Enviar búsqueda
Cargar
Ecommerce Chap 11
•
Descargar como PPT, PDF
•
1 recomendación
•
972 vistas
Pimsat University
Seguir
Educación
Denunciar
Compartir
Denunciar
Compartir
1 de 45
Descargar ahora
Recomendados
3rd edition chapter1
3rd edition chapter1
nguyễn cầm
Tutorial Jaringan komputer
Tutorial Jaringan komputer
Agus Kurniawan
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 1
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 1
Raga Yustia
Lecture 1 4
Lecture 1 4
Hasam Panezai
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Raga Yustia
Chapter 1 v6.1
Chapter 1 v6.1
david123456aa
Chapter1
Chapter1
guest0af0cf
E-Commerce Chapter3a
E-Commerce Chapter3a
Ishfaq Chohan
Recomendados
3rd edition chapter1
3rd edition chapter1
nguyễn cầm
Tutorial Jaringan komputer
Tutorial Jaringan komputer
Agus Kurniawan
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 1
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 1
Raga Yustia
Lecture 1 4
Lecture 1 4
Hasam Panezai
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Raga Yustia
Chapter 1 v6.1
Chapter 1 v6.1
david123456aa
Chapter1
Chapter1
guest0af0cf
E-Commerce Chapter3a
E-Commerce Chapter3a
Ishfaq Chohan
20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
Networking
Networking
sumitbhaskar0007
E business webinternet slides world wide web / protocols
E business webinternet slides world wide web / protocols
AsjadAli34
Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]
LeelaRam Tenneti
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
IJCNCJournal
App layer
App layer
khushali_modi
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
ijtsrd
Week1.2 intro
Week1.2 intro
Digvijay Singh
Communications systems
Communications systems
Mohd Arif
Networking-basics
Networking-basics
Raj Alam
History ofwww internetprinciples
History ofwww internetprinciples
Akshay Kochhar
Communications
Communications
simosk
Internet architecture protocol
Internet architecture protocol
GLIM Digital
Lecture2
Lecture2
MUHAMMAD UMAIR
Bcs 052 solved assignment
Bcs 052 solved assignment
Indira Gnadhi National Open University (IGNOU)
Fg c
Fg c
Taha Khan
Week1 lec2-bscs1
Week1 lec2-bscs1
syedhaiderraza
Chapter2
Chapter2
siageoksoon
Network access layer security protocol
Network access layer security protocol
Kirti Ahirrao
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
The Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
Más contenido relacionado
La actualidad más candente
20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
Networking
Networking
sumitbhaskar0007
E business webinternet slides world wide web / protocols
E business webinternet slides world wide web / protocols
AsjadAli34
Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]
LeelaRam Tenneti
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
IJCNCJournal
App layer
App layer
khushali_modi
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
ijtsrd
Week1.2 intro
Week1.2 intro
Digvijay Singh
Communications systems
Communications systems
Mohd Arif
Networking-basics
Networking-basics
Raj Alam
History ofwww internetprinciples
History ofwww internetprinciples
Akshay Kochhar
Communications
Communications
simosk
Internet architecture protocol
Internet architecture protocol
GLIM Digital
Lecture2
Lecture2
MUHAMMAD UMAIR
Bcs 052 solved assignment
Bcs 052 solved assignment
Indira Gnadhi National Open University (IGNOU)
Fg c
Fg c
Taha Khan
Week1 lec2-bscs1
Week1 lec2-bscs1
syedhaiderraza
Chapter2
Chapter2
siageoksoon
Network access layer security protocol
Network access layer security protocol
Kirti Ahirrao
La actualidad más candente
(20)
20CS2008 Computer Networks
20CS2008 Computer Networks
Networking
Networking
E business webinternet slides world wide web / protocols
E business webinternet slides world wide web / protocols
Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
App layer
App layer
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
Week1.2 intro
Week1.2 intro
Communications systems
Communications systems
Networking-basics
Networking-basics
History ofwww internetprinciples
History ofwww internetprinciples
Communications
Communications
Internet architecture protocol
Internet architecture protocol
Lecture2
Lecture2
Bcs 052 solved assignment
Bcs 052 solved assignment
Fg c
Fg c
Week1 lec2-bscs1
Week1 lec2-bscs1
Chapter2
Chapter2
Network access layer security protocol
Network access layer security protocol
Similar a Ecommerce Chap 11
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
The Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
Chapter 6 internet
Chapter 6 internet
Jesus Obenita Jr.
Introduction to Computer Networking
Introduction to Computer Networking
shankars73
E-business Infrastructure and Security
E-business Infrastructure and Security
Kimmy Chen
E_commerce_chap_2.pptx
E_commerce_chap_2.pptx
MohammedAliShakil
Global Transition Of Internet Protocol
Global Transition Of Internet Protocol
Miles Priar
Slides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
Lexume1
Session 2
Session 2
Nanyang Technological University, Singapore
Internet
Internet
Rui Zeng
The Internet
The Internet
Anil Bilgihan
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
Internet
Internet
Rui Zeng
Why Ipv6 May Be Adopted Later Rather Than Sooner
Why Ipv6 May Be Adopted Later Rather Than Sooner
Claudia Brown
Internet
Internet
Mukul Kumar
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
jwhuqyqtayaw
Protocols of network in computer science
Protocols of network in computer science
Anushida1
Internet
Internet
amansinghalddn
Cibm workshop2 chapter eight
Cibm workshop2 chapter eight
Shaheen Khan
Similar a Ecommerce Chap 11
(20)
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
The Internet and World Wide Web
The Internet and World Wide Web
Chapter 6 internet
Chapter 6 internet
Introduction to Computer Networking
Introduction to Computer Networking
E-business Infrastructure and Security
E-business Infrastructure and Security
E_commerce_chap_2.pptx
E_commerce_chap_2.pptx
Global Transition Of Internet Protocol
Global Transition Of Internet Protocol
Slides for protocol layering and network applications
Slides for protocol layering and network applications
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
Session 2
Session 2
Internet
Internet
The Internet
The Internet
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
Internet
Internet
Why Ipv6 May Be Adopted Later Rather Than Sooner
Why Ipv6 May Be Adopted Later Rather Than Sooner
Internet
Internet
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
Protocols of network in computer science
Protocols of network in computer science
Internet
Internet
Cibm workshop2 chapter eight
Cibm workshop2 chapter eight
Más de Pimsat University
Entrepreneurship Chap 13
Entrepreneurship Chap 13
Pimsat University
Entrepreneurship Chap 14
Entrepreneurship Chap 14
Pimsat University
Entrepreneurship Chap 12
Entrepreneurship Chap 12
Pimsat University
Entrepreneurship Chap 11
Entrepreneurship Chap 11
Pimsat University
Entrepreneurship Chap 10
Entrepreneurship Chap 10
Pimsat University
Entrepreneurship Chap 9
Entrepreneurship Chap 9
Pimsat University
Entrepreneurship Chap 8
Entrepreneurship Chap 8
Pimsat University
Entrepreneurship Chap 7
Entrepreneurship Chap 7
Pimsat University
Entrepreneurship Chap 6
Entrepreneurship Chap 6
Pimsat University
Entrepreneurship Chap 5
Entrepreneurship Chap 5
Pimsat University
Entrepreneurship Chap 4
Entrepreneurship Chap 4
Pimsat University
Entrepreneurship Chap 3
Entrepreneurship Chap 3
Pimsat University
Entrepreneurship Chap 2
Entrepreneurship Chap 2
Pimsat University
Entrepreneurship Chap 1
Entrepreneurship Chap 1
Pimsat University
Bailment and pledge
Bailment and pledge
Pimsat University
Chapter 1 contract
Chapter 1 contract
Pimsat University
Contract offer and accpetance
Contract offer and accpetance
Pimsat University
Contract of agency
Contract of agency
Pimsat University
Consideratio n
Consideratio n
Pimsat University
Partnership
Partnership
Pimsat University
Más de Pimsat University
(20)
Entrepreneurship Chap 13
Entrepreneurship Chap 13
Entrepreneurship Chap 14
Entrepreneurship Chap 14
Entrepreneurship Chap 12
Entrepreneurship Chap 12
Entrepreneurship Chap 11
Entrepreneurship Chap 11
Entrepreneurship Chap 10
Entrepreneurship Chap 10
Entrepreneurship Chap 9
Entrepreneurship Chap 9
Entrepreneurship Chap 8
Entrepreneurship Chap 8
Entrepreneurship Chap 7
Entrepreneurship Chap 7
Entrepreneurship Chap 6
Entrepreneurship Chap 6
Entrepreneurship Chap 5
Entrepreneurship Chap 5
Entrepreneurship Chap 4
Entrepreneurship Chap 4
Entrepreneurship Chap 3
Entrepreneurship Chap 3
Entrepreneurship Chap 2
Entrepreneurship Chap 2
Entrepreneurship Chap 1
Entrepreneurship Chap 1
Bailment and pledge
Bailment and pledge
Chapter 1 contract
Chapter 1 contract
Contract offer and accpetance
Contract offer and accpetance
Contract of agency
Contract of agency
Consideratio n
Consideratio n
Partnership
Partnership
Último
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
RaunakKeshri1
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
VS Mahajan Coaching Centre
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
Thiyagu K
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
SafetyChain Software
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
FatimaKhan178732
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
EduSkills OECD
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
RAM LAL ANAND COLLEGE, DELHI UNIVERSITY.
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
Disha Kariya
mini mental status format.docx
mini mental status format.docx
PoojaSen20
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Jayanti Pande
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Sapana Sha
Último
(20)
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
mini mental status format.docx
mini mental status format.docx
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Ecommerce Chap 11
1.
Chapter 11 Infrastructure
for Electronic Commerce © Prentice Hall, 2000 1
2.
Learning Objectives Describe the
protocols underlying Internet client/server applications Compare the functions and structures of Web browsers and servers Discuss the security requirements of Internet and e- commerce applications, and how are these requirements fulfilled by various hardware and software systems Describe the functional requirements for online selling and what are the specialized services and servers that perform these functions © Prentice Hall, 2000 2
3.
Learning Objectives (cont.) Describe
the business functions that Web chat can fulfill and list some of the commercially available systems that support chat Understand the ways in which audio, video and other multimedia content are being delivered over the Internet and to what business uses this content is being applied © Prentice Hall, 2000 3
4.
A Network of
Networks = Internet Internet is a network of hundreds of thousands interconnected networks Network Service Providers (NSPs) runs the backbones Internet Service Providers (ISPs) provide the delivery subnetworks © Prentice Hall, 2000 4
5.
Internet Network Architecture
ISP ISP 0 ISP ISP NAP NAP ISP ISP NAP NAP ISP ISP ISP ISP 5 © Prentice Hall, 2000 © Prentice Hall, 2000 5 Backbone
6.
Internet Protocols Protocols -
A set of rules that determine how two computers communicate with one another over a network The protocols embody a series of design principles Interoperable— the system supports computers and software from different vendors. For e-commerce this means that the customers or businesses are not required to buy specific systems in order to conduct business. Layered— the collection of Internet protocols work in layers with each layer building on the layers at lower levels. Simple— each of the layers in the architecture provides only a few functions or operations. This means that application programmers are hidden from the complexities of the underlying hardware. End-to-End— the Internet is based on “end-to-end” protocols. This means that the interpretation of the data happens at the application layer and not at the network layers. It’s much like the post office. © Prentice Hall, 2000 6
7.
TCP/IP Architecture
Application Layer FTP, HTTP, Telnet, NNTP Transport Layer Transmission User Control Protocol Datagram Protocol (TCP) (UDP) Internet Protocol (IP) Network Interface Layer Physical Layer © Prentice Hall, 2000 © Prentice Hall, 2000 7
8.
TCP/IP Solves the global
internetworking problem Transmission Control Protocol (TCP) Ensures that 2 computers can communicate with one another in a reliable fashion Internet Protocol (IP) Formats the packets and assigns addresses packets are labeled with the addresses of the sending and receiving computers 1999 version is version 4 (IPv4) Version 6 (IPv6) has just begun to be adopted © Prentice Hall, 2000 8
9.
Domain Names Reference particular
computers on the Internet Divided into segments separated by periods For example, in the case of “www.microsoft.com” “www” is the specific computer “com” is the top level domain “microsoft” is the subdomain Internet Assigned Numbers Authority (IANA) controls the domain name system Network Solutions, Inc. (NSI) issues and administers domain names for most of the top level domains 9 © Prentice Hall, 2000
10.
Internet Client/Server Applications Application
Protocol Purpose E-mail Simple Mail Transport Protocol (SMTP) Allows the transmission of text Post Office Protocol version 3 (POP3) messages and binary Multipurpose Internet Mail Extensions (MIME) attachments across the Internet. File File Transfer Protocol (TP) Enables files to be uploaded and downloaded Transfer across the Internet. Chat Internet Relay Chat Protocol (IRC) Provides a way for users to talk to one another in real- time over the Internet. The real-time chat groups are called channels. UseNet Network News Transfer Protocol (NNTP) Discussion forums where users can asynchronously post Newsgroups messages and read messages posted by others. World Wide Hypertext Transport Protocol (HTTP) Offers access to hypertext documents, executable Web (Web) programs, and other © Prentice Hall, 2000 10 Internet resources.
11.
New World Network:
Internet2 Two consortiums are in the process of constructing the ‘new world network’ The University Corporation for Advanced Internet Development (UCAID) www.ucaid.edu Building a leading edge research network called Internet2 Based on a series of interconnected gigapops • interconnected by the National Science Foundation’s very high performance Backbone Network (vBNS) infrastructure Goals of Internet2 • to connect universities so that a 30 volume encyclopedia could be transmitted in less than second • to support applications like distance learning, digital libraries, video teleconferencing, teleimmersion and collaborative tools, and virtual laboratories © Prentice Hall, 2000 11
12.
New World Network:
Next Generation Internet Next Generation Internet (NGI) Government initiated and sponsored Started by the Clinton Administration, this initiative includes government research agencies, such as: • the Defense Advanced Research Projects Agency (DARPA) • the Department of Energy • the National Science Foundation (NSF) • the National Aeronautics and Space Administration (NASA) • the National Institute of Standards and Technology Aim of the NGI • to support next generation applications like health care, national security, energy research, biomedical research, and environmental monitoring © Prentice Hall, 2000 12
13.
Web-based Client/Server Web browsers
servers need as way to: Locate each other so they can send requests and responses back and forth Communicate with one another Uniform Resource Locators (URLs) A new addressing scheme Ubiquitous, appearing on the web, in print, on billboards, on TV and anywhere else a company can advertise Default syntax - www.Anywhere.Com Complete syntax - access-method://server-name[:port]/directory/file 13 © Prentice Hall, 2000
14.
Web-based Client/Server (cont.) Hypertext
Transport Protocol (HTTP) A new protocol Lightweight, stateless protocol that browsers and servers use to converse with one another Statelessness - every request that a browser makes opens a new connection that is immediately closed after the document is returned represents a substantial problem for e-commerce applications an individual user is likely to have a series of interactions with the application MIME (Multipurpose Internet Mail Extension) describes the contents of the document in the case of an HTML page the header is “Content-type: text/html” © Prentice Hall, 2000 14
15.
Web Browsers (1999
Generation) IE 4.6 suite of components consists of the browser along with the following tools: Outlook Express for e-mail reading FrontPage Express for authoring of HTML Web pages Net Meeting for collaboration Netscape Navigator 4.6 suite consists of the browser plus the following components: Messenger for e-mail reading Composer for authoring HTML Web pages Collabora for news offerings Calendar for personal and group scheduling Netcaster for push delivery of Web pages © Prentice Hall, 2000 15
16.
Web Servers: A
Software Program http daemon in Unix; http service in Windows NT Functions: service HTTP requests provide access control, determining who can access particular directories or files on the Web server run scripts and external programs to either add functionality to the Web documents or provide real-time access to database and other dynamic data enable management and administration of both the server functions and the contents of the Web site log transactions that the user makes Distinguished by : platforms, performance, security, and commerce 16 © Prentice Hall, 2000
17.
Internet Security Cornerstones of
Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to the sender and receiver Integrity the contents of a message are not modified (intentionally or accidentally) during transmission Non-repudiation the sender of a message cannot deny that he, she or it actually sent the message © Prentice Hall, 2000 17
18.
Encryption
Private Key Encryption (Symmetrical Key Encryption) Data Encryption Standard (DES) is the most widely used symmetrical encryption algorithm Private Key Private Key Message Ciphered Message Text Text Text Encryption Decryption Sender Receiver 18 © Prentice Hall, 2000
19.
Encryption (cont.)
Public Key Encryption (Asymmetrical Key Encryption) Public Key of Private Key of Recipient Recipient Message Ciphered Message Text Text Text Encryption Decryption Sender Receiver © Prentice Hall, 2000 19
20.
Encryption (cont.) Digital
Envelope — combination of symmetrical and public key encryption Public key of Public key of Session Key Recipient Recipient Session Key Digital Envelop Session Key Session Key Message Ciphered Message Text Encryption Text Decryption Text Sender © Prentice Hall, 2000 Receiver 20
21.
Encryption (cont.)
Digital Signatures : Authenticity and Non-Denial Public Key of Private Key of Recipient Recipient Message Message Text Ciphered Text Text Signature Encryption Decryption Signature Sender Private Key Public Key Receiver of Sender of Sender © Prentice Hall, 2000 21
22.
Digital Certificates and
Certifying Authorities Digital Certificates Verify the holder of a public and private key is who he, she or it claims to be Certifying Authorities (CA) Issue digital certificates Verify the information and creates a certificate that contains the applicant’s public key along with identifying information Uses their private key to encrypt the certificate and sends the signed certificate to the applicant © Prentice Hall, 2000 22
23.
Secure Socket Layer
(SSL) A protocol that operates at the TCP/IP layer Encrypts communications between browsers and servers Supports a variety of encryption algorithms and authentication methods Encrypts credit card numbers that are sent from a consumer’s browser to a merchants’ Web site © Prentice Hall, 2000 23
24.
Secure Electronic Transactions
(SET) A cryptographic protocol to handle the complete transaction Provides authentication, confidentiality, message integrity, and linkage Supporting features Cardholder registration Chargebacks Merchant registration Credits Purchase requests Credit reversal Payment authorizations Debit card transactions Payment capture © Prentice Hall, 2000 24
25.
Access Control Password Protection
Passwords are notoriously susceptible to compromise Users have a habit of sharing their passwords with others, writing them down where others can see them, and choosing passwords that are easily guessed. Browser transmits the passwords in a form that is easily intercepted and decoded. By making sure that even if the passwords are compromised the intruder only has restricted access to the rest of the network; which is one of the roles of a firewall. © Prentice Hall, 2000 25
26.
Firewalls A network node
consisting of both hardware and software that isolates a private network from a public network Make sure that even if the passwords are compromised the intruder only has restricted access to the rest of the network Two types Dual-homed gateway bastion gateway connects a private internal network to outside Internet proxies (software programs) run on the gateway server and pass repackaged packets from one network to the other Screen-host gateway screened subnet gateway in which the bastion gateway offers access to a small segment of the internal network demilitarized zone is the open subnet © Prentice Hall, 2000 26
27.
Screened Subnet Firewall
Web Server Bastion Host Router Router Local Internet Network Proxies: FTP, HTTP, NNTP, Telnet © Prentice Hall, 2000 FTP Server 2000 © Prentice Hall, 27
28.
Virtual Private Networks
(VPN) A VPN combines encryption, authentication, and protocol tunneling to provide secure transport of private communications over the public Internet. It’s as if the Internet becomes part of a larger enterprise wide area network (WAN). In this way, transmission costs are drastically reduced because workers can access enterprise data by making a local call into an ISP rather than using a long distance phone call. © Prentice Hall, 2000 28
29.
Virtual Private Networks
(VPN) (cont.) Real challenge of a VPN To ensure the confidentiality and integrity of the data transmitted over the Internet Protocol tunneling Support multi-protocol networking To encrypt and encapsulate the data being transmitted Types of protocol — being used to carry out protocol tunneling protocols are aimed primarily at site-to-site VPNs (e.g. IPV6) protocols are used to support VPNs that provide employees, customers, and others with dial-up access via an ISP (e.g. Microsoft’s Point-to-Point Tunneling Protocol (PPTP)) © Prentice Hall, 2000 29
30.
Selling on the
Web Function Requirements for an Electronic Storefront Search for, discover, and compare products for purchase Select a product to be purchased and negotiate or determine its total price Place an order for desired products Have their order confirmed, ensuring that the desired product is available Pay for the ordered products (usually through some form of credit) Verify their credit and approve their purchase Have orders processed Verify that the product has been shipped Request post-sales support or provide feedback to the seller © Prentice Hall, 2000 30
31.
Selling on the
Web (cont.) Electronic storefront must contain: A merchant system or storefront that provides the merchant’s catalog with products, prices and promotions A transaction system for processing orders and payments and other aspects of the transaction A payment gateway that routes payments through existing financial systems primarily for the purpose of credit card authorization and settlement © Prentice Hall, 2000 31
32.
Outsourcing Vs. Insourcing Insourcing—
build and run the electronic storefront inhouse Large companies wanting: • to “experiment” with e-commerce without a great investment • to protect their own internal networks • to rely on experts to establish their sites Outsourcing— contract with an outside firm Smaller or medium sized companies with few IT staff and smaller budgets Three types of providers • Internet Malls— offers cross-selling from one store to another and provides a common payment structure • Internet Service Providers— focused on operating a secure transaction environment; not on store content • Telecommunication Companies— includes the full range of e-commerce solutions © Prentice Hall, 2000 32
33.
Electronic Catalogs and
Merchant Servers The virtual equivalents of traditional product catalogs Commonly include: Templates or wizards for creating a storefront and catalog pages with pictures describing products for sale Electronic shopping carts that enable consumers to gather items of interest until they are ready for checkout Web-based order forms for making secure purchases (either through a SSL or a SET) Database for maintaining product descriptions and pricing, as well as customer orders Integration with third party software for calculating taxes and shipping costs and for handling distribution and fulfillment © Prentice Hall, 2000 33
34.
Electronic Catalogs and
Merchant Servers (cont.) Store HTML Pages 3rd Party Applications Merchant Internet Server Financial Network Web Web Browser Server Database Catalog Order © Prentice Hall, 2000 Merchant Server Architecture © Prentice Hall, 2000 34
35.
Electronic Catalogs and
Merchant Servers (cont.) Two of the best known products in this category iCat Electronic Commerce Suite Standard edition includes: • Catalog templates • Shopping carts • Cross selling • Product searching • Secure payment processing Professional edition provides support for: • High-end databases • Integration with ISAPI and Netscape's NSAPI • Options for third-party plug-ins for searching, user tracking, sale pricing, discounting, etc. © Prentice Hall, 2000 35
36.
Electronic Catalogs and
Merchant Servers (cont.) Microsoft’s Site Server Commerce Edition Features of this product are: • Commerce Sample Sites providing templates for complete applications • Microsoft’s Wallet supporting a variety of digital currencies • Site Builder Wizard for stores with multi-level departments • Commerce Server Software Development Kit (SDK) for developing custom-order processing • Order processing pipeline for managing orders according to specified business rules • Microsoft’s Wallet Software Development Kit (SDK) for supporting a variety of digital payment schemes • Promotion and Cross-selling Manager for administering a range of specialized promotions, discounts,cross-selling opportunities • Integration with Microsoft’s Web site development (e.g. Visual InterDev) and administrative tools (e.g. NT Security Support) © Prentice Hall, 2000 36
37.
Electronic Commerce Suites
Offer merchants greater flexibility, specialization, customization and integration in supporting complete front and back-office functionality Catalog Catalog Application Database Customer Management, Customer Registration, Database Profiles, Service Order Database Internet Order Capture, Fulfillment Completion Web Systems Browser Web Payment Payment Server Processing Database (SET & Purchase Order) Financial Network Open Market E-Commerce Server Architecture37 © Prentice Hall, 2000
38.
Open Market (www.openmarket.com)
One of the market leaders in the electronic commerce software segment Provides a compete set of end-to-end transaction services including: Analysis and Profiling Demand Generation Order Management Fulfillment Payment Self-Service Customer Service Reporting © Prentice Hall, 2000 38
39.
Chatting on the
Web Varied uses of the forums and chat groups Communication Centers a virtual meeting place where communications can take place among the participants Customer Service offer online support where customers can converse with help-line staff and receive advice Community Discussion provide forums and chat services with a marketing eye toward developing a community of loyal users, followers and advocates © Prentice Hall, 2000 39
40.
Multimedia Delivery Webcasting— describes
Internet-based broadcasting of audio and video content Types of Webcasts Text Streams— Text-only wordcasts and datacasts • to deliver constant news and stock price updates Ambient Webcasts— Video content • is captured from a Webcam and delivered as single-frame updates that are transmitted at periodic intervals Streaming Audio— Web equivalent of radio • to deliver everything from talk radio to sports broadcasts to music previews to archived music and radio shows Streaming Video • to deliver videoconferences where high quality images are not required and there is not much movement among participants © Prentice Hall, 2000 40
41.
Webcasting Works in a
straightforward way Examples of companies offering both Webcast servers and players RealNetworks ( www.real.com ) Liquid Audio ( www.liquidaudio.com ) Xingtech with its streamworks technology ( www.xingtech.com ) Apple with its QuickTime system ( quicktime.apple.com ) Microsoft with its Netshow software ( www.microsoft.com/windows/windowsmedia ) Multicasting stream a Webcast from a central server to other media servers which are distributed to different locations when a listener or viewer clicks on a Webcast link they are automatically routed to the closest server © Prentice Hall, 2000 41
42.
Bandwidth Requirements for
Streaming Audio and Video Bandwidth [1 mbps = 1 million kbps] the speed with which content can be delivered 14.4 kbps to 56 kbps for connecting to the Internet over the telephone through modems 128 kbps for connecting to the Internet over ISDN telephone lines 1 - 1.5 mbps for connecting to the Internet over digital subscriber line (DSL) 10 mbps for downloading over cable wires To download a standard Web page, say around 400,000 kilobits; 56 kbps modem takes about 7 seconds Cable modem takes about 0.04 seconds © Prentice Hall, 2000 42
43.
Internet Telephones Internet phones
programs that let you talk with other people using the Internet the added cost to the end user is at best zero and at worst a substantially lower total charge than a standard telephone call PC-to-PC; PC-to-phone; and phone-to-phone vendors who dominate the Internet telephone market space • VocalTec ( www.vocaltec.com ) • IDT ( www.met2phone.com ) • Delta Three ( www.deltathree.com ) © Prentice Hall, 2000 43
44.
Analyzing Web Visits Access
logs file Text file, example : www.somewhere.com - [18/Aug/1998:12:00:00 +0000] “Get /a htm HTTP/1.0” 200 15000 Telling you which pages are most popular, which times are most popular, which geographical regions make the most requests, and other interesting tidbits that help site administrators maintain and refine their sites Software for analyzing access log files (FREE) net.Analysis form net.Genesis ( www.netgen.com ) Insight form Accrue ( www.accrue.com ) Web Trends Log Analyzer from Web Trends Corporation ( www.egsoftware.com ) 44 © Prentice Hall, 2000
45.
Managerial Issues Now or
later— the question is no longer “Will” but “When” It’s the business issues that count— to succeed, a business must understand how to meet the needs of their online customers In-house or outsource— mainly depends on the company size Analyzing the data— automatic record of everyone who visits your Web site Security— management takes every precaution to ensure the security of their sites and their communications with site visitors Evolving Web— rapid change of the underlying standards, protocols and governance © Prentice Hall, 2000 45
Descargar ahora