SlideShare ist ein Scribd-Unternehmen logo
1 von 70
Internetworking
•   Internetworking involves connecting two or
    more distinct computer networks or network
    segments via a common routing technology.
    The result is called an internetwork (often
    shortened to internet).
•   The most notable example of internetworking
    is the Internet (capitalized), a network of
    networks based on many underlying hardware
    technologies,     but     unified   by     an
    internetworking protocol standard, called the
    Internet Protocol Suite (TCP/IP).
• An internetwork is a collection of individual
  networks, connected by intermediate
  networking devices, that functions as a
  single large network. Internetworking refers
  to the industry, products, and procedures
  that meet the challenge of creating and
  administering internetworks. Figure 1-1
  illustrates some different kinds of network
  technologies that can be interconnected by
  routers and other networking devices to
  create an internetwork.
Basics of Internetworking

• Gives an illusion of a single (direct link)
  network
• Built on a set of distributed heterogeneous
  networks
• Abstraction typically supported by
  software
Internetwork properties

• Supports heterogeneity: Hardware, OS,
  network type, and

• topology independent

• Scales to global connectivity
Internet Protocol (IP)
• Network- level protocol for the Internet
• Operates on all hosts and routers
• Protocol stack has an “hourglass” shape
Protocols
• Protocols are sets of rules that define how
  different parts of a network interact to allow
  devices to communicate with one another. They
  provide a ‘common language’ to allow different
  vendors’ computer equipment to communicate
  with each other. The different devices can use
  completely different software, provided that each
  device’s software can agree on the meaning of
  the data. Protocols can describe low-level details
  of machine-to-machine interfaces (like the order
  in which bits and bytes are sent across the wire)
  or high-level exchanges between allocation
  programs (the way in which two programs
  transfer a file across the Internet).
Internet Protocols
• The Internet Protocol defines a
  connectionless data delivery service
  between networked devices. Packets of
  data are sent as datagrams across the
  network. Large packets may be broken
  into several datagrams which are each
  sent individually across the network. Each
  datagram carries its full destination
  address and control information.
• To route packets in an internetwork, IP
  uses a dynamic routing protocol called the
  Routing Information Protocol (RIP). Today
  RIP is the most commonly used Interior
  Gateway Protocol (IGP) in theInternet
  community. The primary function of RIP is
  to inform routers about other routers on
  the network.
Serial Line Internet Protocol
               (SLIP)
• SLIP transmits IP packets over serial
  lines. If using SLIP, the network must use
  TCP/IP as its primary means of
  communication between resources. A
  SLIP connection only allows one
  communication application to be active at
  any one time.
Simple Mail Transport Protocol
             (SMTP)

• SMTP transfers e-mail from one server to
  another across the network.
• End users must use the Post Office
  Protocol (POP) to transfer the
• messages to their machines.
File Transfer Protocol (FTP)

• FTP provides a way to move files between
  computer systems. It is a widely used way
  of transferring files to and from the Internet
  and is relatively simple to operate.
WWW Structure
• Clients use browser application to send URIs via HTTP to
  servers requesting a Web page
• Web pages constructed using HTML (or other markup
  language) and consist of text, graphics, sounds plus
  embedded files
• Servers (or caches) respond with requested Web page
   – Or with error message
• Client’s browser renders Web page returned by server
   – Page is written using Hyper Text Markup Language (HTML)
   – Displaying text, graphics and sound in browser
   – Writing data as well
• The entire system runs over standard networking protocols
  (TCP/IP, DNS,…)
HTTP Basics

• Protocol for client/server communication
  – The heart of the Web
  – Very simple request/response protocol
     • Client sends request message, server replies with response
       message
  – Stateless
  – Relies on URI naming mechanism
WWW Pages and Browsing
• A web browser is a software application which enables
  a user to display and interact with text, images, videos,
  music, games and other information typically located on
  a Web page at a website on the World Wide Web or a
  local area network. Text and images on a Web page can
  contain hyperlinks to other Web pages at the same or
  different website. Web browsers allow a user to quickly
  and easily access information provided on many Web
  pages at many websites by traversing these links. Web
  browsers format HTML information for display, so the
  appearance of a Web page may differ between
  browsers.
Security
• When a computer connects to a network
  and begins communicating with others, it
  is taking a risk. Internet security involves
  the protection of a computers internet
  account and files from intrusion of an
  outside user. Basic security measures
  involve protection by well selected
  passwords, change of file permissions and
  back up of computers data.
• A network security policy is a generic document that
  outlines rules for computer network access, determines
  how policies are enforced and lays out some of the basic
  architecture of the company security/ network security
  environment. The document itself is usually several
  pages long and written by a committee. A security policy
  goes far beyond the simple idea of "keep the bad guys
  out". It's a very complex document, meant to govern data
  access, web-browsing habits, use of passwords and
  encryption, email attachments and more. It specifies
  these rules for individuals or groups of individuals
  throughout the company.
• Security policy should keep the malicious users out and
  also exert control over potential risky users within your
  organization. The first step in creating a policy is to
  understand what information and services are available
  (and to which users), what the potential is for damage
  and whether any protection is already in place to prevent
  misuse.
• In addition, the security policy should dictate a
  hierarchy of access permissions; that is, grant
  users access only to what is necessary for the
  completion of their work.
• While writing the security document can be a
  major undertaking, a good start can be achieved
  by using a template. National Institute for
  Standards and Technology provides a security-
  policy guideline.
• The policies could be expressed as a set of
  instructions that could be understood by special
  purpose network hardware dedicated for
  securing the network.
E- Commerce
• UK Government
   “E-Commerce is the exchange of information across
     electronic networks at any stage in the supply chain
     whether within an organisation , between businesses,
     between business & consumers, or between public
     and private sectors whether paid or unpaid”
• Zwass (1998)
  “ E-Commerce is the sharing of business information ,
  maintaining business relationships & conducting
  business transactions by means of telecommunications
  networks”
E-Business & E-Commerce
• IBM’s Definition of E-Business
   – “The transformation of key business processes
     through the use of internet technologies”
• R. Kalakota (1999)
  “E-Commerce is buying & selling activities over digital
  media”
   – E-Business – encompasses e-commerce &
     “includes the front & back-office applications that form
     the engine for modern business. Its not just about e-
     commerce transactions, it’s about redefining old
     business models with the aid of technology to
     maximise customer value”
Rules of E-Business
•   Rule 1 – Technology is no longer an afterthought in forming
    business strategy – It’s the actual cause & driver
         • Whilst computers didn’t fundamentally alter business foundations – the
           internet does.
•   Rule 2 - Ability to streamline, structure, influence and control the
    flow of information is more powerful & cost-effective than moving &
    manufacturing physical products
         • intangibles are becoming more valuable - branding, customer relationship,
           integration
•   Rule 3 – Inability to overthrow the dominant, outdated business
    design often leads to failure.
         • move to outsourcing & high levels of internal integration
•   Rule 4 – Goal of new business design is to create flexible
    outsourcing alliances between companies that not only off load
    costs but also make customers ecstatic.
         • Speed, Convenience, Personalisation, Price
•   Rule 5 – e-Commerce is enabling companies to listen to their
            customers and become either the cheapest, the most
                   familiar, or the best
         • Wal-Mart, McDonalds, Coca–Cola, Amex – What have you done for me ?
•   Rule 6 – Use technology to innovate, entertain, and enhance the
           entire transaction process from selection to receipt & service
         • Amazon,.
•   Rule 7 – Future e-business design models will increasingly use
          reconfigurable e-business community models to best meet
          customer’s needs.
         • Integrated customer centric business models – supporting complex business
           designs – IF, Cahoot, Amazon, E-Trade
•   Rule 8 – Management’s task is to align business strategies,
           processes and applications , fast, right and all at once – very
           difficult
Electronic commerce
• To many people the term electronic commerce,
  – often shortened to e-commerce, is equivalent
  – to shopping on the web.
• The term electronic business is sometimes used
  – to capture the broader notion of e-commerce.
• In this course, we will use e-commerce in its
  – broadest sense. It encompasses both web
  – shopping and other business conducted
  – electronically.
Electronic commerce
• Banks have used electronic funds transfers
  – (EFTs), also called wire transfers, for decades.

• Businesses have been engaging in electronic
  – data interchange for years. EDI occurs when
  – one business transmits computer readable data
  – in a standard format to another business.
• We will define e-commerce as the use of electronic
• data transmission to implement or enhance any
• business activity.

• Example (Figure 1-4): A buyer sends an electronic
• purchase order to a seller. The seller then sends an
• electronic invoice back to the buyer.

• When used appropriately, electronic transmission
• can save both time and money.
Impact of e-commerce
• E-commerce is changing the way
  traditional
• commerce is conducted:
• Technology can help throughout the
  process
  – including promotion, searching, selecting,
  – negotiating, delivery, and support.
• The value chain is being reconfigured.
Advantages of e-commerce
•   For the seller:
•   Increases sales/decreases cost
•   Makes promotion easier for smaller firms
•   Can be used to reach narrow market segments

•   For the buyer:
•   Makes it easier to obtain competitive bids
•   Provides a wider range of choices
•   Provides an easy way to customize the level of
    – detail in the information obtained
Advantages of e-commerce
• In general:
• Increases the speed and accuracy with which
  – businesses can exchange information
• Electronic payments (tax refunds, paychecks,
  – etc.) cost less to issue and are more secure
• Can make products and services available in
  – remote areas
• Enables people to work from home, providing
  – scheduling flexibility
Advantages of e-commerce
• Some business processes are not suited to
  – e-commerce, even with improvements in
  – technology
• Many products and services require a critical
  – mass of potential buyers (e.g. online grocers)
• Costs and returns on e-commerce can be
  – difficult to quantify and estimate
• Cultural impediments: People are reluctant to
  – change in order to integrate new technology
• The legal environment is uncertain: Courts and
  – legislators are trying to catch up
Disadvantages of e-commerce
• Some business processes are not suited to
  – e-commerce, even with improvements in
  – technology
• Many products and services require a critical
  – mass of potential buyers (e.g. online grocers)
• Costs and returns on e-commerce can be
  – difficult to quantify and estimate
• Cultural impediments: People are reluctant to
  – change in order to integrate new technology
• The legal environment is uncertain: Courts and
  – legislators are trying to catch up
E-Commerce Market Place
Electronic Commerce is part of an evolving approach to
business that could eventually involve the application of
Information & Communication Technology (ICT) to the
Product and Distribution of goods and services on a
global scale.

Electronic Commerce can be used to support fully
automated transactions, but, for immediate future at
least, it also encompasses many partially automated
transactions involving human and physical interfaces and
intermediaries of various kinds.
Participating Groups in E-Commerce

• Electronic Commerce can occur within
  and between three basic participant
  groups-
  – Business
  – Government
  – Individuals
  At present and by a large margin, most e-
    commerce occurs on a B-to_B level.
Economic Potential of E-Commerce

• E-Commerce is the marriage between a rapidly
  evolving technical environments and an
  increasingly pervasive set of ideas as to how
  markets should function.
• However markets involve complex interaction
  between specific business/ organizational
  factors and general economic, social and
  political factors.
• At this point in time, Economic Potential of E-
  commerce can only be evaluated against a
  backdrop of rapid change on all of these fronts.
Forces behind E-Commerce
• Internet Acceptance is the Driving Force
  Behind e-Commerce
• Increased Awareness
• Significant improvements in Infrastructure
• Increased     Competition      among       the
  organization and thus in search of the
  technologies and ways to take the edge over
  others.
• Customer Oriented markets
E-Commerce Framework
E-Commerce Framework
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv
Unit Iv

Weitere ähnliche Inhalte

Was ist angesagt?

Ch1 introducing computer systems
Ch1 introducing computer  systemsCh1 introducing computer  systems
Ch1 introducing computer systems
cs001
 
Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to Computers
Ujjwal 'Shanu'
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1
Abdul_jabbar_k
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
Subair Ali
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information Technology
WanBK Leo
 

Was ist angesagt? (20)

Lab 1 computer intro1
Lab 1   computer intro1Lab 1   computer intro1
Lab 1 computer intro1
 
Computer Basics and Hardware
Computer Basics and HardwareComputer Basics and Hardware
Computer Basics and Hardware
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Computer and its types
Computer and its typesComputer and its types
Computer and its types
 
Ch1 introducing computer systems
Ch1 introducing computer  systemsCh1 introducing computer  systems
Ch1 introducing computer systems
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
Information Technology Basics
Information Technology BasicsInformation Technology Basics
Information Technology Basics
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to Computers
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Web application
Web applicationWeb application
Web application
 
Unit I
Unit IUnit I
Unit I
 
Introduction to computing lecture1
Introduction to computing lecture1Introduction to computing lecture1
Introduction to computing lecture1
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information Technology
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 

Andere mochten auch

Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 

Andere mochten auch (12)

Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking device
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete Introduction
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Ähnlich wie Unit Iv

Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .
amritpal singh
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
TadeseBeyene
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
arun nalam
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
TadeseBeyene
 

Ähnlich wie Unit Iv (20)

Chap006
Chap006Chap006
Chap006
 
Chapter 6 telecommunications and networks
Chapter 6  telecommunications and networksChapter 6  telecommunications and networks
Chapter 6 telecommunications and networks
 
Unit 2
Unit 2Unit 2
Unit 2
 
Internet
InternetInternet
Internet
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
data communication
data communicationdata communication
data communication
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
Enterprise private network
Enterprise private networkEnterprise private network
Enterprise private network
 
Ecommerce_Ch3.ppt
Ecommerce_Ch3.pptEcommerce_Ch3.ppt
Ecommerce_Ch3.ppt
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - IT
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
 
It infrastructure and emerging technologies
It infrastructure and emerging technologiesIt infrastructure and emerging technologies
It infrastructure and emerging technologies
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...
 

Mehr von Anshumali Singh (20)

Unit3rd
Unit3rdUnit3rd
Unit3rd
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2(Cont.)
Unit2(Cont.)Unit2(Cont.)
Unit2(Cont.)
 
Unit2
Unit2Unit2
Unit2
 
Shai 2
Shai 2Shai 2
Shai 2
 
Shai
ShaiShai
Shai
 
Outputdevice
OutputdeviceOutputdevice
Outputdevice
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture2
Lecture2Lecture2
Lecture2
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Unit Iv

  • 1. Internetworking • Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). • The most notable example of internetworking is the Internet (capitalized), a network of networks based on many underlying hardware technologies, but unified by an internetworking protocol standard, called the Internet Protocol Suite (TCP/IP).
  • 2. • An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. Figure 1-1 illustrates some different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork.
  • 3.
  • 4. Basics of Internetworking • Gives an illusion of a single (direct link) network • Built on a set of distributed heterogeneous networks • Abstraction typically supported by software
  • 5. Internetwork properties • Supports heterogeneity: Hardware, OS, network type, and • topology independent • Scales to global connectivity
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Internet Protocol (IP) • Network- level protocol for the Internet • Operates on all hosts and routers • Protocol stack has an “hourglass” shape
  • 19. Protocols • Protocols are sets of rules that define how different parts of a network interact to allow devices to communicate with one another. They provide a ‘common language’ to allow different vendors’ computer equipment to communicate with each other. The different devices can use completely different software, provided that each device’s software can agree on the meaning of the data. Protocols can describe low-level details of machine-to-machine interfaces (like the order in which bits and bytes are sent across the wire) or high-level exchanges between allocation programs (the way in which two programs transfer a file across the Internet).
  • 20. Internet Protocols • The Internet Protocol defines a connectionless data delivery service between networked devices. Packets of data are sent as datagrams across the network. Large packets may be broken into several datagrams which are each sent individually across the network. Each datagram carries its full destination address and control information.
  • 21.
  • 22.
  • 23. • To route packets in an internetwork, IP uses a dynamic routing protocol called the Routing Information Protocol (RIP). Today RIP is the most commonly used Interior Gateway Protocol (IGP) in theInternet community. The primary function of RIP is to inform routers about other routers on the network.
  • 24. Serial Line Internet Protocol (SLIP) • SLIP transmits IP packets over serial lines. If using SLIP, the network must use TCP/IP as its primary means of communication between resources. A SLIP connection only allows one communication application to be active at any one time.
  • 25. Simple Mail Transport Protocol (SMTP) • SMTP transfers e-mail from one server to another across the network. • End users must use the Post Office Protocol (POP) to transfer the • messages to their machines.
  • 26. File Transfer Protocol (FTP) • FTP provides a way to move files between computer systems. It is a widely used way of transferring files to and from the Internet and is relatively simple to operate.
  • 27. WWW Structure • Clients use browser application to send URIs via HTTP to servers requesting a Web page • Web pages constructed using HTML (or other markup language) and consist of text, graphics, sounds plus embedded files • Servers (or caches) respond with requested Web page – Or with error message • Client’s browser renders Web page returned by server – Page is written using Hyper Text Markup Language (HTML) – Displaying text, graphics and sound in browser – Writing data as well • The entire system runs over standard networking protocols (TCP/IP, DNS,…)
  • 28. HTTP Basics • Protocol for client/server communication – The heart of the Web – Very simple request/response protocol • Client sends request message, server replies with response message – Stateless – Relies on URI naming mechanism
  • 29. WWW Pages and Browsing • A web browser is a software application which enables a user to display and interact with text, images, videos, music, games and other information typically located on a Web page at a website on the World Wide Web or a local area network. Text and images on a Web page can contain hyperlinks to other Web pages at the same or different website. Web browsers allow a user to quickly and easily access information provided on many Web pages at many websites by traversing these links. Web browsers format HTML information for display, so the appearance of a Web page may differ between browsers.
  • 30. Security • When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computers internet account and files from intrusion of an outside user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computers data.
  • 31. • A network security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy goes far beyond the simple idea of "keep the bad guys out". It's a very complex document, meant to govern data access, web-browsing habits, use of passwords and encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company. • Security policy should keep the malicious users out and also exert control over potential risky users within your organization. The first step in creating a policy is to understand what information and services are available (and to which users), what the potential is for damage and whether any protection is already in place to prevent misuse.
  • 32. • In addition, the security policy should dictate a hierarchy of access permissions; that is, grant users access only to what is necessary for the completion of their work. • While writing the security document can be a major undertaking, a good start can be achieved by using a template. National Institute for Standards and Technology provides a security- policy guideline. • The policies could be expressed as a set of instructions that could be understood by special purpose network hardware dedicated for securing the network.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. E- Commerce • UK Government “E-Commerce is the exchange of information across electronic networks at any stage in the supply chain whether within an organisation , between businesses, between business & consumers, or between public and private sectors whether paid or unpaid” • Zwass (1998) “ E-Commerce is the sharing of business information , maintaining business relationships & conducting business transactions by means of telecommunications networks”
  • 38. E-Business & E-Commerce • IBM’s Definition of E-Business – “The transformation of key business processes through the use of internet technologies” • R. Kalakota (1999) “E-Commerce is buying & selling activities over digital media” – E-Business – encompasses e-commerce & “includes the front & back-office applications that form the engine for modern business. Its not just about e- commerce transactions, it’s about redefining old business models with the aid of technology to maximise customer value”
  • 39.
  • 40. Rules of E-Business • Rule 1 – Technology is no longer an afterthought in forming business strategy – It’s the actual cause & driver • Whilst computers didn’t fundamentally alter business foundations – the internet does. • Rule 2 - Ability to streamline, structure, influence and control the flow of information is more powerful & cost-effective than moving & manufacturing physical products • intangibles are becoming more valuable - branding, customer relationship, integration • Rule 3 – Inability to overthrow the dominant, outdated business design often leads to failure. • move to outsourcing & high levels of internal integration • Rule 4 – Goal of new business design is to create flexible outsourcing alliances between companies that not only off load costs but also make customers ecstatic. • Speed, Convenience, Personalisation, Price
  • 41. Rule 5 – e-Commerce is enabling companies to listen to their customers and become either the cheapest, the most familiar, or the best • Wal-Mart, McDonalds, Coca–Cola, Amex – What have you done for me ? • Rule 6 – Use technology to innovate, entertain, and enhance the entire transaction process from selection to receipt & service • Amazon,. • Rule 7 – Future e-business design models will increasingly use reconfigurable e-business community models to best meet customer’s needs. • Integrated customer centric business models – supporting complex business designs – IF, Cahoot, Amazon, E-Trade • Rule 8 – Management’s task is to align business strategies, processes and applications , fast, right and all at once – very difficult
  • 42. Electronic commerce • To many people the term electronic commerce, – often shortened to e-commerce, is equivalent – to shopping on the web. • The term electronic business is sometimes used – to capture the broader notion of e-commerce. • In this course, we will use e-commerce in its – broadest sense. It encompasses both web – shopping and other business conducted – electronically.
  • 43. Electronic commerce • Banks have used electronic funds transfers – (EFTs), also called wire transfers, for decades. • Businesses have been engaging in electronic – data interchange for years. EDI occurs when – one business transmits computer readable data – in a standard format to another business.
  • 44. • We will define e-commerce as the use of electronic • data transmission to implement or enhance any • business activity. • Example (Figure 1-4): A buyer sends an electronic • purchase order to a seller. The seller then sends an • electronic invoice back to the buyer. • When used appropriately, electronic transmission • can save both time and money.
  • 45. Impact of e-commerce • E-commerce is changing the way traditional • commerce is conducted: • Technology can help throughout the process – including promotion, searching, selecting, – negotiating, delivery, and support. • The value chain is being reconfigured.
  • 46. Advantages of e-commerce • For the seller: • Increases sales/decreases cost • Makes promotion easier for smaller firms • Can be used to reach narrow market segments • For the buyer: • Makes it easier to obtain competitive bids • Provides a wider range of choices • Provides an easy way to customize the level of – detail in the information obtained
  • 47. Advantages of e-commerce • In general: • Increases the speed and accuracy with which – businesses can exchange information • Electronic payments (tax refunds, paychecks, – etc.) cost less to issue and are more secure • Can make products and services available in – remote areas • Enables people to work from home, providing – scheduling flexibility
  • 48. Advantages of e-commerce • Some business processes are not suited to – e-commerce, even with improvements in – technology • Many products and services require a critical – mass of potential buyers (e.g. online grocers) • Costs and returns on e-commerce can be – difficult to quantify and estimate • Cultural impediments: People are reluctant to – change in order to integrate new technology • The legal environment is uncertain: Courts and – legislators are trying to catch up
  • 49. Disadvantages of e-commerce • Some business processes are not suited to – e-commerce, even with improvements in – technology • Many products and services require a critical – mass of potential buyers (e.g. online grocers) • Costs and returns on e-commerce can be – difficult to quantify and estimate • Cultural impediments: People are reluctant to – change in order to integrate new technology • The legal environment is uncertain: Courts and – legislators are trying to catch up
  • 50. E-Commerce Market Place Electronic Commerce is part of an evolving approach to business that could eventually involve the application of Information & Communication Technology (ICT) to the Product and Distribution of goods and services on a global scale. Electronic Commerce can be used to support fully automated transactions, but, for immediate future at least, it also encompasses many partially automated transactions involving human and physical interfaces and intermediaries of various kinds.
  • 51. Participating Groups in E-Commerce • Electronic Commerce can occur within and between three basic participant groups- – Business – Government – Individuals At present and by a large margin, most e- commerce occurs on a B-to_B level.
  • 52. Economic Potential of E-Commerce • E-Commerce is the marriage between a rapidly evolving technical environments and an increasingly pervasive set of ideas as to how markets should function. • However markets involve complex interaction between specific business/ organizational factors and general economic, social and political factors. • At this point in time, Economic Potential of E- commerce can only be evaluated against a backdrop of rapid change on all of these fronts.
  • 53. Forces behind E-Commerce • Internet Acceptance is the Driving Force Behind e-Commerce • Increased Awareness • Significant improvements in Infrastructure • Increased Competition among the organization and thus in search of the technologies and ways to take the edge over others. • Customer Oriented markets