Professional Documents
Culture Documents
Internet
The network of network supports creation and maintenance of web sites by offering
a free search tool that will help us to discover academic papers, programs and network
among institutions in the field of sustainability science. The network of networks is shown as
below :
The network of networks website does not just search for individual features of
information. When we search for certain keywords, the web search show the search results
in a structure graphic with notes and lines. The system will also allow us to sort all these by
various criteria.
1
Applications :
Internet protocols
1. TCP
2. IP
3. UDP
4. FTP
5. TFTP
6. HTTP etc.,
It is a connection oriented protocol and offers end to end packet delivery. It acts as a back
bone for connection establishment and release. Its features are :
TCP Services:
TCP offers the following services to the process at the application layer:
2
2. Sending and receiving buffers
It may not be possible for sending and receiving process to produce and obtain data
at the same speed. Therefore, TCP needs to buffer for storage for sending and
receiving data
3. Bytes and Segments
The TCP groups bytes into a packet. This packet is called as a segment.
4. Full duplex service
Transmitting the data in full duplex means flow of data in both directions at the
same time.
5. Connection oriented service
TCP offers connection oriented service for data exchange. It means it requires to
establish a connection between two parties before exchanging the data.
6. Reliable service
For the sake of reliability, TCP uses acknowledgement mechanism.
The IP packet which is used in communications with the other system has the following
columns :
TYPE OF
VER HLEN TOTAL LENGTH
SERVICE
FRAGMENTATION
IDENTIFICATION FLAGS
OFFSET
TIME TO
PROTOCAL HEADER CHECK SUM
LIVE
SOURCE IP ADDRESS
DESTINATION IP ADDRESS
OPTIONS + PADDING
Fig. Shows the structure of an IP Packet
Here the length of a datagram is variable. The datagram is divided into two parts :
1. Header
2. Data
The length of the header is 20 to 60 bytes. The header contains information for routing and
delivery of the packets.
3
UDP (User Datagram Protocal)
Like IP, UDP is connection less and unreliable protocol. It does not require making a
connection with the host to exchange data. Since UDP is a unreliable protocol, there is no
mechanism for ensuring that data sent is received.
UDP transmits the data in the form of datagram. The UDP datagram consists of five parts as
shown below:
UDP is used by the application that typically transmits small amount of data at one time.
UDP provides protocol port used, that is, UDP messages contains both source and
destination port number that makes it possible for UDP software at the destination to
deliver the message to correct application program.
FTP is used to copy files from one port to the other. FTP offers the mechanism for the some
of the following manner:
1. FTP creates two processes such as Control Process and Data Transfer Process of both
ends, that is, at the client and at the server
2. FTP establishes two different connections. One is for data transfer and the other is
control information.
3. Control connection is made between control processes while the data connection is
made.
4. FTP uses port No.21 for the control connection and port No. 20 is used for data
Connection.
4
TRIVIAL FILE TRANSFER PROTOCAL (TFTP)
The TFTP is also used to transfer the files. But it transfers the files without authentication.
Unlike FTP, TFTP does not separate control and data information. Since there is no
authentication exists, TFTP looks in security features. Therefore, It is not
recommended to use TFTP.
1. TFTP makes use of UDP for data transport. Each TFTP message is carried in separate
UDP datagram.
2. The First two bytes of a TFTP message specify the type of message.
3. The TFTP session is initiated when a TFTP client sents a request to upload or
download a file
4. The request is sent from an ephemeral UDP port No. 69 of an TFTP server.
5
TERMINAL NETWORK (TELNET)
TELNET means Terminal Network. It is a protocol used to login into a remote computer on
the internet. There are a no. of TELNET lines having user friendly user interface.
The following diagram shows a person login into a remote computer from the local
computer.
HTTP request comprises of Request line, Header fields and message body. HTTP response
comprises of Status line, Headers and message body.
The above picture illustrates the operation of web based client/Server. The main difference
between client/server and web based are:
1. Architecture
A Client/Server program includes two components : A Client Machine and a server
machine.
6
A Web application has 3 components : Web Browser, the server and the database
server.
2. The no. of simultaneous users
A client/server program can support simultaneous work of limited no. of users.
Where as A program with a web architecture supports limited no. of concurrent
users.
3. The client/server software is menu driven while a web program is URL Driven.
4. Use of cookies
Cookies are needed for a web application. They are not used by client/server one.
5. The defects quantity
Performance testing, security testing, compatibility testing show that a web
client/server program usually has fewer issues than a web program.
Internet Security
If we have an e-Commerce site, we are in cross hairs of hackers. We handle customer credit
card and personal information that they want steal and exploit.
They usually do it by either intercepting the message between our customers browsers and
our website or hacking into our web infected web pages with malware in some cases, they
break into databases to get customer data.
We need to place high priority on secured the site and protecting our customers. If we want
to protect our customers, here are 6 essential steps that are too often neglected.
7
Network Penetration testing is a pre testing that can be conducted to find the bad
guys actions. These types of tests will prove how our web site is so secured from the
activities performed by the bad guy.
4. Use multi factor Authentication
Financial Institutions like our bank don’t rely solely on user id and password. But the
security is extended by including a no. of other factors too. For example, if we
change the computer, we normally login from, they add on extra level of
authentication to make sure its really the owner.
5. Use trust seals
Trust seals will increase our conversion rates and customers trust seals are images
issued by a third party that our site has met a set of standards and criteria that make
us trust worthy.
6. Use a managed DNS (Domain Naming System
Use a managed DNS service can improve our network and website performance and
provide additional security.
When we communicate on the internet, domain names are easily understood by
humans must be translated into IP address to identify each computer on the
internet. This translation is done by a DNS server if we create our DNS we cannot
setup a website on a shared server and the security is only as good as our network.
Web selling is just a version of catalog selling. The same rules apply and it has some
problems. It has been estimated that 11% of the online transactions involve fraud.
1. Competition
When we offer the same products as our competitors, when we have hundreds of
competitors, all only seconds away, the guy who sets his price too low gets the
order.
2. Advertising Expenses
Advertising costs have proven to be way higher than expected, much higher than for
traditional business. In addition, we have to plan the search engines, because our
competitors do.
3. Warehouse and Distribution
This is necessary to make all items available in one place and to distribute to the
customers From that place. This makes transactions made easy.
4. CC Fraud
Some e-commerce sites have found that they were as many fraudulent transactions
as good ones and its put some firms out of business. The risk is all ours. If we get hit
by credit card fraud in a face to face transaction, the bank takes the loss. But if we
get hit with credit card fraud in an e-commerce transaction, we take the loss.
8
5. The Level of Fraud
It is forcing e-commerce sites to sign up with clearing engines that apply complex
rules and tests to detect bad charges.
6. Price Charging
This fraud has become quite popular, because it is easy to do and many shopping
cart programs are vulnerable. On the check-out page, the purchaser clicks the view
page source button, modifies the pricing and published the changed page back.
7. Breaking and Entering
It is not our merchandise they are after, but our customer information, including
credit card information. So they can defraud sites out of their merchandise. Some
times, though, it is just to vandalize.
8. Turn Arounds
Customers often ask the credit card company to reverse the charge because they are
unhappy with the product. Not only do we take the loss, but we will be hit with high
fees and may need to submit a deposit. If we are in business that is traditionally high
risk for turnarounds, we will be hit with these fees whether we have a lot or not.
9. Returns
Like a catalog hose, we are selling based on descriptions and pictures. We have to be
prepared to handle a fairly high percentage of returns.
10. Shipping Costs
In and out, the biggest cause of abandoned shopping carts is the customers sudden
realization how much the shipping and handling charge is going to be.
Successful selling:
To succeed in retail e-commerce, we need an angle, preferably an angle that is not an easy
for others to duplicate. Some examples where e-commerce can be successful are :
E-Commerce sites are designed and implemented the same way as any other website. In
designing a web site, the top consideration is Security. The next biggest consideration is that
our hosting service unless we host our own site or co-locate supports the full range of
9
e-commerce features we require. The other factors are cost of the software and scale of
implementation.
Choosing a product :
Setting up business :
10