Download presentation
Presentation is loading. Please wait.
1
E-Commerce
2
Managing the Marketplace
Technology Infrastructure Topology Security
3
Technology TCP/IP – Transmission control protocol/Internet protocol
Data transport Circuit switching Packet switching A dedicated link between a group of users Packet Switching Can share the network and bandwidth
4
Technology.. IP – Routing – Routing and addressing
Setting a route map dynamically between a sender and receiver
5
Technology… Addressing InterNIC – Internet Network Information Center
A unique 32-bit number to identify networks within TCP/IP (e.g., ) DNS server - is converted to an unique IP IPv4
6
Technology Regional Internet Registries (RIR)
Manages allocation and registration of Internet number resources NAT – Network address translator Converts a private IP address to public IP address IPv4 will be depleted by IPv6 – 128-bit address space (6×16-bits) 2001:0DB8:0000:1111:0000:0000:0000:0200 FE80:0000:0000:0000:0123:4567:89AB:CDEF
7
Technology… Internet Intranet Extranet Interconnection of networks
Interconnection over the internet or LAN Extranet A common platform for interconnection between vendors, suppliers, producers over the internet
8
Infrastructure NII – network traffic must be forwarded through
Cable TV TV and Radio broadcasting Telephone networks Cellular communications Computer networks Internet
9
Infrastructure MDI – a link between client and server EPI – web BSI –
EDI (formatted) s (unformatted) HTTP EPI – web URL Protocol (e.g., HTTP) HTML BSI – Encryption Payments Fund transfer Authentication
10
Infrastructure E-Commerce Application
11
Electronic Publishing
PDF HTML
12
Topology Networks can be a cooperation within Stakeholders - Internet
Adobe supports customers and provide financial and other reports to investors Employees - Intranet Business partners - Extranet A link between Buyer and supplier
13
Security Access control to the server Authentication
14
Security… Network security components often include:
Antivirus and antispyware Firewall filtering Restricts packets with designated IP address Dedicated firewall systems A device dedicated for intranet to Internet Depending on businesses, restricts on Unauthorized web applications Unauthorized personnel Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)
15
Encryption Sniffer program - looking for a number format for credit cards (e.g., ) Can be of confidential information or financial reports or business ideas PGP – Pretty Good Privacy A readily available web encryption Encryption Public key - PGP Public - Private key
16
PGP
17
Decrypt the following…
IQQF PKIJV!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.