33
CSC330 ELECTRONIC COMMERCE Mr. Dilawar Lecturer, Department of Computer Science, Jahan University Kabul, Afghanistan.

E-Commerce - Lecture 5

Embed Size (px)

Citation preview

Page 1: E-Commerce - Lecture 5

CSC330ELECTRONIC COMMERCE

Mr. Dilawar

Lecturer,Department of Computer Science,

Jahan UniversityKabul, Afghanistan.

Page 2: E-Commerce - Lecture 5

E-Commerce Infrastructure: The Internet, Web, and Mobile PlatformChapter 3

Page 3: E-Commerce - Lecture 5

Objectives• Define the origins and evolution of the internet.

• Identify the key technologies concepts behind the internet.

• Describe the role of internet protocols and utility programs.

• Explain the current structure of internet.

• Understand the limitations of todays internet.

• Describe the potential capabilities of internet II.

• Understand how the world wide web works.

• Describe how internet and web features and services support e-commerce.

Page 4: E-Commerce - Lecture 5

Lecture Outline• The Internet: Technology Backward• Evolution of Internet• The Internet: Key Technology Concept• The New Client: Mobile Platform• Cloud Computing Model• Other Internet Protocols and Utility Programs

Page 5: E-Commerce - Lecture 5

The Internet: Technology BackwardEvolution of Internet• Innovation

• Institutionalization

• Commercialization

Page 6: E-Commerce - Lecture 5

The Internet: Technology BackwardEvolution of InternetInnovation Phase (1964 – 1974)

• The basic building blocks were introduced such as: packet-switching hardware, client/server computing, and a communication protocol called TCP/IP.

• The original purpose of internet was to link large mainframe computers on different university/college campuses.

• This kind of one-to-one communication between campuses was previously possible only through the telephone system or postal mail.

Page 7: E-Commerce - Lecture 5

The Internet: Technology BackwardEvolution of InternetInstitutionalization Phase (1975 – 1994)

• Large institution such as US Department of Defense (DoD) and the National Science Foundation (NSF) provided funding for the growth and the invention of the internet.

• DoD contributed $1 million to further develop the network into a robust military communications system so that it could operate and helpful during nuclear war.

• In 1986, the NSF assumed responsibility for the development of a civilian internet NSFNET and began a ten-year-long $200 million expansion program.

Page 8: E-Commerce - Lecture 5

The Internet: Technology BackwardEvolution of InternetCommercialization Phase (1995– till present)

• Government agencies encouraged private corporations to take over and expand both the internet backbone and local services to ordinary citizens who were not students.

• By 2000, the internet’s use had expanded well beyond military installations and research universities and came into the public domain.

Page 9: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology Concept• Packet Switching

• TCP/IP communication protocol

• IP Addresses

• Domain Names, DNS and URLs

• Client/server computing

Page 10: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology Concept• Packet Switching

• TCP/IP communication protocol

• IP Addresses

• Domain Names, DNS and URLs

• Client/server computing

Page 11: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptPacket Switching

• Mode of data transmission in which digital messages are broken into packets.

• Sends packets along different communication paths as they become available.

• Reassembles packets once they arrive at destination.

Page 12: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptPacket Switching

• Uses of Routers• Special purpose computers that interconnect the computer networks to make

up the internet and specifies route for packets.• Routing algorithms ensures packets take the best available path toward their

destination.

• Less expensive, wasteful then circuit switching.

Page 13: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology Concept

Page 14: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptTCP/IP communication Protocol

• A protocol is a set of rules and procedures used for communication.• Sending a letter to a friend.

Page 15: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptTCP/IP communication Protocol

• TCP protocol is a protocol that establishes the connections among sending and receiving web computers – one to one connection.

• Handles the assembly of packets at the point of transmission and their reassembly at the receiving end.

• Connection oriented communication.

Page 16: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptTCP/IP communication Protocol

• Connection oriented communication means that a connection must be established before the data can be exchanged.

• TCP uses a three-way handshake to establish this connection.

1. Hi, I would like to talk. Here is the information you will need to communicate with me.

2. Thanks, I got it. Here is the information you will need to communicate with me.

3. Okay, I got it. Let’s begin talking.

Page 17: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptTCP/IP communication Protocol

• IP protocol is a protocol that provides the Internet’s addressing scheme and is responsible for the actual delivery of the packets.• Addressing• Routing

Page 18: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptIP Addresses

• Internet address expressed a unique number that appears as a series numbers separated with periods, such as 64.49.254.91 carrying the address of an individual machine on the internet.

• An address that is used to uniquely identify a computer on a network.

• The Network ID portion of the IP Address identifies the network where the computer sits.

• The Host ID portion of the IP Address uniquely identifies the computer on its network.

Page 19: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptIP Addresses

IP Address: 192.168.10.1

Network ID Host ID

Page 20: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptIP Addresses

IP Address: 192.168.10.1Subnet Mask: 255.255.255.0

Network ID Host ID

IP Address: 172.91.10.1Subnet Mask: 255.255.0.0

Network ID Host ID

IP Address: 10.1.10.1Subnet Mask: 255.0.0.0

Network ID Host ID

Page 21: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptIP Addresses

• Originally IP Addresses where divided into different class ranges.• Class A: 1 – 126 255.0.0.0• Class B: 128 – 191 255.255.0.0• Class C: 192 – 223 255.255.255.0• Class D: 224 – 239 Multicast• Class E: 240 – 243 Experimental

Page 22: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptIP Addresses

• Class A: 126 Networks – 16,777,214 Hosts

• Class B: 16,384 Networks – 65,534 Hosts

• Class C: 2,097,152 Networks – 254 Hosts

• Total of 3,720,314,628 host addresses available.

Page 23: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptIP Addresses

• Computers can get IP addresses either • Statically• From a DHCP Server

• If both not present, the computer takes APIPA.

Page 24: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptDomain Name

• IP address expressed in natural language.

• You can find the IP through ping.

Domain Name System (DNS)

• Allows numeric IP addresses to be expressed in natural language.

Page 25: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptUniform Resource Locator

• Address used by web browsers to identify location of content on the web.

Page 26: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptHow to Pick a Domain Name

• If you sell bricks, pick a domain name containing a word like brick.

• Consider name length and ease of remembering the name.

• Make sure the domain name is easy for web users to remember and find.

• Do not use extra hyphens.

• The domain name should suggest the nature of your product or service.

• The domain name should serve as a trademarks.

• The domain name should be free of legal conflicts.

Page 27: E-Commerce - Lecture 5

The Internet: Technology BackwardThe Internet: Key Technology ConceptRegistering a Domain Name

• If you are interested a domain in Pakistan (.pk) you may use:• https://nexus.pk/pknic.php

• If you want to register an international domain (.com) you may try:• http://www.register.com/• http://hostdomain.com/

Page 28: E-Commerce - Lecture 5

The Internet: Technology BackwardThe New Client: Mobile Platform• Within a few years, primary Internet access will be through:• Netbooks

• Designed to connect to wireless Internet.

• Under 2 lbs, solid memory, 8in displays $200-$400.

• Smartphones• Disruptive technology: processors , operating system.

Page 29: E-Commerce - Lecture 5

The Internet: Technology BackwardThe New Client: Mobile Platform• Within a few years, primary Internet access will be through:• Netbooks

• Designed to connect to wireless Internet.

• Under 2 lbs, solid memory, 8in displays $200-$400.

• Smartphones• Disruptive technology: processors , operating system.

Page 30: E-Commerce - Lecture 5

The Internet: Technology BackwardCloud Computing• Cloud computing enables companies to consume compute resources

as a utility -- just like electricity -- rather than having to build and maintain computing infrastructures in-house.

• Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.

• The word cloud computing means a type of internet-based computing, where different services – such as servers, storage and applications – are delivered to an organization’s computers and devices through the internet.

Page 31: E-Commerce - Lecture 5

The Internet: Technology BackwardOther Internet Protocols and Utility Programs• Internet Protocols• HTTP• Email: SMTP, POP3, IMAP• FTP, Telnet, SSL

Page 32: E-Commerce - Lecture 5

Summery• The Internet: Technology Backward• Evolution of Internet• The Internet: Key Technology Concept• The New Client: Mobile Platform• Cloud Computing Model• Other Internet Protocols and Utility Programs

Page 33: E-Commerce - Lecture 5

Thank YouFor your Patience