11. The OSI Protocol Data Manipulation Tasks Data Communications Tasks Communications Channel NODE 1 NODE 2 HARD WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application SOFT WARE HARD WARE
18. Dynamic Virtual Organization Perhaps the greatest potential benefit to be derived from e-commerce is the firm’s ability to forge dynamic business alliances with other organizations to fill unique market niches as the opportunities arise.
19.
20.
21.
22.
23. DOS Attack Sender Receiver Step 1: SYN messages Step 2: SYN/ACK Step 3: ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not response with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received.
24.
25. Public and Private Key Encryption 公開及秘密金鑰加密 Public Key is used for encoding messages. Message B Message C Message D Multiple people may have the public key (e.g., subordinates). Private Key is used for decoding messages. Typically one person or a small number of people have the private key (e.g., a supervisor). Message A Ciphertext Ciphertext Ciphertext Ciphertext Message A Message D Message C Message B
26.
27. Text Message Compute Digest of Message Digest Encrypt Using Sender’s Private Key Digital Signature Digital Signature Encrypt Using Receiver’s Public Key Encrypted Message with Digital Signature Attached Decrypt Using Receiver’s Private Key Digital Signature Text Message Decrypt Using Sender’s Public Key Compute Digest of Message Digest Digest Compare Digital Signature 數位簽章 Sender’s Location Receiver's Location
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38. LAN LAN Bridge Gateway Gateway LAN WAN WAN 環狀網路 星狀網路 匯流排網路
39.
40. POS POS POS POS POS Topeka St. Louis Kansas City Dallas Tulsa Star Network 主電腦 Local Data Local Data Local Data Local Data Central Data
41.
42.
43.
44.
45.
46.
47.
48.
49. POLLING METHOD OF CONTROLLING DATA COLLISIONS MASTER Locked Locked Locked Polling Signal Data Transmission One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit. If a slave responds in the affirmative, the master site locks the network while the data are transmitted. Allows priorities to be set for data communications across the network SLAVE SLAVE SLAVE SLAVE WAN
50.
51.
52.
53.
54. EDI System Purchases System Company A’s mailbox Company B’s mailbox Sales Order System Application Software Application Software Direct Connection VAN Company A Company B EDI Translation Software EDI Translation Software Communications Software Communications Software Other Mailbox Other Mailbox
55.
Notas do Editor
31
SSL probably most widely used Web security mechanism. Its implemented at the Transport layer; cf IPSec at Network layer; or various Application layer mechanisms eg. S/MIME & SET (later).