You are on page 1of 38

E-COMMERCE INFRASTRUCTURE:

THE INTERNET, WEB, AND


MOBILE PLATFORM
CHAPTER – 4
BY: KENNETH C. LOUDAN

TEACHER: YASRA ASLAM


COMPUTER

• A computer is a programmable machine that receives input, stores and


manipulates data, and provides output in a useful format (information).

• PERSONAL COMPUTER : A small, single-user computer based on a microprocessor. In


addition to the microprocessor, a personal computer has a keyboard for entering
data, a monitor for displaying information, and a storage device for saving data.

• WORKSTATION : A powerful, single-user computer. A workstation is like a personal


computer, but it has a more powerful microprocessor and a higher-quality monitor.
TEACHER: YASRA ASLAM 2
CONT..,

• MAINFRAME : A powerful multi-user computer capable of supporting many


hundreds or thousands of users simultaneously.

• SUPERCOMPUTER : An extremely fast computer that can perform hundreds


of millions of instructions per second.

TEACHER: YASRA ASLAM 3


MEMORY

• MEMORY : Enables a computer to store, at least temporarily, data and


programs.
• RAM
• ROM

TEACHER: YASRA ASLAM 4


MASS STORAGE DEVICE

• MASS STORAGE DEVICE : Allows a computer to permanently retain large


amounts of data. Common mass storage devices include disk drives .

TEACHER: YASRA ASLAM 5


NETWORK DEVICES

• Network devices are the devices used for organizing a network, connecting to
a network, routing the packets, strengthening the signals, communicating with
others, surfing the web, sharing files on the network and many more uses.
• To build a home network or connect to other network you will need to have
some common networking devices like internal or external modem, wireless
router, cables, connectors and clipping tools.

TEACHER: YASRA ASLAM 6


TYPES OF NETWORK DEVICES

• Modem
• Hub
• Switch
• NIC
• Repeater
• Bridge
• Router
• Gateway

TEACHER: YASRA ASLAM 7


MODEM

• Definition
• Modem is a device that converts digital signal to analog signal as a modulator and
analog signal to digital signal as a demodulator.

• Description
• Enable computers to communicate over telephone lines.
• Speed of modem is measured in bits per second and varies depending upon the type of
modem. Higher the speed, the faster you can send and receive data over the network.
• Used to connect computer to the internet.

TEACHER: YASRA ASLAM 8


HUB

• Definition
• Hub is a connecting device in which various types of cables are connected to centralize
network traffic through a single connecting point.
• Description
• Hub with multiple ports are used to connect topologies, segments of LAN and to monitor
network traffic.
• It manages and controls the send and received data to and from the computers.
• Hub works on the physical layer of OSI or TCP/IP model.
• To avoid collision of data CSMA/CD protocol is used and protocol varies depending upon the
vendor.
TEACHER: YASRA ASLAM 9
SWITCH

• Definition
• Switch is a multiple LAN connecting device, which takes incoming data packet from any multiple input
ports and passes the data packet to specific output port.
• Description
• It works same as hub but does its work very efficiently.
• It uses MAC address information to switch forward the data packets to a particular destination device.
• By monitoring the network traffic, it can learn where the particular addresses is located.
• Operates at one or more OSI model layers mainly the data link layer.
• Minimizes the collision of data packets.
• Provides better security and better utilization of limited bandwidth.

TEACHER: YASRA ASLAM 10


NIC

• Definition
• A Network Interface Card (NIC) is circuit board or a card that allows computers to communicate over a network
via cables or wirelessly.

• Description
• It is also called as LAN adaptor, network adaptor or network card.
• Enable clients, servers, printers and other devices to transmit and receive data over the network.
• Operates on physical and data link layer of OSI model.
• Every network adaptor is assigned a unique 48-bit Media Access Control (MAC) address, which is stored in
ROM to identify themselves in a network or a LAN.
• Available maximum data transfer rate is 10, 100 and 1000 MBPS.
• Typically network adaptor has RJ45 or BNC or both sockets for connecting and a LED to show up it is active and
transmitting the data.
TEACHER: YASRA ASLAM 11
• Connects to a network via cables like CAT5, Co-axial, fiber-optics etc. And wirelessly by a small antenna.
REPEATER

• Definition
• Repeater is a electronic device that reshapes and amplifies the signal received from one LAN
segment to another.
• Description
• Mostly used to boost the signals in the network.
• Operates at physical layer in the OSI layer model.
• Best suited for long distances network and bus topology.
• Main advantage is that they remove unwanted noise from the incoming signals.
• Requires separate power supply for functioning.
• Repeater component parts varies from where they are used like in digital communication,
wireless
TEACHER: YASRA ASLAM communication, fiber-optic system, cellular system etc. 12
BRIDGE
• Definition
• Bridge is a networking device that connects two or more LAN's together.

• Description
• Bridge is used when number of LANs starts increasing, the network traffic begins on
overwhelming to available bandwidth.
• Reduces the network traffic of LAN by dividing it into segments.
• Operates at data link layer of OSI model.
• Can transfer data between two different protocols like Ethernet (802.3) and token bus
(802.4).
• Checks the MAC address of the frame and decides to forward the frame or to discard the
frame.
TEACHER: YASRA ASLAM 13
CONT..,

• Be blocking the unnecessary traffic to enter the other part of the network
segments, it reduces the amount of traffic.

TEACHER: YASRA ASLAM 14


ROUTER
• Definition
• Router is internetwork connecting device that determines most efficient path for sending a data packet to any
given network.

• Description
• Used to connect two or more similar or dissimilar topological LANs or WLANs
• Shares available bandwidth with multiple computers in a network.
• Provides a better protection as a hardware firewall against hacking.
• Routers are intelligent enough to determine shortest and fastest path from source to destination in a network
using algorithms.
• Operates at network layer of OSI model.
• Wireless routers are now widely used in home and offices as they allow a user to connect easily without
installing any cables. 15

TEACHER: YASRA ASLAM


GATEWAY
• Gateway is a network point that act as entry point to other network and translates one data format
to another.
• Description
• Following are some common functions of the gateway :
• Protocol translation : translates protocol format into required protocol format of the network, such as X.25 to
TCP/IP.
• Network address translation : translates your public IP address to the private IP addresses on your network.
• DHCP service : automatically assigns IP address to a computer from a defined range of addresses for a given
network.
• Monitoring and regulating each packet entering and leaving the network.
• Uses

TEACHER: YASRA ASLAM

To route the traffic from one network to another.


• To connect LAN to WAN or VPN (Virtual Private Network).
• Acts as a proxy server and firewall server to protect from virus, malware and harmful attacks. 16

• To keep history of accessed website, bandwidth usage, timing of each user of the network in a database.
TEACHER: YASRA ASLAM 17
FIREWALL

• In computer terms a firewall is a system (either hardware based or software


based) that divide, actually isolate the two fields, one being the external
world . the Internet, and the other, the internal world or computer or computer
network.

TEACHER: YASRA ASLAM 18


CONT..,

• Controlling the packets of data that goes through a firewall, allows to block
potential hackers to infiltrate your network and also to control in both
directions the use of the internet connection

TEACHER: YASRA ASLAM 19


THE INTERNET:
KEY TECHNOLOGY CONCEPTS
• Defined by Federal Networking Commission as network
that:
• Uses IP addressing
• Supports TCP/IP
• Provides services to users, in manner similar to telephone system
• Three important concepts:
1. Packet switching
2. TCP/IP communications protocol
3. Client/server computing

TEACHER: YASRA ASLAM 20


PACKET SWITCHING

• Slices digital messages into packets


• Sends packets along different communication paths as they
become available
• Reassembles packets once they arrive at destination
• Uses routers
• Special purpose computers that interconnect the computer networks that make up the Internet and
route packets
• Routing algorithms ensure packets take the best available path toward their destination

TEACHER: YASRA ASLAM 21


PACKET SWITCHING

TEACHER: YASRA ASLAM 22


TCP/IP

• Transmission Control Protocol (TCP):


• Establishes connections between sending and receiving Web computers
• Handles assembly of packets at point of transmission, and reassembly at receiving end

• Internet Protocol (IP):


• Provides the Internet’s addressing scheme

• Four TCP/IP Layers


1. Network Interface Layer
2. Internet Layer
3. Transport Layer
4. Application Layer
TEACHER: YASRA ASLAM 23
THE TCP/IP ARCHITECTURE AND PROTOCOL SUITE

TEACHER: YASRA ASLAM 24


ROUTING INTERNET MESSAGES: TCP/IP AND
PACKET SWITCHING

TEACHER: YASRA ASLAM 25


DOMAIN NAMES, DNS, AND URLS

• Domain Name
• IP address expressed in natural language

• Domain Name System (DNS)


• Allows numeric IP addresses to be expressed in natural language
• Uniform Resource Locator (URL)
• Address used by Web browser to identify location of content on the Web
• E.g., https://moodle.isra.edu.pk/course/index.php

TEACHER: YASRA ASLAM 26


CLIENT/SERVER COMPUTING

• Powerful personal computers (clients) connected in network with one or more


servers

• Servers perform common functions for the clients


• Storing files, software applications, etc.

TEACHER: YASRA ASLAM 27


THE CLIENT/SERVER COMPUTING MODEL

TEACHER: YASRA ASLAM 28


THE NEW CLIENT: THE MOBILE PLATFORM

• In a few years, the primary means of accessing the Internet


• Highly portable smartphones and tablet computers
• Smartphones involve a major shift in computer processors and software, 40-year dual
monopolies established by Intel and Microsoft, whose chips, operating systems, and
software applications have dominated the PC market since 1982.
• Microsoft’s
• operating system (Windows Mobile).
• Smartphone manufacturers purchase operating systems such as Symbian
• Apple’s iPhone iOS
• BlackBerry’s OS, typically based on Linux & Java platforms
29

TEACHER: YASRA ASLAM


THE INTERNET “CLOUD COMPUTING” MODEL:
SOFTWARE AND HARDWARE AS A SERVICE
• It is a model of computing in which firms and individuals obtain
computing power and software applications over the Internet, rather
than purchasing the hardware and software and installing it on their
own computers.
• Currently, cloud computing is the fastest growing form of computing.
• E.g. Hardware firms such as IBM, HP, and Dell have built very large, scalable
cloud computing centers that provide computing power, data storage, and high-
speed Internet connections to firms that rely on the Internet for business software
applications 30

TEACHER: YASRA ASLAM


CONT.. ,

• Software firms such as Google, Microsoft, SAP, Oracle, and Salesforce.com


sell software applications that are Internet-based.
• Product, in the cloud computing model, software is a service provided over the
Internet.
• Cloud computing has many significant implications for e-commerce

TEACHER: YASRA ASLAM 31


CONT..,
• Pay As You Go (PAYG) is a utility computing billing method that is
implemented in cloud computing and geared toward organizations and end
users. A PAYG user is billed for procured, rather than actual, computing
resources. The PAYG mechanism is derived from utility computing.

• For instance, according to Amazon, hundreds of thousands of customers use


Amazon’s Web Services arm, which provides Storage services, Computing
services, Database services, Messaging services, and Payment services.
• E.g. Google cloud storage

TEACHER: YASRA ASLAM 32


THE FUTURE INFRASTRUCTURE
• Bandwidth limitations:
• There is insufficient capacity throughout the backbone.
• Result is slow peak-hour service
• Quality of service limitations
• Latency
• Quality of service (QOS) jerkiness

• Network architecture limitations


• Wired Internet limitations:
• coaxial cable, fiber optics, expensive, strict of mobility

TEACHER: YASRA ASLAM 33


THE INTERNET2® PROJECT

• An advanced networking consortium of more than 350 member


institutions including universities, corporations, government research
agencies, and not-for profit networking organizations, all working
in partnership to facilitate the development, deployment, and use
of revolutionary Internet technologies

TEACHER: YASRA ASLAM 34


THE FIRST MILE AND THE LAST MILE
• In 2007 the Global Environment for Network Innovations (GENI) initiative.
GENI is a unique virtual laboratory for exploring future internets at scale.
GENI aims to promote innovations in network science, security technologies,
services, and applications.
• GENI has partner with Cisco, IBM, and HP, among many others, & made to 83
academic/industry teams for various projects to build, integrate, and operate
early prototypes of the GENI virtual laboratory
• First Mile (Fiber optics) & Last Mile (Mobile internet accesses)
TEACHER: YASRA ASLAM 35
CONT..,
• Wireless local area network (WLAN)-
• Telephone-based wireless Internet based Internet access: Popularly
access: connects the user to a global known as Wi-Fi, WLANs are based
telephone system (land, satellite, on computer local area networks
and microwave) that has a long where the task is to connect client
history of dealing with thousands of computers (generally stationary) to
users simultaneously and already server computers within local areas.
has in place a large-scale sending radio signals that are
transaction billing system and • Broadcast over the airwaves using
related infrastructure certain radio frequency ranges (2.4
GHz to 5.875 GHz
TEACHER: YASRA ASLAM 36
THE INTERNET AND WEB: FEATURES

• Internet and Web features on which the foundations of e-commerce are built include:
• E-mail
• Instant messaging
• Search engines
• Intelligent agents (bots)
• Online forums and chat
• Streaming media
• Cookies
TEACHER: YASRA ASLAM 37
HOW GOOGLE WORKS

38

TEACHER: YASRA ASLAM

You might also like