WIRELESS CONNECTIONS & E-COMMERCE
Presentation Credits “Introduction to Computers” by Peter Norton “Using Information Technology” by V. Rajaraman
10A-3 Wired Internet Connections from your home Dial-up connections Broadband connection ISDN DSL Cable Modems
10A-4 Wireless Internet Connection Wireless WAN (WWAN) Wireless network over a large area Uses radio signals to transfer data Speeds range from 1 to 100 Mbps Antennas required Subject to atmospheric disturbances
10A-5 Wireless Internet Connection Satellite services Image courtesy:
10A-6 Wireless Internet Connection Satellite services Internet access in remote regions Suitable for home and office use Needs a VSAT at the client Very Small Aperture Terminal Connects to the satellite Modem connects to the VSAT Geostationary satellites move with a speed equal to that to Earth’s rotation
10A-7 Wireless Internet Connection Wireless LANs (WLAN) Network without wires Connects to a broadband LAN connection WAP are wired directly into the LAN Nodes use wireless
10A-8 Wireless LAN
10A-9 Wireless Internet Connection Wireless security Crucial to protect wireless transmissions Encryption protects transmissions Wireless Encryption Protocol is quite weak Wi-Fi Protected Access is stronger MAC address of trusted computers War driving
E-COMMERCE
10B-11 Consumer E-Commerce Online shopping Purchasing through a web site Also called Business to Consumer (B2C) List of products is nearly endless Features Searchable catalog Secure checkout Customer support page
10B-12 Consumer E-Commerce Online stores versus brick and mortar Brick and mortar implies a physical store Brick and mortar properties Limited hours Salespeople can offer assistance Customers can handle the merchandise Online store properties Store is open 24 x 7 Salespeople usually not available Can only view the merchandise
10B-13 Online vs. Brick and Mortar Online store catalog Brick and mortar store experience
10B-14 Consumer E-Commerce Using online catalogs Good online stores have a catalog Products are often arranged by category Products can be found by keyword Amazon.com Buy.com
10B-15 Consumer E-Commerce Paying for purchases Vendors accept several payment methods Credit cards Paypal Electronic Fund Transfer May need to create an account Simplifies shipping Encourages repeat shopping
Image courtesy: “Introduction to Information Technology” V. Rajaraman
10B-17 Consumer E-Commerce Getting customer service Needed to resolve problems Understand the policies before ordering Contact information How you contact the vendor Return policies Availability and fee for returning items Shipping policies Charges and fees Convenience fees
10B-18 Consumer E-Commerce Online banking Most teller services handled online Balances can be obtained Bills can be paid Access is typically very secure Not available at all banks
10B-19 Business E-Commerce Business to business (B2B) Business transaction between companies Accounts for the majority of e-commerce Initially private networks were used Common transactions Reorder inventory Purchase stocks Credit checks
10B-20 Business E-Commerce Intranets and extranets Business partners must work together Networks must work together Intranet uses Internet technologies Only internal workers can access resources Use a standard browser to access resources Extranets open the Intranet to clients Clients have password level access Allows the same abilities as employees Very simple to use and setup
10B-21 Business E-Commerce Telecommuters Employee working outside of the office Connects to the office through technology Several technologies are used Home computer and the Internet Key card changes passwords often Encryption is used to protect data
10B-22 Security Improved security measures Before 1998, Web security was nonexistent Now safer than restaurant purchases All reputable sites protect their customers
10B-23 Security Secure web pages Allows safe transmission of credit card Use the secure socket layer (SSL) Encrypts data transmission to the server Secure pages are easily identified URL uses Browser status bar shows a closed lock
10B-24 Secure pages
END OF LECTURE