Podcast
Questions and Answers
What was a significant challenge for the initial business adoption of the internet?
What was a significant challenge for the initial business adoption of the internet?
Which protocol became crucial for the development of the internet as we know it today?
Which protocol became crucial for the development of the internet as we know it today?
What was Gopher primarily used for?
What was Gopher primarily used for?
Which software type is NOT mentioned as part of the technology structure for Electronic Business?
Which software type is NOT mentioned as part of the technology structure for Electronic Business?
Signup and view all the answers
What was the initial role of the World Wide Web in the context of internet technology?
What was the initial role of the World Wide Web in the context of internet technology?
Signup and view all the answers
What are the markup languages primarily associated with the Web's development?
What are the markup languages primarily associated with the Web's development?
Signup and view all the answers
What was the purpose of early search facilities like Gopher in Internet technology?
What was the purpose of early search facilities like Gopher in Internet technology?
Signup and view all the answers
What is one characteristic of the early internet that hindered its use for business?
What is one characteristic of the early internet that hindered its use for business?
Signup and view all the answers
What is a key feature of packet switching used by the Internet?
What is a key feature of packet switching used by the Internet?
Signup and view all the answers
Which term refers to a network of computers connected over a great distance?
Which term refers to a network of computers connected over a great distance?
Signup and view all the answers
What is the primary purpose of routers in a packet-switched network?
What is the primary purpose of routers in a packet-switched network?
Signup and view all the answers
Which of the following best defines a protocol in networking?
Which of the following best defines a protocol in networking?
Signup and view all the answers
What is the role of the Internet backbone?
What is the role of the Internet backbone?
Signup and view all the answers
What distinguishes a Local Area Network (LAN) from other types of networks?
What distinguishes a Local Area Network (LAN) from other types of networks?
Signup and view all the answers
Which aspect of the information infrastructure is primarily facilitated by developed nations?
Which aspect of the information infrastructure is primarily facilitated by developed nations?
Signup and view all the answers
What does ARPANET represent in the context of networking?
What does ARPANET represent in the context of networking?
Signup and view all the answers
What was ARPANET primarily known for?
What was ARPANET primarily known for?
Signup and view all the answers
Which of the following is NOT one of the four key rules of the open architecture of ARPANET?
Which of the following is NOT one of the four key rules of the open architecture of ARPANET?
Signup and view all the answers
What does the Transmission Control Protocol (TCP) manage?
What does the Transmission Control Protocol (TCP) manage?
Signup and view all the answers
What is the fundamental address format of IP addresses?
What is the fundamental address format of IP addresses?
Signup and view all the answers
Which organization is NOT responsible for assigning IP addresses?
Which organization is NOT responsible for assigning IP addresses?
Signup and view all the answers
What is the potential addressing framework introduced in IPv6?
What is the potential addressing framework introduced in IPv6?
Signup and view all the answers
What feature distinguishes private IP addresses from public ones?
What feature distinguishes private IP addresses from public ones?
Signup and view all the answers
How many layers are in the TCP/IP model architecture?
How many layers are in the TCP/IP model architecture?
Signup and view all the answers
Study Notes
Electronic Business Systems
- Course instructor: Dr. Noha Ibrahem
- Department: Computers & IS
Chapter 2: E-Business Internet Technology & Technology Infrastructure
- Key issues include:
- Development of the internet
- World Wide Web (WWW)
- Information infrastructure
- Electronic Data Interchange (EDI)
- Program languages
Learning Objectives
- This chapter covers:
- The origin, growth, and current structure of the Internet
- How packet-switched networks combine to form the Internet
- Internet protocols and addressing
- Markup languages (SGML, HTML, XML) on the web
Development of the Internet
- Business activities via internet have been present since the late 1980s.
- All networks use the same protocol (TCP/IP) and operating system (Unix).
- Development of the internet emerged as a network of networks.
- Early 1990s: Internet use expanded beyond universities & governments to businesses.
- Limited by the lack of global internet infrastructure connecting users.
Early Internet Search Facilities
- Gopher protocol, a communication protocol for distributing, searching, and retrieving documents within Internet Protocol networks.
- Gopher was menu-driven and offered an alternative to the World Wide Web in its early stages.
- Required user knowledge of the technology to navigate the large number of databases.
- Needed simpler document searching and narrowing.
Technology Overview
- Computer networks and the Internet are foundational for Electronic Business.
- Network computers run various software, including:
- Operating systems, database managers, encryption software
- Multimedia creation/viewing software, graphical user interfaces.
- Essential hardware connects computers and networks:
- Hardware connecting computers
- Hardware connecting networks
- Technological advancements necessitate consistent business flexibility.
Internet Components
- Telecom: (Cables, Satellites, Phone Lines)
- Routers (& Gateways)
- Protocols: (TCP/IP, HTTP, FTP)
-
Hardware:
- Operating System (Command-line, GUI)
- Application Software
- Input (Data)
- Processing (Algorithm)
- Output (Information)
Information Infrastructure
- Supports Internet operation, including:
- Network infrastructure in developed countries.
- Support for mobile and wireless access (computers, cell phones)
- National Information Infrastructure (NII) projects facilitating connectivity.
Packet-Switched Networks
- Local Area Network (LAN): Closely connected computers
- Wide Area Network (WAN): Computers over long distances
- Circuit Switching: Used in phone communication
- Packet Switching: Used in the Internet
- Files are broken down into packets, labeled with source, sequence, and destination for transmission.
Routing Packets
- Computers acting as routers to forward packets efficiently.
- Routers use routing algorithms and tables to determine the best path.
- Packets are translated into a standard format for internet travel.
- The Internet backbone connects routers via telecom lines.
Internet Protocols
- Protocols are rules for data format, ordering, and error-checking.
- ARPANET was the first wide-area packet-switched network, implementing TCP/IP protocols, which became crucial to the internet architecture.
- ARPANET's open architecture had key rules:
- Independent networks connect seamlessly.
- Failed packets get retransmitted.
- Routers act as forwarding devices and don't store packet information.
Transmission Control Protocol (TCP) and Internet Protocol (IP)
- TCP/IP are the two core protocols for internet operation.
- TCP handles disassembling messages into packets, and reassembling them at the destination.
- IP handles addressing details for each packet.
IP Addresses
- 32-bit binary numbers allowing billions of unique addresses.
- IP addresses displayed in dotted-decimal format (four numbers separated by periods).
- Assigned by not-for-profit organizations (ARIN, RIPE, APNIC).
Private IP Addresses & IP Version 6 (IP v6)
- Private IP addresses are not allowed on the public internet for subnet use.
- IP v6 addresses use 128-bit numbers to overcome address limitations in IPv4.
TCP/IP Architecture
- A layered architecture with 4 layers:
- Application Layer (FTP, HTTP, Telnet, NNTP)
- Transport Layer (TCP, UDP)
- Internet Layer (IP)
- Network Interface Layer
- Physical Layer
Firewalls
- Hardware and software that protect private networks from public threats.
- Restrict access to network resources from unauthorized users, even if identities are compromised.
Security Requirements (for transactions)
- Authentication: Verification of users’ identities.
- Integrity: Protecting information from alteration or deletion.
- Encryption: Unreadable messages except to authorized users.
- Non-Repudiation: Preventing denial of past actions or transactions.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the key elements of E-Business Internet Technology and Technology Infrastructure in this quiz. You'll delve into the development of the Internet, its protocols, and the role of markup languages. This chapter highlights the transformation of business activities driven by the Internet from its inception to current practices.