Telecommunication, Internet, and E-Commerce. Communication Channel Media Bandwidth: The speed at which information is transmitted over a communication.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Telecommunications, the Internet, Intranets, and Extranets
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Technology Infrastructure: The Internet and the World Wide Web
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Telecommunications, Networks, and the Internet
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Chapter 4 Telecommunications, the Internet, Intranets, and Extranets
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
E-Commerce. Introduction to Internet A network of networks that connects computers across the world. It is growing rapidly: –Host computers –Users –Information.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
E-Commerce. Internet It is a network that follows the TCP/IP protocol. –Transmission Control Protocol – handles communications between applications. A.
Telecommunication and Networks
Communications and Networks
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Lecture 5 Title: Networks and Businesses
8b-9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
The Internetworked E-Business Enterprise
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Chapter 4 Telecommunications, the Internet, Intranets, and Extranets
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Telecommunications and Networks Chapter 6 – Understanding Technology (Third Edition)
1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating systems. 5.Linux operating systems. In many companies,
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Connecting one computer to another computer creates a network.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Living Online Module Lesson 23 — Networks and Telecommunication
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Communications and Networks
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
TELECOMMUNICATIONS AND NETWORKS
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Management Information Systems - Introduction. The telecommunication system Telecommunication System – consists of hardware and software that transmits.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
Fundamentals of Information Systems, Sixth Edition
The Internet & World Wide Web
Chapter 1 Into the Internet.
E-Commerce Security.
Telecommunications and Networking
Principles and Learning Objectives
Electronic Payment Security Technologies
Presentation transcript:

Telecommunication, Internet, and E-Commerce

Communication Channel Media Bandwidth: The speed at which information is transmitted over a communication medium. It is measured by the bits of data transmitted per second. Wire cables: –twisted-pair (voiceband): 2MBPS –coaxial: > 100 MBPS Broadband cable – fiber-optic: 30 GBPS –Broadband over Power Lines (BPL) Wireless channel: – microwave (land-based, satellite-based):100 MBPS –Satellite –infrared: 4 MBPS

Digital Subscriber Line (DSL) DSL offers high-speed data access over the single pair of the ordinary copper lines used with basic telephone service. –The Last Mile: The last mile is the final leg of delivering connectivity from a communications provider to a customer.

Types of Networks Local Area Network –Within office –Cable or Wireless –peer-to-peer: all PCs are equal –client/server network Wireless local area network (WLAN) Metropolitan Area Network –City area –Fiber optic cable Wide Area Network

Wireless local area network (WLAN) WI-FI: Wireless local area network (WLAN) based on the IEEE specifications. Hotspot: A person with a Wi-Fi device, such as a computer, cell telephone, or personal digital assistant (PDA) can connect to the Internet when in proximity of an Access Point. The region covered by one or several access points is called a hotspot.

Introduction to Internet A network of networks that connects computers across the world. It is growing rapidly: –Host computers –Users –Information It is a network that follows the TCP/IP protocol (packet switch network).

Internet protocol –Transmission Control Protocol – handles communications between applications. A message is divided into pieces called packets. Packets are numbered and may be transmitted by different routes. –Internet Protocol – handles communications between network addresses. A computer on the internet is assigned an unique address, IP address, which consists of 4 numbers (each number is less than 256) separated by period. Exanple,

Domain Name System Domain: –.com,.net,.org,..edu,.int,.gov –.info,.biz,.name,.etc. Domain names are the familiar, easy-to-remember names for computers on the Internet. –Yahoo.com Each domain name correlates to assigned IP address: –Yahoo.com –

Organizations that Regulate Internet ICANN (Internet Corporation for Assigned Names and Numbers):have responsibilities in Internet Protocol addresses and domain names. Domain name registry

Examples of Internet Services World Wide Web: –A system of interlinked, hypertext documents that runs over the Internet. –Web publishing and browsing FTP - File Transfer Telnet

World Wide Web A service on the Internet that links information so that the user can easily go from one piece of information to another, related piece. Web page:Hypertext/Hypermedia – a document that contains hyperlink (link) to another hypertext. Uniform Resource Locator (URL): – site/Directory/Document

Intranet It is a corporate network that functions with Internet technologies, such as browsers, using Internet protocols. Major applications: –Corporate/department/individual web pages –Database access –Interactive communication –Document distribution

Applications of Intranets Communicate and Collaborate with , chat, conf. Communication and Collaboration Secure, universal access. To view corporate data Author, publish and share hypermedia documents Centrally administer clients, servers, security, and traffic Business Operations and Management Web Publishing Intranet Portal Management FIREWALLFIREWALL FIREWALLFIREWALL Internet Extranet Customers, Suppliers Enterprise Portal Existing Voice Mail Systems Existing Database and Enterprise appl. HTML, MS Office XML, Java Existing Hardware and Networks

Extranet It is a network that links the intranets of business partners over the Internet by Virtual Private Network. Virtual Private Network: –A secure network that uses the Internet as its main backbone network to connect the intranets of a company’s different locations, or establish extranet links between business partners. Improved communications between business partners

E-Commerce Buying and selling, and marketing and servicing of products and services, and information via computer networks.

E-Commerce Models B2C: Storefront model –E-tailing (electronic retailing) –Shopping cart, on-line shopping mall B2B: –Electronic Data Interchange (EDI) –Electronic Exchange: An electronic forum where manufacturers, suppliers, and competitors buy and sell goods. Example: WorldWide Retail Exchange (WWRE) C2C: –Auction model: e-Bay Moble Commerce (M-commerce) –Wireless Application Protocol (WAP) –PDA, Cell phone,

Electronic Payment Systems Authentication technologies Digital certificate Electronic cash Electronic wallet:contains –electronic cash or credit card info –Owner identification Credit/debit/smart card

Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message secret and only known to the sender and receiver? Integrity: Have the contents of a message been modified during transmission? Nonrepudiation: Can the sender of a message deny that they actually sent the message?

Encryption (Cryptography) Plain text: the original message in human- readable form. Ciphertext:the encrypted message Encryption algorithm: the mathematical formula used to encrypt the plain text. Key: the secret key used to encrypt and decrypt a message.

Encryption Example Digits: 0-9, Encryptor: –Replace each digit by Mod(Digit + Key, 10) Key’s value is from 0 to 9 –If Key = 7, then: 0 -> 7, 1->8, 2->9, 3->0, 4->1, 5->2 Decryptor: –Replace ach digit byMod(Digit + (10-Key), 10) –If key=7, then 7->0, 8->1, 9->2, 0->3

Encryption Algorithms Private key encryption Public key encryption Digital signature Digital certificate

Private Key Encryption The same key is used by a sender (for encryption) and a receiver (for decryption) The key must be transmitted to the receiver. Example: –DES (Data Encryption Standard) algorithm with 64-bit key

Public Key Encryption Uses two different keys: a public and a private key. Receiver’s public key must be delivered in advance. Sender uses receiver’s public key to encrypt the message and receiver uses private key to decrypt the message (Sender can be sure the receiver is the true receiver) Example: –RSA (Rivest, Shamir, and Adelman) algorithm with 512-bit to 1024-bit key. Note: Although the two keys are mathematically related, deriving one from the other is “ computationally infeasible ”.

Digital Signature It is used for the authentication and nonrepudiation of senders by applying public key encryption in reverse. To make a digital signature, a sender encrypts a message with his/her private key, and any receivers with sender’s public key can read it.

Ceritificate A certificate is an identification issued by a trusted third-party certificate authority (CA). A certificate contains records such as a serial number, user’s name, owner’s public key, name of CA, etc. Example of CA: VeriSign, U.S. Postal Service.

Transaction Certificate A transaction certificate attests to some fact about the conduct of a transaction that can be used to prevent repudiation. SSL (Secure Socket Layer) Protocol developed by Netscape. SET (Secure Electronic Transaction) Protocol developed by Visa and MasterCard.

Cookies Designed to hold information about a user. Created by a web site and saved on the visitor’s machine. It contains: –Web site that sets the cookie. –One or more pieces of data. –Expiration date for this cookie. Cookies directory: Browser sends cookie with the URL when you visit the site that issued the cookie.