0% found this document useful (0 votes)
81 views22 pages

Bba401 SLM Unit 03

The document discusses network infrastructure components for e-commerce, including common gateway interface (CGI), multimedia objects, and network access equipment. CGI allows a program to send data to a web server to be processed. Multimedia objects are files that contain various media types like images, audio, and video. Network access equipment discussed includes hubs, switches, repeaters, network interface cards (NICs), bridges, and routers. Hubs broadcast signals while switches use switching tables; repeaters regenerate signals to extend distance; NICs allow computers to communicate on a network. Bridges interconnect LANs while routers operate at network layer to connect different networks.

Uploaded by

Badder Danbad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views22 pages

Bba401 SLM Unit 03

The document discusses network infrastructure components for e-commerce, including common gateway interface (CGI), multimedia objects, and network access equipment. CGI allows a program to send data to a web server to be processed. Multimedia objects are files that contain various media types like images, audio, and video. Network access equipment discussed includes hubs, switches, repeaters, network interface cards (NICs), bridges, and routers. Hubs broadcast signals while switches use switching tables; repeaters regenerate signals to extend distance; NICs allow computers to communicate on a network. Bridges interconnect LANs while routers operate at network layer to connect different networks.

Uploaded by

Badder Danbad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Unit 3

Network Infrastructure for


E-Commerce - II

Structure
3.1 Introduction
Objectives
3.2 Common Gateway Interface
3.3 Multimedia Objects
3.4 Network Access Equipment
3.5 Network Cables
3.6 Broadband Telecommunication
3.7 Summary
3.8 Glossary
3.9 Terminal Questions
3.10 Answers
References

3.1 Introduction
In the previous unit, you learnt about the network infrastructure for e-commerce,
including topics such as Local Area Network (LAN), Ethernet, Wide Area Network
(WAN), the Internet, TCP/IP Reference Model, Domain Names, and Hyper Text
Markup Language (HTML).
In this unit, you will learn about Common Gateway Interface (CGI), which
is a process used to share the data between the web server and the web browser.
CGI is a set of standards where a program can send data back to the web
server where it can be processed. Also discussed at length is broadband
telecommunication, which makes use of a digital or analogue signal to relay
voice and data. In most applications, the term is associated with systems offering
fast transmission of data, either using latest digital technology or an analogue
system with a wider bandwidth. There are numerous types of broadband
telecommunications in use today.
You will also be taught various other topics, including, but not limited to,
multimedia objects, network access equipment, and network cables.

E-Commerce

Unit 3

Objectives
After studying this unit, you should be able to:
Evaluate the importance of common gateway interface
Define and give examples of multimedia objects
Demonstrate the working of network access equipment
Summarize the functioning of network cables
Discuss the importance of broadband telecommunication

3.2 Common Gateway Interface


As you traverse the vast frontier of the WWW, you could come across documents
that make you wonder, How did they do this? These documents could consist
of, among other things, forms that put for advice or registration information,
image maps that allow you to click on different parts of the image, counters that
present the number of users that accessed the document, and utilities that
allow you to search databases for specific information. In most cases, youll find
that these properties were done using the Common Gateway Interface,
commonly known as CGI.
One of the Internets worst-kept secrets is that CGI is astoundingly simple.
That is, its trivial in design, and anyone with an iota of programming experience
can write rudimentary scripts that work. Its only when your requirements are
more demanding that you have to master the more complex workings of the
Web.
CGI is the part of the Web server that can communicate with other different
programs running on the server. With CGI, the Web server can call up a program,
while passing user-specific data to the program (such as what host the user is
connecting from, or input the user has supplied using HTML form syntax). The
program then processes that data and the server passes the programs response
back to the Web browser.
CGI is not an enchantment; its just programming with some particular
types of input and a few strict rules on program output. Everything in between is
just programming. Of course, there are special techniques that are particular to
CGI. But underlying it all is the simple model as shown in Figure 3.1

Sikkim Manipal University

Page No. 38

E-Commerce

Unit 3

1. Form/Query

2.

Web
Browser

CGI

3. Gateway
Script of
Program

HTTP
Server
4. HTML

4. HTML

Information

Figure 3.1 CGI Model

Common uses of CGI include:


Guest books
Email forms
Mailing list maintenance
Blogs

Self-Assessment Questions
1. State whether the following statements are true or false.
(a) CGI is a set of standards where a program can send data back to
the web server where it can be processed.
(b) One of the Internets worst-kept secrets is that CGI is astoundingly
complex.

3.3 Multimedia Objects


Multimedia objects are files that hold images, audio recordings, video
clips and scanned documents, etc., which relate to some fact within our
genealogical data. A multimedia object can be linked with several entities
(animals, person, family, source ) and vice versa.
In other words multimedia is media and content that uses a combination
of different content forms. The term can be used as a noun (a medium

Sikkim Manipal University

Page No. 39

E-Commerce

Unit 3

with multiple content forms) or as an adjective describing a medium as


having multiple content forms. The term is used in contrast to media which
only use traditional forms of printed or hand-produced material. Multimedia
includes a combination of text, audio, still images, animation, video, and
interactivity content forms.
Multimedia is usually recorded and played, displayed or accessed by
information content processing devices, such as computerized and
electronic devices, but can also be part of a live performance. Multimedia
(as an adjective) also describes electronic media devices used to store
and experience multimedia content. Multimedia is distinguished from mixed
media in fine art; by including audio, for example, it has a broader scope.
The term rich media is synonymous for interactive multimedia.
Hypermedia can be considered one particular multimedia application.
Multimedia presentations may be viewed by person on stage, projected,
transmitted, or played locally with a media player. A broadcast may be a
live or recorded multimedia presentation. Broadcasts and recordings can
be either analogue or digital electronic media technology. Digital online
multimedia may be downloaded or streamed. Streaming multimedia may
be live or on-demand.
Multimedia games and simulations may be used in a physical environment
with special effects, with multiple users in an online network, or locally
with an offline computer, game system, or simulator.
The various formats of technological or digital multimedia may be intended
to enhance the users experience, for example to make it easier and faster
to convey information. Or in entertainment or art, to transcend everyday
experience. Enhanced levels of interactivity are made possible by
combining multiple forms of media content. Online multimedia is
increasingly becoming object-oriented and data-driven, enabling
applications with collaborative end-user innovation and personalization
on multiple forms of content over time. Examples of these range from
multiple forms of content on Web sites like photo galleries with both images
(pictures) and title (text) user-updated, to simulations whose co-efficient,
events, illustrations, animations or videos are modifiable, allowing the
multimedia experience to be altered without reprogramming. In addition
to seeing and hearing, Haptic technology enables virtual objects to be
felt. Emerging technology involving illusions of taste and smell may also
enhance the multimedia experience.

Sikkim Manipal University

Page No. 40

E-Commerce

Unit 3

Self-Assessment Questions
2. Fill in the blanks with appropriate words.
(a) Multimedia is media and content that uses a combination of different
______forms.
(b) Online multimedia is increasingly becoming _________ and
_________.

3.4 Network Access Equipment


Hubs: All networks (except those using coaxial cable) require a central location
to bring media segments together. These central locations are called Hubs.
Hubs are special repeaters that overcome the electromechanical limitations of
a media signal path.
There are three types of Hubs:
1. Passive Hub: A passive hub simply combines the signals of network
segments. There is no signal regeneration.
2. Active Hub: Active hub is that which regenerates of amplifies the
signals.
3. Intelligent Hub: Intelligent hub regenerates the signal and performs
some network management and intelligent path selection.
Switches: It supports transmitting receiving and controlling traffic with other
computers on the network. MAC (Media Access Control) address is hard-coded
on the card by manufacture. This MAC address is globally unique.
Comparison of Hub and Switch
Hub is broadcasting device while switch is point-to-point communication
device.
Hub operates at physical layer while switch operates at data link layer.
Switch can be used as a repeater but hub cannot be used as repeater.
Switch uses switching table to find out the correct destination while hub
simply broadcasts the incoming packet.
Repeaters: Repeaters (refer to Figure 3.2) are devices that operate at the
physical layer of the OSI model. The basic purpose of a repeater is to extend

Sikkim Manipal University

Page No. 41

E-Commerce

Unit 3

the distance of LAN. Their primary purpose is simply to regenerate a signal


received from input and correct the signal to its original state for output.
Pure Networking
10/100 Ethernet
Switch (LB8516A)
Workgroup Repeaters
(Fiber to AUI ST)
(LE4204A-R3)

Standard Ethernet Cable


(LCN100)

Duplex Fiber Optic Cable (EFN062),


upto 1.2 miles (1.9 km)
PC
Figure 3.2 Repeater

Network Interface Card (NIC): The primary function of NIC is to allow the
computer to communicate on the network. It supports transmitting, receiving
and controlling traffic with other computer on the network. NIC operates at
physical layer of OSI model. MAC address is hard coded onto the card by
manufacturer. This MAC address is globally unique and is of 48 bits. The MAC
address provides a way to distinguish one NIC from other NIC. These MAC
addresses are also called physical address.
Bridge: A bridge (refer to Figure 3.3) is a device that is attached to two or more
LANs to create an extended LAN. The LANs to be interconnected may be similar
or dissimilar. As each type of LAN has different MAC frame structure, the bridge
takes care of these differences by reformatting the frames.
Manufacturing Database Server

Bridge

Corporate LAN Segment

Manufacturing Segment

Figure 3.3 Bridge

Sikkim Manipal University

Page No. 42

E-Commerce

Unit 3

Router: A router (refer to Figure 3.4) operates at the third network layer of ISOOSI model. It connects more than two different types of network. Router
determines the short path between source and destination for data transmission.
Windows
Small Business
Server
Internet

Router device
with an assigned
IP address

Client computers

Switch
or hub
Figure 3.4 Router

Table 3.1 shows the similarities and differences between a router and a
bridge.
Table 3.1 Similarities and Differences between a Router and a Bridge
1
2
3
4
5
6

Router
Router operates network layer of
OSI model.
Routers are relatively expensive.
Routers are difficult to set up and
configure.
Routers can accommodate multiple
paths.
Routers can join two different
networks.
Routers can be both hardware and
software device.

Bridge
Bridge operates the data link layer
of OSI model.
Bridges are relatively inexpensive.
Bridges are relatively easy to
configure.
Bridges can accommodate single
path.
Bridges
extend
the
existing
networks.
Bridges can be both hardware and
software device.

Activity 1
How much better are todays web servers compared to what was available
ten years back? Refer the Internet and give a detailed answer.

Sikkim Manipal University

Page No. 43

E-Commerce

Unit 3

Self-Assessment Questions
3. State whether the following statements are true or false.
(a) Switch is broadcasting device while hub is point-to-point
communication device.
(b) Routers are very cheap.

3.5 Network Cables


Network cables are the medium through which information generally travels
from one node/network device to another. There are many types of cables which
are used for computer network. In some cases, a network will utilize only one
type of cable, while other networks will use a variety of cable types. The type of
cable chosen for a network is related to the networks topology, protocol, and
size. Understanding the characteristics of different types of cable and how they
relate to other aspects of a network is necessary for the development of a
successful network.
There are following types of cables used in networks and other related
topics.
Fibre optic cable
Cable installation guides
Wireless LANs
Unshielded Twisted Pair (UTP) cable
Shielded Twisted Pair (STP) cable
Coaxial cable
Fibre optic cable
Fibre optic cabling (refer to Figure 3.5) consists of a centre glass core surrounded
by several layers of protective materials. It transmits light rather than electronic
signals eliminating the problem of electrical interference. This makes it ideal for
certain environments that contain a large amount of electrical interference. It is
also the standard for connecting networks between buildings, due to its immunity
to the effects of moisture and lighting.
Fibre optic cable has the capability to transmit signals over much longer
distances than coaxial and twisted pairs. It also has the capability to carry
Sikkim Manipal University

Page No. 44

E-Commerce

Unit 3

information at superior speeds. This capacity broadens communication


possibilities to include services such as video conferencing and interactive
services. The cost of fibre optic cabling is comparable to copper cabling; however,
it is more difficult to install and modify.
The centre core of fibre cables is made from glass or plastic fibres. A
plastic coating then cushions the fibre centre, and kevlar fibres help to strengthen
the cables and prevent breakage. The outer insulating jacket is made of teflon
or PVC.

Figure 3.5 Fibre Optic Cable

There are two common types of fibre cables single mode and multimode.
Multimode cable has a larger diameter; however, both cables provide high
bandwidth at high speeds. Single mode can provide more distance, but it is
more expensive.
Specification
10BaseT
10Base2
10Base5
100BaseT
100BaseFX
100BaseBX
100BaseSX
1000BaseT
1000BaseFX
1000BaseBX
1000BaseSX

Cable Type
Unshielded Twisted Pair
Thin Coaxial
Thick Coaxial
Unshielded Twisted Pair
Fibre Optic
Single mode Fibre
Multimode Fibre
Unshielded Twisted Pair
Fibre Optic
Single mode Fibre
Multimode Fibre

Installing cablesome guidelines


When running cable, it is best to follow a few simple rules:
If it is necessary to run cable across the floor, cover the cable with cable
protectors.
Label both ends of each cable.
Use cable ties (not tape) to keep cables in the same location together.
Always use more cable than you need. Leave plenty of slack.
Sikkim Manipal University

Page No. 45

E-Commerce

Unit 3

Test every part of a network as you install it. Even if it is brand new, it may
have problems that will be difficult to isolate later.
Stay at least 3 feet away from fluorescent light boxes and other sources
of electrical interference.
Wireless LANs

Figure 3.6 Wireless LANs

Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of transceiver/
antenna to send and receive the data. Information is relayed between
transceivers as if they were physically connected. For longer distances, wireless
communications can also take place through microwave transmission, cellular
telephone technology or by satellite.
Wireless networks are great for allowing laptop, desktop, portable devices,
or remote computers to connect to the LAN. Wireless networks are also beneficial
in older buildings where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools
are line-of-sight and scattered broadcast. Line-of-sight communication means
that there must be an unblocked direct line between the workstation and the
transceiver. If a person walks within the line-of-sight while there is a transmission,
the information would need to be sent again. This kind of obstruction can slow
down the wireless network. Scattered infrared communication is a broadcast of
infrared transmissions sent out in multiple directions that bounces off walls and
ceilings until it eventually hits the receiver. Networking communications with
laser are virtually the same as line-of-sight infrared networks.
Advantages of wireless networks:
Cost: Setting up a wireless network can be much more cost effective than
buying and installing cables.

Sikkim Manipal University

Page No. 46

E-Commerce

Unit 3

Expandability: Adding new computers to a wireless network is as easy as


turning the computer on (as long as you do not exceed the maximum
number of devices).
Mobility: With a laptop computer or mobile device, access can be available
throughout a school, at the mall, on an airplane, etc. More and more
businesses are also offering free Wi-Fi access (Hot spots).
Fast setup: If your computer has a wireless adapter, locating a wireless
network can be as simple as clicking Connect to a Networkin some
cases, you will connect automatically to networks within range.
Disadvantages of wireless networks:
Inconsistent connections: How many times have you said to yourself,
Wait a minute, I just lost my connection? Because of the interference
caused by electrical devices and/or items blocking the path of transmission,
wireless connections are not nearly as stable as those through a dedicated
cable.
Speed: The transmission speed of wireless networks is improving;
however, faster options (such as gigabit Ethernet) are available via cables.
If you are only using wireless for Internet access, the actual Internet
connection for your home or school is generally slower than the wireless
network devices, so that connection is the bottleneck. If you are also
moving large amounts of data around a private network, a cabled
connection will enable that work to proceed much faster.
Security: Protect sensitive data with backups, isolated private networks,
strong encryption and passwords, and check network access traffic to
and from the wireless network.
Interference: Because wireless networks deploy radio signals and similar
techniques for transmission, they are vulnerable to intrusion from lights
and electronic devices.
Unshielded Twisted Pair
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks.

Sikkim Manipal University

Page No. 47

E-Commerce

Unit 3

Figure 3.7 Unshielded Twisted Pair

The quality of UTP (refer to Figure 3.7) may range from telephone-grade
wire to extremely high-speed cable. This cable has four pairs of wires inside the
jacket. Each pair is twisted with a different number of twists per inch that helps
to eliminate interference from adjoining pairs and other electrical devices. The
Electronic Industry Association/Telecommunication Industry Association
(EIA/TIA) has set standards of UTP and rated six categories of wire, which are
as follows.
Category
1
2
3
4
5
6
7

Speed
1 Mbps
4 Mbps
16 Mbps
20 Mbps
100 Mbps (2 pair)
1000 Mbps (4 pair)
1,000 Mbps
10,000 Mbps

Use
Voice Only (Telephone Wire)
Local Talk & Telephone (Rarely used)
10BaseT Ethernet
Token Ring (Rarely used)
100BaseT Ethernet
Gigabit Ethernet
Gigabit Ethernet
Gigabit Ethernet

Unshielded Twisted Pair connector


The standard connector for unshielded twisted pair cabling is known as RJ-45
connector (refer to Figure 3.8). This is a plastic connector that looks like a large
telephone-style connector. A slot allows the RJ-45 to be inserted only one way.
RJ stands for Registered Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard assigns which wire goes
with each pin inside the connector.

Figure 3.8 RJ-45 Connector


Sikkim Manipal University

Page No. 48

E-Commerce

Unit 3

Shielded Twisted Pair (STP) cable


UTP cable is the least expensive cable; it may be disposed to radio and electrical
frequency interference (it should not be too close to electric motors, fluorescent
lights, etc.). If you must place cable in environments with lots of potential
interference, or if you must place cable in extremely sensitive environments
that may be susceptible to the electrical current in the UTP, shielded twisted
pair may be the solution. Shielded cables can also facilitate to extend the
maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
1. Each pair of wires is individually shielded with foil.
2. There is a foil or braid shield inside the jacket covering all wires.
3. There is a shield around each individual pair, as well as around the
entire group of wires.
Coaxial cable
Coaxial cable (refer to Figure 3.9) has a single copper conductor at its centre. A
plastic layer provides insulation between the centre conductor and a braided
metal shield. The metal shield facilitates to block any outside interference from
fluorescent lights, motors, as well as other computers.

Figure 3.9 Coaxial Cable

Coaxial cabling is not easy to install, but it comes with the advantage of
being highly resistant to signal interference. Also, it can support greater cable
lengths between network devices than twisted pair cable. The two types of
coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is known as thinnet. 10Base2 refers to the specifications
for thin coaxial cable moving Ethernet signals. The 2 refers to the approximate
maximum segment length being 200 metres. The maximum division length is
actually 185 metres. Thin coaxial cable has been popular in school networks,
particularly linear bus networks.
Thick coaxial cable is known as thicknet. 10Base5 refers to the
specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to
the maximum division length being 500 metres. Thick coaxial cable has an
extra protective plastic cover that helps keep moisture away from the centre

Sikkim Manipal University

Page No. 49

E-Commerce

Unit 3

conductor. This creates thick coaxial a great choice when running longer lengths
in a linear bus network. One disadvantage of thick coaxial is that it is not easily
bendable and quite difficult to install.
Coaxial cable connectors
A most common type of connector used with coaxial cables is the Bayone-NeillConcelman (BNC) connector (refer to Figure 3.10). There are different types of
adapters for BNC connectors, including a T-connector, barrel connector, and
terminator. Connectors are the most vulnerable points in any network. To help
avoid problems, always use the BNC connectors that screw onto the cable.

Figure 3.10 BNC Connector

Self-Assessment Questions
4. State whether the following statements are true or false.
(a) Coaxial cabling is extremely easy to install.
(b) One of the rarest forms of connectors is the Bayone-Neill-Concelman
(BNC) connector.
5. Fill in the blanks with appropriate words.
(a) Fibre optic cabling consists of a centre _____ core surrounded by
several layers of protective materials.
(b) The standard connector for unshielded twisted pair cabling is known
as _______connector.

3.6 Broadband Telecommunication


In general, broadband refers to telecommunication where a wide band of
frequencies is available to transmit information. There is wide range of
frequencies available, and information can be multiplexed and sent on many
different frequencies or channels within the band simultaneously. This way, more

Sikkim Manipal University

Page No. 50

E-Commerce

Unit 3

information can be transmitted in a shorter duration of time than what is


achievable with older methods of transmission.
One of the configurations that have been around for a number of years is
the integrated services digital network, or ISDN. This network design can be
used to relay voice and data over copper telephone lines. This may not be the
fastest option in fashion today; however, it does make it possible to access the
Internet without the requirement of a high-speed connection or a lot of resources.
Another common example is the asynchronous transfer mode, referred
to in the telecommunications world as ATM. This option is much quicker than
ISDN and has proven to be extremely handy for companies relying heavily on
the Internet and electronic communications.
Asynchronous Transfer Mode, (ATM), is a network technology based on
transferring data in cells or packets of a fixed size. The cell used with ATM is
smaller compared to units used with older technologies. This size of the cell
allows for an advantageATM equipment can transmit video, audio, and
computer data over the same network, and guarantee that no single type of
data clutters the line.
Some people opine that ATM is the definitive answer for the Internet
bandwidth problem; others and not so confident. ATM creates a fixed or route
between two points whenever data transfer begins. This differs from TCP/IP,
where messages are divided into packets and each packet can take a different
route from source to destination. This difference makes it easier to track and bill
data usage across an ATM network, but it renders it less adaptable to sudden
increases in network traffic.
Integrated Service Digital Network
Integrated Service Digital Network, (ISDN), is the original high-speed Internet
service. It sparked the high-speed Internet development between service
providers during the 1990s and, of course, revolutionized Internet use. Much
like its predecessor, the dial-up Internet service, ISDN utilizes a phone line. In
fact, it set the standard for telephone data service.
ISDN Internet service was the improvement upon dial-up, and it also paved
the way for DSL and cable-modem Internet service thereafter. It can be
considered the step of Internet evolution that lies between dial-up and DSL/
Cable. Modernizing Internet use and bringing high-speed access inside the
home, ISDN became the standard by which rival broadband Internet service
providers competed. Although ISDN Internet service still exists, like the dial-up

Sikkim Manipal University

Page No. 51

E-Commerce

Unit 3

connection it is being replaced by faster and cheaper services that the broadband
companies are providing. Regardless, broadband high-speed Internet service
is still compared with ISDN today, since they both represent the benchmark of
their times.
ISDN Internet service is basically a telephone-based network system that
operates by a circuit switch, or dedicated line, and is capable of transmitting
data and phone conversations digitally over normal telephone wires. This makes
it both faster and of higher quality than dial-up Internet service. During the 1990s
this revolutionized the way people did business. No longer would you have to
miss a call in order to access your Internet, or shut down the Internet to make a
telephone call. As such, ISDN Internet service made video teleconferencing not
only possible, but very popular as well.
There are two different types, or lines, of ISDN Internet service.
The first is a basic rate ISDN line. Called a Basic Rate Interface
(BRI), this line has two data, or bearer, channels that operate at 64
kbit/sec. Two or more ISDN-BRI lines can be combined as well,
yielding speeds of 256 kbit/sec. It is common to combine these lines
for video conferencing use or for transmitting data at higher speeds.
The second type of ISDN line is called a primary rate line, or Primary
Rate Interface (PRI). This line had 23 bearer channels and has a
total speed of 1,544 kbit/sec. It is used mostly for telephone
communication rather than data transmission, particularly within
companies that have large, private telephone exchange systems
operating inside their business.
The advantages of having ISDN Internet service definitely lies in the data
lines themselves. Not only do you have constant data speed via these lines,
each bearer channel runs at 64 kbit/sec with the ability to be combined to reach
greater speeds. ISDN Internet serviced also facilitates multiple data transmission,
so telephone calls and data downloading are no longer mutually exclusive. The
disadvantages, however, is that the digital clarity of ISDN voice communication
and its speedy data transmission come at an extra cost. ISDN is billed like a
phone line, but with an extra cost for service. Although its operational distance
from the ISDN central office is greater than that for DSL, its terminal adaptor
(similar to a modem) costs more than DSL or cable modems. While this
equipment and service continue to remain exorbitant, it is leaving the way open
for other Internet services to share the marketplace.

Sikkim Manipal University

Page No. 52

E-Commerce

Unit 3

Frame Relay
Frame Relay is a digital connection-oriented data service that sends packets of
data, called frames, over the network. This frame of data is transmitted through
the network and checked for errors. Frame Relay is designed for cost-efficient
data transmission for intermittent traffic between local area networks (LAN-toLAN) and between end-points in a wide area network (WAN). It is a data network
service bundled with leased line access for transmitting data between remote
networks. Frame Relay is a digital packet network service that provides all the
features and benefits of a dedicated network service without the expense of
multiple dedicated circuits. This data is carried in the form of packets and given
an ID on a per packet basis. It is then sent across the network in a very efficient
way. In a Frame Relay network, circuits are connected to a packet switch within
the network that ensures that packets are routed to the correct location. Frame
Relay is a digital dedicated service that is leased from a carrier. It is a switched
service.
Application-level security
Web applications can be protected from SQL Injection Attacks where
the attacker enters SQL commands into Web form input fields or URL
query strings to try to manipulate the SQL statement being sent to and
from the database. To avoid SQL injection attacks, the following methods
should be used:
o Use of queries or stored procedures to access a database as opposed
to using string concatenation
o Limitation the amount of characters in Web form input fields and
URL query strings to a proper amount
o Validate text input and URL query strings for improper characters
(e.g. apostrophe, dash)
o Do not display errors to the user that contain information about the
database or actual source code
ASP.Net Web applications must be secured from Cross Site Scripting
(XSS) attacks. To accomplish this, developers must ascertain that the
ASP.Net validateRequest Page directive is set to True (the default setting)
so that users of the application are prevented from entering HTML or
JavaScript code into Web forms.

Sikkim Manipal University

Page No. 53

E-Commerce

Unit 3

Data transmission security


When confidential or important data is passed between the user and the Web
server, the HTTPS (SSL over HTTP) protocol will be used. SSL provides server
authentication, data encryption (over the wire), and data transmission integrity.
The SSL certificate used on the Web server will need to be trusted by the Web
browsers listed on the CDEs Minimum Web Browser Requirement Web page.
Database security
Web applications should use minimum privileges to access database
objects (i.e. tables, views, stored procedures). For instance, if the Web
application needs read-only access to a specific database table, the
database permissions should be set accordingly than giving the Web
application admin or owner rights to the entire database.
Individual database fields storing confidential or sensitive data (for
example, passwords, social security number) must be stored using
encryption techniques.
Password requirements
Passwords whether created by application developers, administrators, or users
must meet or be required through validation to meet all of the following
parametres. Passwords must:
Be at least eight characters in length.
Contain characters from three of the following four categories:
o Uppercase letters (A though Z)
o Lowercase letters (a through z)
o Numbers (0 through 9)
o Special characters (!, @, #, $, ^, &, *, -, =, _, +, ?)
Not be the same as the logon or user name.
Activity 2
Select any two major broadband service providers in India and present
their pros and cons.

Sikkim Manipal University

Page No. 54

E-Commerce

Unit 3

Self-Assessment Questions
6. Fill in the blanks with appropriate words.
(a) _________ refers to telecommunication where a wide band of
frequencies is available to transmit information.
(b) __________ is a digital connection-oriented data service that sends
packets of data, called frames, over the network.
(c) Passwords must be at least _____ characters in length.

3.7 Summary
Let us recapitulate the important concepts discussed in this unit:
Common Gateway Interface (CGI) is a process used to share the data
between the web server and the web browser. CGI is a set of standards
where a program can send data back to the web server where it can be
processed.
CGI is the part of the Web server that can communicate with other different
programs running on the server. With CGI, the Web server can call up a
program, while passing user-specific data to the program (such as what
host the user is connecting from, or input the user has supplied using
HTML form syntax).
The primary function of NIC is to allow the computer to communicate on
the network. It supports transmitting, receiving and controlling traffic with
other computer on the network. NIC operates at physical layer of OSI
model.
Network cables are the medium through which information generally travels
from one node/network device to another. There are many types of cables
which are used for computer network. In some cases, a network will utilize
only one type of cable, while other networks will use a variety of cable
types.
Fibre optic cabling consists of a centre glass core surrounded by several
layers of protective materials. It transmits light rather than electronic signals
eliminating the problem of electrical interference. This makes it ideal for
certain environments that contain a large amount of electrical interference.
It is also the standard for connecting networks between buildings, due to
its immunity to the effects of moisture and lighting.
Sikkim Manipal University

Page No. 55

E-Commerce

Unit 3

Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of
transceiver/antenna to send and receive the data. Information is relayed
between transceivers as if they were physically connected.
In general, broadband refers to telecommunication where a wide band of
frequencies is available to transmit information. There is wide range of
frequencies available, and information can be multiplexed and sent on
many different frequencies or channels within the band simultaneously.
This way, more information can be transmitted in a shorter duration of
time than what is achievable with older methods of transmission.
Integrated Service Digital Network (ISDN), is the original high-speed
Internet service. It sparked the high-speed Internet development between
service providers during the 1990s and, of course, revolutionized Internet
use.

3.8 Glossary
Common Gateway Interface (CGI): Process used to share the data
between the web server and the web browser
Hubs: Central locations in networks that bring media segments together
Repeaters: devices that operate at the physical layer of the OSI model,
whose basic purpose is to extend the distance of LAN
Bridge: Device that is attached to two or more LANs to create an extended
LAN
Router: Operates at the third network layer of ISO-OSI model and
connects more than two different types of network
Network cables: Medium through which information generally travels
from one node/network device to another
Fibre optic cable: Cable that consists of a centre glass core surrounded
by several layers of protective materials, and which transmits light rather
than electronic signals
Wireless LANs: LANs that use high frequency radio signals, infrared
light beams, or lasers to communicate between the workstations, servers,
or hubs

Sikkim Manipal University

Page No. 56

E-Commerce

Unit 3

Line-of-sight communication: Communication through unblocked direct


line between the workstation and the transceiver

3.9 Terminal Questions


1. What is CGI?
2. Discuss the main features of CGI.
3. What are multimedia objects? Explain their use.
4. Write a note on any five network access equipment.
5. Discuss the use of network cables.
6. Describe the various types of broadband telecommunication available.

3.10 Answers
Answers to Self-Assessment Questions
1. (a) True; (b) False
2. (a) Content; (b) Object-oriented, Data-driven
3. (a) False; (b) False
4. (a) False; (b) True
5. (a) Glass; (b) RJ-45
6. (a) Broadband; (b) Frame Relay; (c) Eight

Answers to Terminal Questions


1. Refer to Section 3.2
2. Refer to Section 3.2
3. Refer to Section 3.3
4. Refer to Section 3.4
5. Refer to Section 3.5
6. Refer to Section 3.6

Sikkim Manipal University

Page No. 57

E-Commerce

Unit 3

References
1. Laudon, Kenneth C. and Carol Guercio Traver. 2004. E-Commerce:
Business, Technology, Society. N.J: Prentice Hall.
2. Turban, Efraim, Jae Kuy Lee and Michael Chung. 1999. Electronic
Commerce: A Managerial Perspective. Prentice Hall.
3. Whitley, David. 1998. E-commerce: Strategy, Technologies and
Applications. Tata McGraw-Hill.

Sikkim Manipal University

Page No. 58

You might also like