E-Business Chapter 2 PDF
Document Details
Uploaded by OptimisticNovaculite3399
null
Dr. Noha Ibrahem
Tags
Summary
This document provides an overview of electronic business systems, covering key issues such as internet development and infrastructure. It also discusses internet protocols and their role in e-business and network architecture. The document is part of educational materials for undergraduate-level courses.
Full Transcript
Key issues: ✓ The development of the internet; ✓ The World Wide Web (WWW); ✓ Information infrastructure; ✓ Electronic Data Interchange (EDI); ✓ Program languages. Learning Objectives: In this chapter, you will learn about: ❑ The origin, growth, and current structure of the Internet ❑ How pa...
Key issues: ✓ The development of the internet; ✓ The World Wide Web (WWW); ✓ Information infrastructure; ✓ Electronic Data Interchange (EDI); ✓ Program languages. Learning Objectives: In this chapter, you will learn about: ❑ The origin, growth, and current structure of the Internet ❑ How packet-switched networks are combined to form the Internet ❑ Internet protocols and Internet addressing ❑ The history and use of markup languages on the Web, including SGML, HTML, and XML The application of business activities via the internet has been a feature of the business environment since the late 1980s. All networks used the same protocol (TCP/IP) and the same open operating system (Unix). This network of networks formed the birth of the internet as we know it today. By the early 1990s the use of the internet had expanded beyond university departments and government bodies to incorporate the business world. The use of the internet for business purposes got off to a slow start because no infrastructure existed that could connect users to the network from any location around the globe. Only those with a good knowledge of the technology could find their way around the large number of databases. For the internet to be adopted by the business community, and the general public, there was a need for a system that made navigation of the network simple and narrowed down the number of documents that users had to search through before accessing the information they needed. Early search facilities included Gopher, a system that used menus as a means of searching for documents. The Gopher protocol is a communication protocol designed for distributing, searching, and retrieving documents in Internet Protocol networks. The design of the Gopher protocol and user interface is menu-driven, and presented an alternative to the World Wide Web in its early stages. ❖ Computer networks and the Internet form the basic technology structure for Electronic Business. ❖ The computers in these networks run such software as: Operating systems, database managers, encryption software, multimedia creation and viewing software, and the graphical user interface. ❖ The Internet includes: The hardware that connects the computers together and the hardware that connects the networks together. ❖ Rapid change in these technologies requires businesses to be flexible. A Global Network of Networks of Computers Computer Machine for Data Processing Telecom. (Cables, Satellites, Phone Lines,) Hardware, Input Routers Operating System (Data) (& GWs) Command (DOS, UNIX, …) Processing Visual (Windows) (Algorithm) Protocols Application SW (TCP/IP, HTTP, FTP,) Output (Information) ❑ The information infrastructure is the support system that allows the internet to work. ❑ The main infrastructure support facilities exist in developed nations where access to the internet has moved beyond fixed location computers to incorporate mobile wireless computers and cell phones. ❑ Most developed nations have been constructing their own national information infrastructure (NII) to facilitate connectivity in homes, educational institutions, businesses and public organizations. ❖ A local area network (LAN) is a network of computers close together. ❖ A wide area network (WAN) is a network of computers connected over a great distance. ❖ Circuit switching is used in telephone communication. ❖ The Internet uses packet switching ❖ Files are broken down into small pieces (called packets) that are labeled with their origin, sequence, and destination addresses. ❑ The computers that decide how best to forward each packet in a packet-switched network are called ‘routers’. ❑ The programs on these routers use ‘routing algorithms’ that call upon their ‘routing tables’ to determine the best path to send each packet. ❑When packets leave a network to travel on the Internet, they are translated into a standard format by the router. ❑ These routers and the telecommunication lines connecting them are referred to as ‘the Internet backbone’. ❑ A protocol is a collection of rules for formatting, ordering, and error-checking data sent across a network. ❑ ARPANET is the earliest packet-switched network. Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite ❑ The open architecture of this experimental network used Network Control Protocol (NCP) was an early protocol implemented by ARPANET which later became the core of the Internet. ❑ This open architecture has four key rules that have contributed to the success of the Internet.(hardware, software, protocols and the connection medium) ❑ Independent networks should not require any internal changes to be connected to the network. ❑ Packets that do not arrive at their destinations must be retransmitted from their source network. ❑ Router computers act as receive-and-forward devices; they do not retain information about the packets that they handle. ❑ The Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the two protocols that support the Internet operation (commonly referred to as TCP/IP). ❑ The TCP controls the disassembly of a message into packets before it is transmitted over the Internet and the reassembly of those packets when they reach their destination. ❑ The IP specifies the addressing details for each packet being transmitted. ❑ IP addresses are based on a 32-bit binary number that allows over 4 billion unique addresses for computers to connect to the Internet. ❑ IP addresses appear in ‘dotted decimal’ notation (four numbers separated by periods). ❑ They are assigned by three not-for-profit organizations (ARIN, RIPE, and APNIC). ❑ Approximately two billion IP addresses are either in use or unavailable for use. ❑ Private IP addresses are a series of IP numbers that have been set aside for subnet use and are not permitted on the Internet. ❑ IP v6 is a possible solution that uses a 128-bit hexadecimal number for addresses. ❑The functionality of the TCP IP model is divided into four layers, and each includes specific protocols. ❑ TCP/IP is a layered server architecture system in which each layer is defined according to a specific function to perform. All these four TCP IP layers work collaboratively to transmit the data from one layer to another. * Application Layer * Transport Layer * Internet Layer * Network Interface ❑ A network node consisting of both hardware and software that isolates a private network from a public network ❑ Make sure that even if the passwords are compromised the intruder only has restricted access to the rest of the network ❑Authentication: A way to verify the person’s identity before transactions are made. ❑Integrity: Ensuring that information will not be altered or destroyed, usually during transmission. ❑Encryption: A process of making messages indecipherable except by those who have an authorized decryption key. ❑Non-repudiation: Protection against the unjustifiable denial of a past transaction.