It Notes
It Notes
. On the internet, there is a suite of the protocols known as TCP/IP protocols that are consisting of transmission control protocol, internet protocol, file transfer protocol, dynamic host configuration protocol, Border gateway protocol and a number of other protocols. Protocols Properties Different protocols perform different functions so it is difficult to generalize the properties of the protocols. There are some basic properties of most of the protocols. Detection of the physical (wired or wireless connection) Handshaking How to format a message. How to send and receive a message. Negotiation of the various connections Correction of the corrupted or improperly formatted messages. Termination of the session. ) TCP/IP -- (Transmission Control Protocol/Internet Protocol TCP is a connection based protocol and, is designed to guarantee delivery by monitoring the connection between source and destination before data is transmitted. TCP places packets in sequential order and requires acknowledgment from the receiving node that they arrived properly before any new data is sent. A connection based Internet protocol responsible for breaking data into packets, which the IP protocol sends over the network. IP is responsible for routing packets by their IP address. Internet protocol (ip)
IP Number -- (Internet Protocol Number) An Internet Protocol
address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing
Sometimes called a dotted quad. A unique number consisting of 4 parts separated by dots, e.g. 165.113.245.2
Any
participating computer networking device such as routers, computers, printers, internet fax machines and switches may have their own unique IP address. Personal information about someone can be found by the IP address. Every domain on the internet must have a unique or shared IP addressIP addresses are represented in dotdecimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 192.168.254.1. Each part represents a group of 8 bits (octet) of the address.
IP addresses are hierarchical in nature - that is to say, one part of the address will specify broadly in which region of the network the destination can be found, with subsequent parts of the address providing more specific information about the location of the target device within that region. ii) IPv4 (Internet Protocol, version 4)
The most widely used version of the Internet Protocol (the "IP" part of
TCP/IP.) IPv4 allows for a theoretical maximum of approximately four billion IP Numbers (technically 232),. iii) IPv6 -- (Internet Protocol, version 6)
The successor to IPv4.
IPv6 provides a huge number of available IP Numbers - over a sextillion addresses (theoretically 2128). IPv6 allows every device on the planet to have its own IP Number
iv) FTP -- (File Transfer Protocol) A very common method of moving files between two Internet sites. FTP or file transfer protocol is used to transfer (upload/download) data from one computer to another over the internet or through or computer network. FTP is a most commonly communication protocol for transferring the files over the internet.
Typically, there are two computers are involved in the transferring the files a server and a client. The client computer initiates a connection with the remote computer (server). After successfully connected with the server, the client computer can perform a number of the operations like downloading the files, uploading, renaming and deleting the files, creating the new folders etc. v) HTTP -- (Hypertext Transfer Protocol) Hypertext transfer protocol is a method of transmitting the information on the web. HTTP basically publishes and retrieves the HTTP pages on the World Wide Web.
The protocol for moving hypertextfiles across the Internet
HTTP is a language that is used to communicate between the browser and web server. The information that is transferred using HTTP can be plain text, audio, video, images, and hypertext. HTTP is a request/response protocol between the client and server. Many proxies, tunnels, and gateways can be existing between the web browser (client) and server (web server). An HTTP client initializes a request by establishing a TCP connection to a particular port on the remote host. An HTTP server listens to that port and receives a request message from the client. Upon receiving the request, server sends back OK messages, its own message, an error message or other message. vi) SOAP -- (Simple Object Access Protocol)
SOAP, is a protocol specification for exchanging structured information
in the implementation of Web Services in computer networks. It relies on Extensible Markup Language (XML) for its message format, This XML based protocol consists of three parts: an envelope, which defines what is in the message and how to process it, a set of encoding rules for expressing instances of application-defined datatypes, and a convention for representing procedure calls and responses SOAP provides for more sophisticated handling of complex data being sent between a client and a server. Microsoft's ".NET" system is largely based on SOAP.
handshaking to set up end-to-end communications. Once a connection is set up user data may be sent bi-directionally over the connection.
Reliable TCP manages message acknowledgment, retransmission
and timeout. Multiple attempts to deliver the message are made. If it gets lost along the way, the server will re-request the lost part. In TCP, there's either no missing data, or, in case of multiple timeouts, the connection is dropped.
Ordered if two messages are sent over a connection in sequence,
the first message will reach the receiving application first. When data segments arrive in the wrong order, TCP buffers the out-of-order data until all data can be properly re-ordered and delivered to the application.
Heavyweight TCP requires three packets to set up a socket
connection, before any user data can be sent. TCP handles reliability and congestion control
UDP
is a simpler message-based connectionless protocol Connectionless protocols do not set up a dedicated end-to-end connection. Communication is achieved by transmitting information in one direction from source to destination without verifying the readiness or state of the receiver. reach its destination; it could get lost along the way. There is no concept of acknowledgment, retransmission or timeout.
Not ordered If two messages are sent to the same recipient, the
E commerce refers to the paperless exchange of business information using electronic mail, electronics funds transfer and network based technologies.
E com encompasses the entire online processes of developing, marketing, selling, delivering, and paying for products and services.
E-commerce includes Commercial transactions such as Electronic trading of goods and services Online delivery of digital content Electronic fund transfers Electronic share trading Electronic bills of lading Collaborative designs and engineering Online sourcing Public procurement Direct and consumer market E-COMMERCE Models Business-to-Business (B2B) Business-to-Consumer (B2C) Consumer-to-Consumer (C2C) Consumer-to-Business (C2B) Business-to-Government (B2G) Government-to-Business (G2B) Government-to-citizen (G2C) Business-to-Business (B2B) E-commerce Business to Business web sites sell the product to the intermediate buyer who takes the product to the final
consumer. e.g. A wholesaler places an order though the companys web site for fresh stock and receives processed order in the form of shipped supplies. The wholesaler then sells the supplies to the final consumer who walks into the retail outlet. INTEL IS SELLING ITS CHIPS TO OTHER Businesses. It is also called the EDI, which is commonly used and largest form of e commerce. In this, both the buyers and sellers are companies such as manufacturers and wholesalers This type of e-commerce is privately held, since only business companies can qualify as potential buyers. Websites related to (B2B)
Commodityindia.com: It provides Comprehensive data/news/research service for corporate, HNI's, Brokers, Financial Institutions and banks covering the spot Indiaconstruction.com: It enables buyers and sellers of construction material and equipment to come together on a common platform to transact business in a quick, reliable and transparent manner. 2. Business-to-Consumer (B2C) E-commerce B2C is a web site where all transactions take place between a business organization and the final consumer. For example, a customer would log into a site and go for details. if he wants to buy a product, an order would be placed and sent an e-mail to the office of the business organisation. The e-mail would be received at the office, goods would be dispatched, and the customer would receive the ordered goods. Customer identifies a need. Searches for the product or services to satisfy the need. Selects a vendor and negotiates a price. Receives the product or services (delivery logistics, inspection and acceptance).
Makes payment. Gets service and warranty claims. Websites related to (B2C) Amazon.com Hotels.com
3. Consumer-to-Consumer (C2C) E-Commerce In this category consumers sell directly to consumer. Example are individuals selling residential property, Cars and so on. If u have something to sell, then u get it listed at an auction site, and others can bid for Web sites related to (C2C) ICQ.COM MSN.COM BIDORBUY.COM 4. Consumer-to-BUSINESS (C2B) e-commerce Consumer posts his project with a set budget online and within hours companies reviews the consumers request and bid on project. Web sites related to (C2B) Priceline.com Reverseauction.com 5. Business-to-government(B2G) A B2G is a derivative of B2B marketing and often referred to as PUBLIC SECTOR MARKETING which encompasses products and services to various government level including federal, state and local.
B to G network provides a platform for business to bid on government opportunities which are presented as solicitation in a reverse auction fashion. 6. Government-to-business(G2B) G2B is an online non-commercial interaction between local and central government and a commercial business sector, rather than private individuals(G2C). www.dti.gov.uk is a government website where business can get information and advice on e-business. 7. Government-to-Citizen A G2C is a communication link between government and private individual and residents. Such G2C communication must often refer to that which takes place through information communication technology (ICT)
Advantages of E-commerce E-commerce allows people to carry out businesses without the barriers of time or distance. One can log on to the Internet at any point of time, be it day or night and purchase or sell anything one desires at a single click of the mouse. The direct cost-of-sale for an order taken from a web site is lower than through traditional means (retail, paper based), as there is no human interaction during the on-line electronic purchase order process Another important benefit of Ecommerce is means of doing business. that it is the cheapest
For business concerns, e-commerce significantly cuts down the cost associated with marketing, customer care, processing, information storage and inventory management. Disadvantages of E-commerce Lack of touch and feel online
Security and privacy Cost and justification Lack of trust and user resistance There r not enough buyer and seller There r not enough support services Still evolving and changing rapidly
Portals
A web portal, also known as a links page, presents information from
diverse sources in a unified way. A portal is a web site that acts as a single source for all information on a specific domain.
Web portals offer other services such as e-mail, news, stock prices,
information, databases and entertainment. Portals provide a way for enterprises to provide a consistent look and feel with access control and procedures for multiple applications and databases, which otherwise would have been different entities altogether. An effective Web portal offers the user a broad array of information, arranged in a way that is most convenient for the user to access. When designed, implemented and maintained correctly a web portal becomes the starting or entry point of a web user introducing him into various information, resources and other sites in the internet. It has the power to draw together a common group of people, common on the basis of their age, profession Types
I)
Personal portals: Personal portals can be related to any specific topic such as providing friend information on a social network or providing links to outside content that may help others beyond your reach of services. News portals: E.g .Samacher.com III) Government web portals :Examples
II)
australia.gov.au for Australia. USA.gov for the United States (in English) & GobiernoUSA.gov (in
Spanish).
Disability.gov for citizens with disabilities in the United States. Directgov for citizens & for businesses in the United Kingdom. india.gov.in for India. Europa (web portal) links to all EU agencies and institutions in addition
iv) Corporate web portals: Portal solutions can include workflow management, collaboration between work groups, and policy-managed content publication Corporate Portals also offer customers & employees self-service opportunities.
v) Stock Portals Also known as Stock-share Portals, Stock market portals or Stock exchange portals are Web-based applications that facilitates the process of informing the share-holders with substantial online data such as the latest price, ask/bids, the latest News, reports and announcements. Some stock portals allows visitors to buy or sell their shares or manage their finance. Vertical Enterprise Portals vs Horizontal Enterprise Portals
Vertical Portals (Vortals): These are web portals which focus only on
one specific industry, domain or vertical. Vertical portals or vortals simply provide tools, information, articles, research and statistics on the specific industry such as, insurance, automobiles, etc Vortals provide an ideal gateway for businesses to market their products & services and to gain exposure within their vertical by developing and using vortals.
Classic examples of vertical portals are cnet.com which focuses only on computer and related issues, mp3.com only on mp3 audio etc. Most of the times, vertical portals offer information and services customized to niche audiences about a particular area of interest.
Horizontal Portals: These are web portals which focus on a wide array
of interests and topics. They focus on general audience and try to present something for everybody. Horizontal portals try act as an entry point of a web surfer into the internet, providing content on the topic of interest and guiding towards the right direction to fetch more related resources and information. Examples of horizontal portals are yahoo.com, msn.com etc which provide visitors with information and on a wide area of topics. Horizontal portals target the entire Internet community. These sites, often referred to as "megaportals", usually contain search engines and provide the ability for user to personalize the page by offering various channels (i.e. access to other information such as regional weather, stock quotes or news updates). Domain Name system Domain names are simple identification labels to indicate ownership or control of a resource. Domain names can be used to give you a unique, permanent address. It is the permanent address that can follow you no matter where you are located For example, in the web site address "http://example.com/index.html" the domain name is example.com.
Domain names always have 2 or more parts, separated by dots. The
part on the left is the most specific, and the part on the right is the most general like .com, .net ,.edu or org extension. Domain names are used to establish a unique identity in internet.
It allow users connected to the Internet the ability to find web sites without having to memorize the long, numerical (IP) addresses that actually locate the computers or servers on the Internet. Organizations choose a Domain name that corresponds to their company name. For e.g. web site is cgclandran.com DNS is the Internet system to translate domain names into IP addresses It translate or associate human-friendly computer hostnames into IP addresses.
For example, the domain name www.example.com translates to the addresses 192.0.32.10
An IP (Internet Protocol) address is like a phone number to a computer. IP address can be hard to remember. So Instead of having to remember, 216.226.138.60 we only have to remember www.example.com
Namespace
A namespace is a collection of names, The main idea of a name space
space. Names in a namespace cannot have more than one meaning, that is, its components cannot share the same name. Name Space Functions There are several aspects to what the name space defines in a name system:
Name Size and Maximum Number of Names: The name space
specifies the number of characters (symbols) that comprise names. In so doing, it also defines the maximum number of names that can appear in the system.
Name Rules and Syntax: The name space specifies what characters
or symbols are allowed in a name. This is used to allow legal names to be chosen for all devices while avoiding illegal names.
Name Architecture and Semantics: Each name space uses a
specific architecture or structure, which describes how names are constructed and interpreted. Types are: Flat Hierarchical Flat Namespace Names are assigned as a sequence of symbols that are interpreted as a single, whole label without any internal structure. There is no clear relationship between any name and any other name. E.g. An encyclopedia is a classic flat namespace Each host given a name It require special file and Central authority to keep name-address mapping. All hosts must know the current mapping for all other hosts with which they want to communicate Makes the hostname file too large and the entire scheme unmanageable and impractical in any large network (ex., Internet)
Hierarchical Namespace
Break complete namespace into domains
Delegate task of name allocation / resolution Name allocation for any subdomain left to subdomain authority Name resolution done by name server for subdomain
that exist in a larger network. The domains exist at different levels and connect in a hierarchy that resembles the root structure of a tree.
Each domain extends from the node above it, beginning at the top with
the root-level domain. Under the root-level domain are the top-level domains, under those are the second-level domains, and on down into subdomains.
DNS namespace identifies the structure of the domains that combine to form a complete domain name. For example, in the domain name sub.secondary.com, "com" is the top-level domain, "secondary" identifies the secondary domain name (commonly a site hosted by an organization and/or business), and "sub" identifies a subdomain within the larger network. This entire DNS domain structure is called the DNS namespace. The name assigned to a domain or computer relates to its position in the namespace.
Top level domains like com, edu, gov, net, int, org, in, country specific domains (us, in, kr etc.) are managed by delegated authorities.
E Commerce Security Basic Issues authentication: sender and recipient must prove their identities to each other privacy: information must be kept from unauthorized parties. integrity: message must not be altered or tampered with.
Security Requirements for e-commerce The security infrastructure needs to have the following basic capabilities: I) Identification/authentication: This is the first step of any security and privacy process: being able to tell who users are. A good security infrastructure is that can do this quickly and accurately and creates a good experience for customers and partners. II) Authorization: Once the system determines who users are and that they are who they say they are it must provide the correct levels of access to different applications and stores of information. III) Asset Protection: The system must keep information confidential and private. This has become more difficult in the modern e-business environment, where information is traveling across multiple, often untrusted, networks. IV) Accountability: This is the ability to keep track of who has done what with what data. E-Business solutions also need to ensure that participants in transactions are accountable v) Administration: This involves defining security policies and implementing them consistently across the different platforms and networks. VI) Assurance:
This demands mechanisms that show the security solutions are working, through methods such as proactive detection of viruses or intrusions, periodic reports, incident recording, and so forth. VII) Availability: Modern e-businesses must prevent interruptions of service, even during major attacks. This means that the solution must have built-in fault tolerance and applications and procedures to quickly bring systems back online. IT managers must be able to make changes to the system 24 x 7. Polices of security measure
I) Privacy policy: Privacy polices architecture the manner in which a
company collects, uses, protects data, and the choices they offer consumers to exercise rights when their personal information is used. On the basis of this policy, consumers can determine whether and to what extent they wish to make information available to companies
ii) Cryptography
It is the methods to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge It is the methods to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge
Cryptography can be done through: 1- Secret key cipher system. 2- Public-key cipher system 1. Secret key cryptography is the method in which to write things in secret. There are two main type of secret key cryptography, A) Transposition cipher , encrypt the original message by changing characters order in which they occurred. B) Substitution cipher, the original message was encrypted by replacing there characters with other characters. In both types, both the sender and receiver share the same secret keys.. 2. Public key method use twos different but mathematically related, keys a public key and a private key. The public key is typically used for encryption, while the private or secret key is used for decryption III)Certificate Certificates bind identity, authority, public key, and the other information to a user. An certificate contains such information as the: 1- Certificate holders name and identifier. 2- Certificate holders public key information.
3- Key usage limitation definition. 4- Certificate policy information. 5- Certificate issuers name and identifier. 6- Certificate Validity period. In todays E-commerce environment, buyers may get personal certificates to prove their identity to a web site but it is the vendor sites that really need to have certificates to prove their identity to buyers.