Professional Documents
Culture Documents
What is E-Commerce?
The electronic processing and transmission of business data
electronic buying and selling of goods and services online delivery of digital products electronic funds transfer (EFT) electronic trading of stocks direct consumer marketing electronic data interchange (EDI) the Internet revolution
3
Benefits of E-Commerce
Access to a worldwide customer and/or supplier base Reductions in inventory investment and carrying costs Rapid creation of business partnerships to fill emerging market niches Reductions in retail prices through lower marketing costs Reductions in procurement costs Better customer service
4
LAN
File Server
Files
Node Node
LAN
Node
Print Server
Node Printer
WANs may use common carrier facilities, such as telephone lines, or they may use a Value Added Network (VAN).
7
WAN
Bridge LAN LAN
Gateway
Gateway
LAN
WAN
Star Topology
A network of IPUs with a large central computer (the host) The host computer has direct connections to smaller computers, typically desktop or laptop PCs. This topology is popular for mainframe computing. All communications must go through the host computer, except for local computing.
9
Star Network
Topeka Local Data St. Louis Local Data
Central Data
Tulsa POS
Local Data
POS
POS
Hierarchical Topology
A host computer is connected to several levels of subordinate smaller computers in a master-slave relationship.
Corporate Level Regional Level
Production Scheduling System
Warehouse System
Warehouse System
Production System
Production System
Local Level
11
Ring Topology
This configuration eliminates the central site. All nodes in this configuration are of equal status (peers). Responsibility for managing communications is distributed among the nodes. Common resources that are shared by all nodes can be centralized and managed by a file server that is also a node.
12
Ring Topology
Central Files
Local Files
Server
Local Files
Local Files
Local Files
Local Files
Bus Topology
The nodes are all connected to a common cable - the bus. Communications and file transfers between workstations are controlled by a server. It is generally less costly to install than a ring topology.
14
Bus Topology
Node
Local Files
Node
Local Files
Server
Central Files
Node
Local Files
Node
Local Files
Client-Server Topology
This configuration distributes the processing between the users (clients) computer and the central file server. Both types of computers are part of the network, but each is assigned functions that it best performs. This approach reduces data communications traffic, thus reducing queues and increasing response time.
16
Client-Server Topology
Client
Data Manipulation Capabilities
Server
Record Searching Capabilities
Client
Data Manipulation Capabilities
Common Files
Client
Data Manipulation Capabilities
Client
Data Manipulation Capabilities
18
SLAVE
Locked
Locked
SLAVE
MASTER
WAN
Polling Signal
SLAVE
Data Transmission
SLAVE
Locked
One Site, the master, polls the other slave sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted.
Allows priorities to be set for data communications across the network
Token Ring
Server
Central Files
Node
Local Files
Node
Local Files
Node
Local Files
Carrier Sensing
A random access technique that detects collisions
This technique is widely used--found on Ethernets. The node wishing to transmit listens to the line to determine if it is in use. If it is, it waits a pre-specified amount of time to transmit. Collisions occur when two nodes listen, hear no messages transmitting, and then simultaneously begin transmitting. The data collides and the two nodes are instructed to hang up and try again. Disadvantage: The line may not be used optimally when multiple nodes are trying to transmit simultaneously.
21
Communications Links
Companies may have internal EDI translation/communication software and hardware. OR They may subscribe to VANs to perform this function without having to invest in personnel, software, and hardware.
23
EDI System
Company A
Application Purchases Software System
Company B
Sales Order System Application Software
Other Mailbox
Company As mailbox
VAN
Other Mailbox
Company Bs mailbox
Advantages of EDI
Reduction Reduction Reduction Reduction postage Reduction or elimination of data entry of errors of paper of paper processing and of inventories (via JIT systems)
25
Employs communications technologies based on packet switching, whereby messages are divided into small packets for transmission
26
Protocol Functions
They facilitate the physical connection between the network devices. They synchronize the transfer of data between physical devices. They provide a basis for error checking and measuring network performance. They promote compatibility among network devices. They promote network designs that are flexible, expandable, and cost-effective. 28
Internet Protocols
Transfer Control Protocol/Internet Protocol (TCP/IP) - controls how individual packets of data are formatted, transmitted, and received Hypertext Transfer Protocol (HTTP) - controls web browsers File Transfer Protocol (FTP) - used to transfer files across the Internet Simple Network Mail Protocol (SNMP) - e-mail Secure Sockets Layer (SSL) and Secure Electronic Transmission (SET) - encryption schemes
29
Layer 7 Application
Layer 6 Presentation Layer 5 Session Layer 4 Transport
Communications Channel
32
Intranet Risks
Intercepting Network Messages
sniffing: interception of user IDs, passwords, confidential e-mails, and financial data files
Uncontrolled Expansion
ill-conceived network decisions create a serious threat
33
34
In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not respond with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received.
Cleartext Message
Encryption Program
Ciphertext
Communication System
Cleartext Message
Encryption Program
Ciphertext
Communication System
37
Key
Ciphertext
Ciphertext
Ciphertext
Ciphertext
Typically one person or a small number of people have the private key (e.g., a supervisor). Message A Message B Message C
Message D
identification card that is used in conjunction with a public key encryption system to verify the authenticity of the message sender
39
Assurance
Trusted third-party organizations offer seals of assurance that businesses can display on their Web site home pages:
BBB TRUSTe Veri-Sign, Inc ICSA AICPA/CICA WebTrust AICPA/CICA SysTrust
41