You are on page 1of 53

FUNDAMENTAL OF E-

COMMERCE (BBA-606)
UNIT 2

Syllabus Contents:
Internet: Concept & evaluation, Characteristics of Internet:
email, www, Ftp, telnet, Intranet & Extranet, Limitation of
internet, Hardware & Software requirement of Internet,
searches Engines

Dr.P.K.Tripathi
Asso. Prof.
Department of BBA
IIMT College of Management, Greater Noida
Internet: Concept & Evoluation
Introduction:
Today we live in a world of technology, where internet spins a
web of interconnectivity around the globe. Through internet
more than fifty million people in countries around the world
have been connected.

Internet is a collection of computers connected by network


cables or through satellite links. Internet is a network of
networks. It is also knows as Super Network. There are millions
of computing devices that are connected to this network either
permanently or for a short duration. These devices run network
applications that communicate through copper or fiber optic
cables, radio or satellite transmission.

The Internet connectivity is provided by Internet Service


Providers (ISP) like BSNL, Airtel, Reliance, Aircel Vodafone etc.
Characteristics:
It is a worldwide system which has the following
characteristics:
 Internet is a world-wide / global system of
interconnected computer networks.
 Internet uses the standard Internet Protocol (TCP/IP).
 Every computer in internet is identified by a unique IP
address.
 IP Address is a unique set of numbers (such as
110.22.33.114) which identifies a computer’s location.
 A special computer DNS (Domain Name Server) is used
to give name to the IP Address so that user can locate a
computer by a name.
 For example, a DNS server will resolve a name http://www.
tutorialspoint.com to a particular IP address to uniquely
identify the computer on which this website is hosted.
 Internet is accessible to every user all over the world.
Working of Internet
 The user's computer connects to ISP's server
makes its connection to larger ISP. The largest ISPs
maintain fiber-optic lines, under sea cables or
satellite links. In this way, every computer on the
Internet is connected to every other computer on
the Internet.
Evolution
 The history of the Internet begins with the development of
electronic computers in the 1950s. Initial concepts of
packet networking originated in several computer science
laboratories in the United States, Great Britain, and France.

 The US Department of Defense awarded contracts as early


as the 1960s for packet network systems, including the
development of the ARPANET(Advanced Research Projects
Agency Network) (which would become the first network to
use the Internet Protocol.) The first message was sent over
the ARPANET from computer science Professor Leonard
Kleinrock‘s laboratory at University of California, Los
Angeles (UCLA) to the second network node at Stanford
Research Institute (SRI).
Evolution………….
Internet was evolved in 1969, under theproject named
ARPANET(Advanced Research Projects Agency
Network) to connect computers at different universities
and U.S. defence. Soon after the people from different
backgrounds such as engineers, scientists, students and
researchers started using the network for exchanging
information and messages.

In 1990s the internet working of ARPANET, NSFnet and


other private networks resulted into Internet. Therefore,
Internet is a ‘global network of computer networks’. It
comprises of millions of computing devices that carry
and transfer volumes of information from one device to
the other. Desktop computers, mainframes, GPS units,
cell phones, car alarms, video game consoles, are
connected to the Net.
Advantages
Internet allows you to communicate with the
people sitting at remote locations using we site
and applications like Facebook,Twitter,Yahoo,
Google+,Flickr, Orkut etc.
You can find any kind of information on any topic
over the internet such as Technology, Health &
Science, Social Studies, Geographical Information,
Information Technology, Products etc.
It also provides entertainment through various
modes like online television, online games, songs,
videos, social networking apps.
Internet also allows us to use many services like
Internet banking, matrimonial services, online
shopping, online ticket booking, online bill payment,
data sharing, e-mail etc.
Disadvantages
 There are always chances to loose personal
information such as name, address, credit
card number. Therefore, one should be very
careful while sharing such information.
 Spamming corresponds to the unwanted e-
mails in bulk. These e-mails serve no
purpose and lead to block of entire system.
 Virus can easily be spread to the computers
connected to internet.
 There are many pornographic sites that can
be found, which indirectly affects your
healthy and mental life.
Use of Internet:
Internet is today one of the most important part of our daily life.
There are large numbers of things that can be done using the
internet and so it is very important. You can say that with the
progress in the internet we are progressing in every sphere of
life as it not only makes our tasks easier but also saves a lot of
time. Today internet is used for different purposes depending
upon the requirement.

1. Communication (Email)


2. Research
3. Education
4. Financial Transaction
5. Real Time Updates
6. Collaborations
7. Social Networking
8. E-Commerce, Online Shopping
9. Downloading files
10.Electronic Newspapers and Magzines
11.Job Hunting
12. Online Gaming (Interactive Games)
Electronic mail or E-Mail
Electronic mail, commonly called email, e-mail or e.mail, is a
method of exchanging digital messages from an author to one
or more recipients.
It is a system of receiving, sending, and storing electronic
messages.
An electronic message is text or a file prepared using software
in computer and that travels through telephone lines from one
computer to another.
E-mail has become a popular method of communication. Now,
an e-mail is preferred for personal or business communication
as compared to letter sent by traditional post.
Electronic mail has gained universal popularity because a
person from any age group and from any background can use
it and the delivery of the message is instant. The speed is
much higher than the speed of the traditional postal or the
courier service.

How is E-mail service used?
 Messages sent by electronic mail normally reach a recipient’s
account within seconds. The message can include text, images
and numerous types of formatted documents. These days, it is no
longer necessary to be sitting in front of a PC to send or receive
an email. A variety of mobile devices, such as tablet computers
and smart phones make it possible to send the message via E-
mail.
 The following diagram displays how an e-mail moves from the
sender to the receiver.
Protocols used in E-mail Service
Users receive and send messages using
standardized protocols that make it possible for
emails to travel between computers. A protocol is
a set of rules that are needed for communication.
There are three types of protocols used by e-mail
service.
1.Simple Message/Mail Transfer protocol (SMTP),
2. Post Office Protocol
3. Internet Message Access Protocol (IMAP)

The Simple message transfer protocol (SMTP)


enables the actual sending of messages. The
Post Office Protocol and IAMP allows the users to
retrieve information instantly.
When we want to send a message using e-mail service, there are three important
things that are to be kept in mind.
1.Message Body: The body of the message may consist of words, number,
attachments, special characters or anything you want to insert in the letter.
2. E-mail Address : Example: editor@cbse.co.in, editor@cbse.com
An e-mail address consists of four parts: 1. The username 2. The symbol
3. The hostname 4. The top level domain
 3. Field Associated with an Email Message: An email client can be Outlook
Express, Hotmail, Ymail, Gmail, Rediffmail etc. The email client may typically
consist of four important fields. They are To:; Cc:; Bcc: and Subject:
 To: field is used to write the email address of the person to whom the message
is to be sent.
 Cc: field is optional and is used to send a message to multiple additional
addresses.
 Bcc: field is also optional and is used to send a message to multiple additional
addresses.
The difference between Cc (Carbon Copy) and Bcc: (Blind Carbon Copy) field is
decided in terms of visibility. The address in Bcc: field is termed as blind carbon
copy, the addresses mentioned in this field are not visible to the recipients of
the “To:” and the “Cc:” fields.
 Subject: field is used to mention short title for what is included in the body of the
message.
The email is actually used to transfer messages
between one to another. It is also used for :-
1. Group discussion by making groups in hotmail,
yahoo, etc
2. Stay in touch with users attached in the group.
3. Transmitting documents through attachments
4. Group email to multiple users
5. Convenient way of sending job application.
6. Easy method of advertisement.
7. Receiving conformation of service.
8. Service subscription
www (World wide web)
History of World Wide Web

 The World Wide Web was invented by Tim Berners-


Lee in 1989, in 1995 the first connection was
established over what is today known as the Internet.

 By the end of 1990, the first Web page was served. In


April 1993, the World Wide Web technology was
available for anyone to use on a royalty-free basis.

 A global Web of computers known as the Internet,


allows individuals to communicate with each other
often called the World Wide Web.
 Definition: The World Wide Web (WWW) is an internet
based service, which uses common set of rules known
as Protocols, to distribute documents across the
Internet in a standard way.

 The World Wide Web, or ‘Web’ is a part of the Internet.


 The Web is viewed through web browser software such
as Google Chrome, Internet Explorer, Mozilla Firefox etc.
 Using browsers one can access the digital libraries
containing innumerable articles, journals, e-books,
news, tutorials stored in the form of web pages on
computers around the world called Web Servers. Today
thousands of web pages/websites are added to the
WWW every hour.
The principle of the Web is based on using
hyperlinks to navigate between documents (called "
web pages") with a program called a browser.
A web page is a simple text file written in a markup
language (called HTML) that encodes the layout of
the document, graphical elements, and links to other
documents, all with the help of tags.
Besides the links which connect formatted
documents to one another, the web uses the HTTP
protocol (Hyper Text Transfer Protocol) to link
documents hosted on distant computers (called
web servers, as opposed to the client represented by
the browser).
On the Internet, documents are identified with a
unique address, called a URL (Uniform Resource
Locator), which can be used to locate any resource
on the Internet, no matter which server may be
hosting it.
Protocols
 The Internet is based on many layers of
information, where each layer is dedicated to a
different kind of documentation. These different
layers are called Protocols.
 A protocol is a set of rules that governs the
communication between computers on a
network. They exist at several levels in a
telecommunication connection.
 The most popular protocols used on internet are
the World Wide Web, FTP, Telnet, Gopherspace,
instant messaging, and email.
Types of Protocols
 1.TCP/IP (Transmission Control Protocol /
Internet Protocol)
 2.HTTP (HyperText Transfer Protocol )
 3.FTP (File Transfer Protocol )
1.TCP/IP (Transmission Control Protocol / Internet Protocol):
TCP/IP (Transmission Control Protocol/Internet Protocol) is the
basic point-to-point meaning each communication is from one
point (or host computer) in the network to another point or host
computer communication protocol on the Internet.

TCP/IP is a two layer protocol. The top layer, TCP(Transmission


Control Protocol) manages the assembling of a message or file
divided into smaller packets that are transmitted over the
Internet and received by a TCP that reassembles the packets
into the original message on the destination computer.

The lower layer, Internet Protocol, handles the address part of


each packet so that it gets to the right destination. Each
gateway computer on the network checks for the address to
forward the message. Some packets from the same message
are routed differently than others, but they are reassembled at
the destination.
2.HTTP (HyperText Transfer Protocol ): HTTP stands
for HyperText Transfer Protocol, is a set of standards
that allows users of the World Wide Web to exchange
information found on web pages on internet.
 HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers
should take in response to various commands.
 Today’s modern browsers no longer require HTTP in front
of the URL since it is the default method of
communication. But, it is still used in browsers because
of the need to access other protocols such as FTP
through the browser.
 The HTTP provides a standard for Web browsers and
servers to communicate.
3.FTP (File Transfer Protocol ): File Transfer Protocol (FTP) is a
standard protocol used on network to transfer the files from one
host computer to another host computer using a TCP based
network, such as the Internet.
To transfer files with FTP, use a program often called the client.
An FTP client program initiates a connection to a remote
computer running FTP server software. After the connection is
established, the client can choose to send and/or receive files.
To connect to an FTP server, a client requires a username and
password as set on the server. Many FTP servers use a username
as “anonymous”. Using FTP, you can also update (delete, rename,
move, and copy) files at a server. You need to logon to an FTP
server. However, publicly available files are easily accessed using
anonymous FTP.
FTP using TCP/IP, works in the same way as HTTP used for
transferring Web pages from a server to a user’s browser. FTP
sites are heavily used and require several attempts before
connecting.
To use your web browser to connect to an FTP site, where you
normally enter a URL as follows: ftp://username@ftp.site name/
Telnet
Telnet, developed in 1969, is a protocol that
provides a command line interface for
communication with a remote device or server,
sometimes employed for remote management
but also for initial device setup like network
hardware.
Telnet stands for Teletype Network, but it can
also be used as a verb; 'to telnet' is to establish a
connection using the Telnet protocol.
The telnet application enables a user on one
computer to log on to another computer on the
network. A virtual connection between the client
and the server is established. The connection is
used to transmit data. The protocol gives client
an option to emulate graphics terminal.
How does Telnet work?

Telnet provides users with a bidirectional


interactive text-oriented communication system
utilizing a virtual terminal connection over 8 byte.
User data is interspersed in-band with telnet
control information over the transmission control
protocol (TCP). Often, Telnet was used on a
terminal to execute functions remotely.
The user connects to the server by using the
Telnet protocol, which means entering Telnet into
a command prompt by following this syntax:
telnet hostname port. The user then executes
commands on the server by using specific Telnet
commands into the Telnet prompt. To end a
session and log off, the user ends a Telnet
command with Telnet.
Connecting to a Remote Host
Follow these steps to connect to a remote host using Telnet
1. Open Telnet by clicking on Start menu and choose run.
Now type Telnet, and press Enter key from the keyboard or
by clicking on the OK button.
2. From the Menu, choose Connect. Remote
3. Enter the name or IP address of the system that you want
to connect to in the Host Name Field.
4. If required, a port in the Port field.
5. In the term Type, select the type of terminal that you want
Telnet to emulate.
6. After you are finished with the remote host, you can
disconnect from a remote host by choosing Connect,
Disconnect.
Common uses for Telnet:
Telnet can be used to test or troubleshoot remote web or
mail servers, as well as for remote access to MUDs (multi-
user dungeon games) and trusted internal networks.
Search Engines
Search engines are the programs which are
needed to extract the information from the
internet.
Web search engines work with the help of two
programs, Spider which fetches as many
documents as possible. Another program,
called an indexer, reads the documents and
creates an index based on the words contained
in each document.
Each search engine uses an algorithm to create
its indices such that, only related results for
specified keywords is stored and returns a list
of the documents where the keywords were
found.
A search engine works in the following order:
 1. Web crawling: Web search engines work by storing
information about many web pages. These pages are
retrieved by the program known as Web crawler - which
follows every link on the site. Web crawler may also be called
a Web spider.
 2. Indexing: Indexing also known as web indexing, it stores
data to facilitate fast and accurate information retrieval.
 3. Searching: A web search query fetches the result from the
web search engine entered by the user to meet his
information needs.
 Examples:
The Intranets and Extranets in E-
Commerce and E-Business
 E-business is defined as the use of
Internet technologies to internetwork and
empower business process, electronic
commerce, and enterprise
communications and collaboration within
a company as well as with its customers,
suppliers, and other business
stakeholders.
 E-business applications rely on
telecommunications networks that
include the Internet, Intranets, Extranets.
Intranets
 An Intranet is a network inside an
organization that uses Internet technologies
(such as web browsers and servers, TCP/IP
network protocols, HTML hypermedia
document publishing and databases, and so
on) to provide an Internet-like environment
within the enterprise for information sharing,
communications, collaboration, and the
support of business processes.
 A Company’s Intranet can also be accessed
through the Intranets of customers,
suppliers, and other business partners via
Extranet links
An intranet is a computer network that uses Internet
Protocol technology to share information, operational
systems, or computing services within an organization.
This term is used in contrast to extranet, a network
between organizations, and instead refers to a network
within an organization.
The objective is to organize each individual's desktop with
minimal cost, time and effort to be more productive, cost
efficient, timely, and competitive.
An intranet may host multiple private websites and
constitute an important component and focal point of
internal communication and collaboration.
Any of the well known Internet protocols may be found in
an intranet, such as HTTP (web services), SMTP (e-mail),
and FTP (file transfer protocol). Internet technologies are
often deployed to provide modern interfaces to legacy
information systems hosting corporate data.
Uses of Intranet:
 Increasingly, intranets are being used to deliver tools, e.g. collaboration (to
facilitate working in groups and teleconferencing) or sophisticated corporate
directories, sales and customer relationship management tools, project
management etc., to advance productivity.
 Intranets are also being used as corporate culture-change platforms. For example,
large numbers of employees discussing key issues in an intranet forum
application could lead to new ideas in management, productivity, quality, and
other corporate issues.
 When part of an intranet is made accessible to customers and others outside the
business, that part becomes part of an extranet. Businesses can send private
messages through the public network, using special encryption/decryption and
other security safeguards to connect one part of their intranet to another.
 Intranet user-experience, editorial, and technology teams work together to
produce in-house sites. Most commonly, intranets are managed by the
communications, HR or CIO departments of large organizations, or some
combination of these.
 Because of the scope and variety of content and the number of system interfaces,
intranets of many organizations are much more complex than their respective
public websites. Intranets and their use are growing rapidly.
Advantages:

 Workforce productivity
 Time
 Communication
 Web publishing
 Business operations and management
 Cost-effective
 Enhance collaboration
 Promote common corporate culture
 Immediate updates:
 Supports a distributed computing
architecture:
Disadvantages

Management  A company may not have person to update their


problem Intranet on a routine basis
 Fear of sharing information and the loss of control
 Limited bandwidth for the business

Security  Unauthorized access


problem  Abuse of access
 Denial of service
Productivity  Information overload lowers productivity
problem  True purpose of the Intranet is unknown to many
employees/departments
 Hidden or unknown complexity and costs
Intranet Technology Resources

Since Intranets are Internet-like networks


within organizations, they depend on all of
the information technologies that make the
Internet possible.
These include:
 TCP/IP client/server networks
 Hardware and software such as web
browsers and server suites
 HTML web publishing software
 Network management and security
programs
 Hypermedia databases
Business Value of the Intranets
 Elimination of printing (e.g. telephone
directories, company policies, human
resource materials), mailing, and
distribution costs is a major source of
cost savings
 Training and Development Cost
Savings
Extranets
 Extranet is an
Intranet for outside authorized
users using same internet technology.
 Inter-organizational information system.
 enable outsiders to work together with company’s
employees.
 Open toselected suppliers, customers & other business
partners.
 Extranet is akind of computer network that
allows the outside users to access the Intranet of
organization.
 This network system is basically used for
business to business (B2B) purposes.
Examples..
 Dealers/distributors have access to
product files such as :-
1. product specification,
2. pictures,
3. images, etc.
to answer the queries of the customer.
The term Extranet is linked with Intranet.

This system basically allows the outside users of an


organization, like partners, suppliers, vendors and other
stakeholders to remain in touch with the activities of
organization. Information and data access performed
through a proper account or link system.

This is a best network system to keep in touch with


market position and share a large amount of data to
partners in a timely manner. Moreover, conducting new
training programs and discussing the products catalogs
with partners can be easily done without bearing too much
cost of travelling.

Extranet is the next stage in the intranet. It has also very


restricted users but as compared to intranet it has a more
opened environment. When the usage of the internet
remains restricted to the internal environment of an
organisation only it is called as intranet but when the
customers and other outsiders like the stakeholders of an
organisation also join this system then this system
becomes the extranet.
Components of extranets
Some basic infrastructure components
such as the internet Including :-
 TCP/IP protocols,
 E-mail,
 Web-browsers,
 External business partners &
 Tele-commuting employees place
order, check status & send E-mail.
Benefits of Extranet
 Improved quality.
 lower travel costs.
 lower administrative & other overhead costs.
 reduction in paperwork.
 delivery of accurate information on time.
 improved customer service.
 better communication.
 overall improvement in business effectiveness.
Disadvantages
 The suppliers & customer who don’t have
technical knowledge feel problem.
 Faceless contact.
 Information can be misused by other
competitors.
 Fraud may be possible.
 Technical Employees are required.
Layered System View

Intranet Corporate members

Extranet Clients, partners, customers

Internet Global society: competitors


Hardware and Software Requirements for Internet connection-

The following are the methods of connecting a


computer to the Internet using software and
hardware peripherals. These are three types

 Connecting a computer using Wireless


Broadband
 Connecting  a  computer using an Ethernet
Cable
 Connecting a Computer Using Dial-Up
Community
Hardware Requirement :

To connect the Internet, any one of the following is mandatory.

 Modem is used to connect Internet through Telephone


connection.
 NIC- Network Interface Card (wired/ wireless) facility is the
most important hardware required to connect Internet.
For example, the Laptop can be connected Internet through the
wired (LAN cable)/wireless (wi-fi).
 Dongle is used to connect the Internet using cellular network.
 Wi-Fi router or Hotspot is used to connect the Internet using
wireless network.
 Electronic device which supports cellular network.
 Internet Connectivity such as Dial-up connection, ISDN, DSL,
Cable TV, wired and wireless (Cellular) Network.
Software Requirement

1.The operating system should support


 TCP (Transfer Control Protocol) / IP (Internet Protocol),
 SMTP (Simple Mail Transfer Protocol),
 FTP (File Transfer Protocol),
 HTTP (Hyper Text Transfer Protocol) and
 HTTPS (Hyper Text Transfer Protocol Secured)
protocols.

2. Browsers and other Internet clients access to the web


applications such as Outlook, Gmail, Whatsapp,
Facebook, Twitter and etc.
Connection Types:

1. Dial-up Connection: A dial-up connection is established when


two or more data communication devices use a Public Switched
Telephone Network  (PSTN) to connect to an Internet Service
Provider (ISP) from computers.
Many remote locations depend on Internet dial-up connections
because broadband and cable are rare in remote areas with low
population. Internet Service Providers often provide dial-up
connections, a feasible alternative for budget-conscious
subscribers.
2. ISDN: ISDN is the acronym of Integrated Services Digital Network.
 It establishes the connection using the phone lines (PSTN)
which carry digital signals instead of analog signals.
It is a set of communication standards for simultaneous digital
transmission of data, voice, video, and other services over the
traditional circuits of the public switched telephone network.
There are two techniques to deliver ISDN services such as Basic
Rate Interface (BRI) and Primary Rate Interface (PRI).
3. DSL: Digital Subscriber Line (DSL) is a high-speed Internet
service for homes and businesses that competes with cable
and other forms of broadband Internet. DSL provides high-
speed networking over ordinary Telephone lines using
broadband modem technology. The technology behind DSL
enables Internet and telephone service to work over the
same phone line without requiring customers to disconnect
either their Voice or Internet connections.
4. Cable TV Internet Connection (setup box):
 The cable TV network can be used for connecting a computer or
a local network to the Internet, competing directly with DSL
(Digital Subscriber Line) technology.
 This type of network is classified as HFC (Hybrid Fiber-Coaxial),
 as it uses both fiber optics and coaxial cables. The connection
between the cable TV company to the distribution points (Optical
nodes) is made using fiber optics, with distances up to 25 miles
(40 km). Each optical node is typically serves between 500 and 2,
000 clients (customers).
5. Satellite Internet Connection: Satellite Internet
access is Internet access provided through
satellite communication for domestic and
enterprise usage.
The facility of modern consumer grade satellite
Internet service is typically provided to individual
users through geostationary satellites . It provides
fairly high data speeds, along with latest satellites
using Ka-band to attain downstream data speeds
up to 50 Mbps internet speed.
6. Wireless Internet Connection:
 It is a technology for wireless local area networking with
devices based on the IEEE 802.11 standards. Devices that can
use Wi-Fi technology include personal computers, video-
game consoles, phones and tablets, digital cameras, smart
TVs, digital audio players and modern printers.
 Wi-Fi compatible devices can connect to the Internet via a
WLAN and a wireless access point. Such an access point (or
hotspot) has a range of about 20 meters (66 feet) indoors
and a greater range of outdoors. Hotspot coverage can be as
small as a single room with walls that block radio waves, or
as large as many square kilometres achieved by using
multiple overlapping access points.
The End

Thank You

You might also like