP provides a way to move files between computer systems. It is a widely used way of transferring files to and from the Internet and is relatively simple to operate.
  • 27. WWW Structure • Clients use browser application to send URIs via HTTP to servers requesting a Web page • Web pages constructed using HTML (or other markup language) and consist of text, graphics, sounds plus embedded files • Servers (or caches) respond with requested Web page – Or with error message • Client’s browser renders Web page returned by server – Page is written using Hyper Text Markup Language (HTML) – Displaying text, graphics and sound in browser – Writing data as well • The entire system runs over standard networking protocols (TCP/IP, DNS,…)
  • 28. HTTP Basics • Protocol for client/server communication – The heart of the Web – Very simple request/response protocol • Client sends request message, server replies with response message – Stateless – Relies on URI naming mechanism
  • 29. WWW Pages and Browsing • A web browser is a software application which enables a user to display and interact with text, images, videos, music, games and other information typically located on a Web page at a website on the World Wide Web or a local area network. Text and images on a Web page can contain hyperlinks to other Web pages at the same or different website. Web browsers allow a user to quickly and easily access information provided on many Web pages at many websites by traversing these links. Web browsers format HTML information for display, so the appearance of a Web page may differ between browsers.
  • 30. Security • When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computers internet account and files from intrusion of an outside user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computers data.
  • 31. • A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy goes far beyond the simple idea of "keep the bad guys out". It's a very complex document, meant to govern data access, web-browsing habits, use of passwords and encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company. • Security policy should keep the malicious users out and also exert control over potential risky users within your organization. The first step in creating a policy is to understand what information and services are available (and to which users), what the potential is for damage and whether any protection is already in place to prevent misuse.
  • 32. • In addition, the security policy should dictate a hierarchy of access permissions; that is, grant users access only to what is necessary for the completion of their work. • While writing the security document can be a major undertaking, a good start can be achieved by using a template. National Institute for Standards and Technology provides a security- policy guideline. • The policies could be expressed as a set of instructions that could be understood by special purpose network hardware dedicated for securing the network.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. E- Commerce • UK Government “E-Commerce is the exchange of information across electronic networks at any stage in the supply chain whether within an organisation , between businesses, between business & consumers, or between public and private sectors whether paid or unpaid” • Zwass (1998) “ E-Commerce is the sharing of business information , maintaining business relationships & conducting business transactions by means of telecommunications networks”
  • 38. E-Business & E-Commerce • IBM’s Definition of E-Business – “The transformation of key business processes through the use of internet technologies” • R. Kalakota (1999) “E-Commerce is buying & selling activities over digital media” – E-Business – encompasses e-commerce & “includes the front & back-office applications that form the engine for modern business. Its not just about e- commerce transactions, it’s about redefining old business models with the aid of technology to maximise customer value”
  • 39.
  • 40. Rules of E-Business • Rule 1 – Technology is no longer an afterthought in forming business strategy – It’s the actual cause & driver • Whilst computers didn’t fundamentally alter business foundations – the internet does. • Rule 2 - Ability to streamline, structure, influence and control the flow of information is more powerful & cost-effective than moving & manufacturing physical products • intangibles are becoming more valuable - branding, customer relationship, integration • Rule 3 – Inability to overthrow the dominant, outdated business design often leads to failure. • move to outsourcing & high levels of internal integration • Rule 4 – Goal of new business design is to create flexible outsourcing alliances between companies that not only off load costs but also make customers ecstatic. • Speed, Convenience, Personalisation, Price
  • 41. Rule 5 – e-Commerce is enabling companies to listen to their customers and become either the cheapest, the most familiar, or the best • Wal-Mart, McDonalds, Coca–Cola, Amex – What have you done for me ? • Rule 6 – Use technology to innovate, entertain, and enhance the entire transaction process from selection to receipt & service • Amazon,. • Rule 7 – Future e-business design models will increasingly use reconfigurable e-business community models to best meet customer’s needs. • Integrated customer centric business models – supporting complex business designs – IF, Cahoot, Amazon, E-Trade • Rule 8 – Management’s task is to align business strategies, processes and applications , fast, right and all at once – very difficult
  • 42. Electronic commerce • To many people the term electronic commerce, – often shortened to e-commerce, is equivalent – to shopping on the web. • The term electronic business is sometimes used – to capture the broader notion of e-commerce. • In this course, we will use e-commerce in its – broadest sense. It encompasses both web – shopping and other business conducted – electronically.
  • 43. Electronic commerce • Banks have used electronic funds transfers – (EFTs), also called wire transfers, for decades. • Businesses have been engaging in electronic – data interchange for years. EDI occurs when – one business transmits computer readable data – in a standard format to another business.
  • 44. • We will define e-commerce as the use of electronic • data transmission to implement or enhance any • business activity. • Example (Figure 1-4): A buyer sends an electronic • purchase order to a seller. The seller then sends an • electronic invoice back to the buyer. • When used appropriately, electronic transmission • can save both time and money.
  • 45. Impact of e-commerce • E-commerce is changing the way traditional • commerce is conducted: • Technology can help throughout the process – including promotion, searching, selecting, – negotiating, delivery, and support. • The value chain is being reconfigured.
  • 46. Advantages of e-commerce • For the seller: • Increases sales/decreases cost • Makes promotion easier for smaller firms • Can be used to reach narrow market segments • For the buyer: • Makes it easier to obtain competitive bids • Provides a wider range of choices • Provides an easy way to customize the level of – detail in the information obtained
  • 47. Advantages of e-commerce • In general: • Increases the speed and accuracy with which – businesses can exchange information • Electronic payments (tax refunds, paychecks, – etc.) cost less to issue and are more secure • Can make products and services available in – remote areas • Enables people to work from home, providing – scheduling flexibility
  • 48. Advantages of e-commerce • Some business processes are not suited to – e-commerce, even with improvements in – technology • Many products and services require a critical – mass of potential buyers (e.g. online grocers) • Costs and returns on e-commerce can be – difficult to quantify and estimate • Cultural impediments: People are reluctant to – change in order to integrate new technology • The legal environment is uncertain: Courts and – legislators are trying to catch up
  • 49. Disadvantages of e-commerce • Some business processes are not suited to – e-commerce, even with improvements in – technology • Many products and services require a critical – mass of potential buyers (e.g. online grocers) • Costs and returns on e-commerce can be – difficult to quantify and estimate • Cultural impediments: People are reluctant to – change in order to integrate new technology • The legal environment is uncertain: Courts and – legislators are trying to catch up
  • 50. E-Commerce Market Place Electronic Commerce is part of an evolving approach to business that could eventually involve the application of Information & Communication Technology (ICT) to the Product and Distribution of goods and services on a global scale. Electronic Commerce can be used to support fully automated transactions, but, for immediate future at least, it also encompasses many partially automated transactions involving human and physical interfaces and intermediaries of various kinds.
  • 51. Participating Groups in E-Commerce • Electronic Commerce can occur within and between three basic participant groups- – Business – Government – Individuals At present and by a large margin, most e- commerce occurs on a B-to_B level.
  • 52. Economic Potential of E-Commerce • E-Commerce is the marriage between a rapidly evolving technical environments and an increasingly pervasive set of ideas as to how markets should function. • However markets involve complex interaction between specific business/ organizational factors and general economic, social and political factors. • At this point in time, Economic Potential of E- commerce can only be evaluated against a backdrop of rapid change on all of these fronts.
  • 53. Forces behind E-Commerce • Internet Acceptance is the Driving Force Behind e-Commerce • Increased Awareness • Significant improvements in Infrastructure • Increased Competition among the organization and thus in search of the technologies and ways to take the edge over others. • Customer Oriented markets