SlideShare uma empresa Scribd logo
1 de 68
IT8005 – Electronic Commerce
IV Year / VIII Semester
OBJECTIVES
 To understand the Technology, infrastructure and Business in E-
Commerce.
 To learn the E-Commerce Platform and its concepts.
 To understand the Security and Challenges in E-Commerce.
 To build an Own E-Commerce using Open Source Frameworks.
 To know the different business model key components and
developing a E-Commerce using platforms.
UNIT I INTRODUCTION TO E-COMMERCE
AND TECHNOLOGY INFRASTRUCTURE
Working of Web - HTML Markup for
Structure - Creating simple page - Marking up
text - Adding Links - Adding Images - Table
Markup - Forms - HTML5.
E - Commerce
E-commerce involves the use of the Internet,
the World Wide Web (Web), and mobile apps
and browsers running on mobile devices to
transact business.
Working of Web
 Internet:
 An interconnected network of thousands of networks and
millions of computers linking businesses, educational
institutions, government agencies, and individuals.
 The Internet provides services such as e-mail, apps,
newsgroups, shopping, research, instant messaging, music,
videos, and news.
Working of Web
 Web:
 Internet’s most popular services, providing access to
billions, perhaps trillions, of web pages, which are
documents created in a programming language called
HTML that can contain text, graphics, audio, video,
and other objects, as well as “hyperlinks” that permit
users to jump easily from one page to another.
Trends in E-Commerce Infrastructure
 Business:
 Mobile devices become the primary access point to social
network services and a rapidly expanding social marketing and
advertising platform.
 create a foundation for location-based web services and business
models.
 Explosion of Internet content services and mobile access
devices.
Trends in E-Commerce Infrastructure
 Business:
 The growth in cloud computing and bandwidth capacity enables
new business models for distributing music, movies, and
television.
 Search becomes more social and local, enabling social and local
commerce business models.
 Big data creates new business opportunities for firms with the
analytic capability.
Trends in E-Commerce Infrastructure
 Technology:
 Mobile devices have become the dominant mode of access to
the Internet.
 Cloud computing reshapes computing and storage.
 The Internet runs out of IPv4 addresses; the transition to IPv6
continues.
 The Internet of Things, with millions of sensor-equipped
devices connecting to the Internet.
Trends in E-Commerce Infrastructure
 Technology:
 Augmented reality and virtual reality hardware begin to
gain grip.
 Funding of artificial intelligence technologies explode to
consumer-oriented personal assistants.
 HTML5: visually rich and lively as native mobile apps.
Trends in E-Commerce Infrastructure
 Society:
 Government control over, and surveillance of, the Internet is
expanded in most advanced nations, and in many nations the
Internet is nearly completely controlled by government agencies.
 The growing infrastructure for tracking online and mobile
consumer behavior conflicts with individual claims to privacy
and control over personal information
Evolution of the Internet
 Phases:
 Innovation ( 1961 – 1974)
 Institutionalization (1975 – 1995)
 Commercialization ( 1995 to the present)
Evolution of the Internet
 Phases - Innovation ( 1961 – 1974):
 Introduction of packet-switching hardware, a
communications protocol called TCP/ IP, and
client/server computing.
 The Internet’s original purpose was to link large
mainframe computers on different college campuses.
Evolution of the Internet
 Phases – Institutionalization ( 1975 – 1995):
 The U.S. Department of Defense (DoD) and the
National Science Foundation (NSF) provided
funding and legitimization for the fledging
Internet.
Evolution of the Internet
 Phases – Institutionalization ( 1975 – 1995):
 The DoD contributed $1 million to further
develop them into a robust military
communications system.
 In 1986, the NSF assumed responsibility for the
development of a civilian Internet.
Evolution of the Internet
 Phases – Commercialization( 1995 to the
present):
 Private corporations to take over and expand the
Internet backbone as well as local service beyond
military installations and college campuses to the
rest of the population around the world.
Development of the Internet
Timeline
 1961 - Packet switching is born.
 1973 - Client/server computing is invented.
 1974 - TCP/IP invented
 1984 – hyperlinked introduced
 1984 - Domain Name System (DNS) introduced.
Development of the Internet
Timeline
 1989 - HTML pages is born.
 1994 - The beginning of e-commerce.
 2009 - Internet-enabled smartphones become a
major new web access platform.
 2013 - The Internet of Things (IoT) starts to
become a reality.
Webpage, Website, Web Server and
Search Engine
 Web Page:
 A document which can be displayed in a web
browser such as Firefox, Google Chrome.
 These are also often called just "pages."
Webpage, Website, Web Server and
Search Engine
 Website:
 A collection of web pages which are grouped
together and usually connected together in various
ways. Often called a "web site" or a "site."
Webpage, Website, Web Server and
Search Engine
 Web Server:
 A computer that hosts a website on the Internet.
 Search Engine:
 A web service that helps to find other web pages, such as Google,
Bing, Yahoo.
 Search engines are normally accessed through a web browser (e.g.
perform search engine searches directly in the address bar of Firefox,
Chrome, etc.) or through a web page.
The Internet: Key Technology
Concepts
 Internet as a network that uses the IP addressing
scheme, supports the Transmission Control
Protocol (TCP), and makes services available to
users much like a telephone system makes voice
and data services available to the public.
The Internet: Key Technology
Concepts
 Packet Switching:
 A method of slicing digital messages into discrete
units called packets.
 Then, sending the packets along different
communication paths as they become available, and
then reassembling the packets once they arrive at their
destination.
The Internet: Key Technology
Concepts
 Packet Switching:
 In packet-switched networks, messages are first
broken down into packets.
 Appended to each packet are digital codes that
indicate a source address (the origination point) and a
destination address, as well as sequencing information
and error control information for the packet.
The Internet: Key Technology
Concepts
The Internet: Key Technology
Concepts
 Packet Switching:
 In circuit-switched networks such as the telephone
system, a complete point-to-point circuit is put
together, and then communication can proceed.
 “Dedicated” circuit-switching techniques were
expensive and wasted available communications
capacity.
The Internet: Key Technology
Concepts
 Packet Switching:
 Rather than being sent directly to the destination address, in a
packet network, the packets travel from computer to computer
until they reach their destination. These computers are called
routers.
 A router is a special purpose computer that interconnects the
different computer networks that make up the Internet and routes
packets along to their ultimate destination as they travel.
The Internet: Key Technology
Concepts
 Packet Switching:
 To ensure that packets take the best available path toward their
destination, routers use a computer program called a routing
algorithm.
 Packet switching makes nearly full use of almost all available
communication lines and capacity.
 If some lines are disabled or too busy, the packets can be sent on
any available line that eventually leads to the destination point.
The Internet: Key Technology
Concepts
Circuit Switching Packet Switching
Each data unit know the entire path
address which is provided by the source.
Each data unit just know the final
destination address intermediate path is
decided by the routers.
Data is processed at source system only Data is processed at all intermediate node
including source system.
Reserve the entire bandwidth in advance Does not reserve.
Circuit switching is more reliable. Packet switching is less reliable.
Wastage of resources are more in Circuit
Switching
Less wastage of resources as compared to
Circuit Switching
It is not a store and forward technique. It is a store and forward technique.
The Internet: Key Technology
Concepts
 Transmission Control Protocol/Internet Protocol (TCP/IP):
 Protocol - a set of rules and standards for data transfer
 To govern the formatting, ordering, compressing, and error-
checking of messages.
 Transmission Control Protocol/Internet Protocol (TCP/IP) has
become the core communications protocol for the Internet.
The Internet: Key Technology
Concepts
 Transmission Control Protocol/Internet Protocol (TCP/IP):
 TCP establishes the connections among sending and receiving
computers, and makes sure that packets sent by one computer are
received in the same sequence by the other, without any packets
missing.
 IP provides the Internet’s addressing scheme and is responsible
for the actual delivery of the packets.
The Internet: Key Technology
Concepts
 Transmission Control Protocol/Internet
Protocol (TCP/IP):
The Internet: Key Technology
Concepts
 Transmission Control Protocol/Internet Protocol
(TCP/IP):
 Network Interface Layer: Placing packets on and
receiving them from the network medium.
 The Internet Layer is responsible for addressing,
packaging, and routing messages on the Internet.
The Internet: Key Technology
Concepts
 Transmission Control Protocol/Internet Protocol (TCP/IP):
 The Transport Layer is responsible for providing
communication with other protocols (applications) within the
TCP/IP protocol suite by acknowledging and sequencing the
packets to and from the applications.
 The Application Layer includes a variety of protocols used to
provide user services or exchange data.
The Internet: Key Technology
Concepts
 IP Addresses – Versions:
 IPv4 Internet address is a 32-bit number that appears
as a series of four separate numbers marked off by
periods, such as 64.49.254.91.
 The first three sets of numbers identify the network
and the last number identifies a specific computer.
The Internet: Key Technology
Concepts
 IP Addresses – Versions:
 An IPv6 Internet address is 128 bits, so it can
support up to 2128 (3.4×1038) addresses, many
more than IPv4.
The Internet: Key Technology
Concepts
Domain Names, DNS and URLs
 Domain Names:
 Domain names are a key part of the Internet
infrastructure.
 They provide a human-readable address for any web server
available on the Internet.
 Any Internet-connected computer can be reached through a
public IP address, either an IPv4 address or an IPv6
address.
Domain Names, DNS and URLs
 Domain Names, DNS and URLs:
 Computers can handle such addresses easily, but
people have a hard time finding out who's running
the server or what service the website offers.
 IP addresses are hard to remember and might
change over time.
Domain Names, DNS and URLs
Structure of domain names:
 A domain name has a simple structure made of
several parts, separated by dots and read from right
to left: developer.mozilla.org
 where, org – TLD, mozilla – label 1, developer –
label 2.
Domain Names, DNS and URLs
Structure of domain names:
Domain Names, DNS and URLs
Structure of domain names – Top Level Domain:
 The general purpose of the service behind the domain
name.
 TLDs containing .gov are only allowed to be used by
government departments.
 The .edu TLD is only for use by educational and
academic institutions.
Domain Names, DNS and URLs
Structure of domain names – Label:
 A label is a case-insensitive character
sequence anywhere from one to sixty-three characters
in length.
 It contains only the letters A through Z, digits 0
through 9, and the – character.
 Example: a, 97 and kncet-it-final-year
Domain Names, DNS and URLs
 Finding an available domain name
 Most of them provide a “whois” service that tells
you whether a domain name is available.
Domain Names, DNS and URLs
 URL:
 Uniform Resource Locator
 The address used by a web browser to identify the
location of content on the Web.
 Example:http://www.kongunadu.ac.in/kongunadu-
departments/btech-it/profile.html
Domain Names, DNS and URLs
 URL:
 http – protocol - Usually for websites it is the HTTP
protocol or its secured version, HTTPS.
 www.kongunadu.ac.in – Domain Name, it indicates
which Web server is being requested.
 /kongunadu-departments/btech-it/profile.html – path
to the file.
Client/Server Computing
Client/Server Computing
 Clients are the typical web user's internet-connected devices
and web-accessing software available on those devices.
 Servers are computers that store webpages, sites, or apps.
 When a client device wants to access a webpage, a copy of
the webpage is downloaded from the server onto the client
machine to be displayed in the user's web browser.
Client/Server Computing
 The New Client: The Mobile Platform:
 The primary means of accessing the Internet is now
through highly portable smartphones and tablet computers,
and not traditional desktop or laptop PCs.
 The primary platform for e-commerce products and
services is also changing to a mobile platform.
 Few smartphones use Intel chips, which power 90% of the
world’s PCs.
Client/Server Computing
 Cloud Computing:
 A model of computing in which computer processing,
storage, software, and other services are provided as a
shared pool of virtualized resources over the Internet.
 These “clouds” of computing resources can be
accessed on an as-needed basis from any connected
device and location.
Client/Server Computing
 Cloud Computing – Characteristics:
 On-demand self-service - server time or network
storage as needed automatically on their own
 Ubiquitous network access - Cloud resources can
be accessed using standard network and Internet
devices, including mobile platforms.
Client/Server Computing
 Cloud Computing – Characteristics:
 Location-independent resource pooling - Computing resources are
pooled to serve multiple users, with different virtual resources
dynamically assigned according to user demand.
 Rapid elasticity - Computing resources can be rapidly provisioned,
increased, or decreased to meet changing user demand.
 Measured service - Charges for cloud resources are based on the
amount of resources actually used.
Client/Server Computing
 Cloud Computing – Services:
 Infrastructure as a service (IaaS)
 Software as a service (SaaS)
 Platform as a service (PaaS)
Client/Server Computing
 Cloud Computing – Services – IaaS:
 Customers use processing, storage, networking, and other
computing resources.
 Example: Amazon Web Services.
 Storage: Simple Storage Service (S3)
 Database: SimpleDB
 Analytics: Kinesis
 Messaging: Simple Email Service, Simple Notification Service
Client/Server Computing
 Cloud Computing – Services – SaaS:
 Customers use software hosted by the vendor on
the vendor’s cloud infrastructure and delivered as a
service over a network.
 Example: Google Apps.
Client/Server Computing
 Cloud Computing – Services – PaaS:
 Customers use infrastructure and programming
tools supported by the CSP to develop their own
applications.
 Example: Windows Azure
Client/Server Computing
 Cloud Computing – Public Cloud:
 It is owned and maintained by CSPs and made available to
multiple customers, who pay only for the resources they
use.
 Organizations purchase their computing services from
remote providers and pay only for the amount of computing
power they actually use.
 Example: Google, Amazon and Microsoft
Client/Server Computing
 Cloud Computing – Private Cloud:
 Private cloud solutions are dedicated to one organization or business,
and often have much more specific security controls than a public
cloud.
 It might be managed by the organization or a third party and hosted
either internally or externally.
 Like public clouds, private clouds can allocate storage, computing
power, or other resources seamlessly to provide computing resources
on an as-needed basis.
Client/Server Computing
 Cloud Computing – Hybrid Cloud:
 A blend of public and private clouds.
 An example of a hybrid cloud solution is an
organization that wants to keep confidential
information secured on their private cloud, but make
more general, customer-facing content on a public
cloud.
Internet Protocols and Utility
Programs
 It provides services to users in the form of
Internet applications that run on Internet clients
and servers.
 These Internet services are based on universally
accepted protocols—or standards— that are
available to everyone who uses the Internet.
Internet Protocols and Utility
Programs
 HyperText Transfer Protocol (HTTP):
 The Internet protocol used to transfer web pages.
 HTTP runs in the Application Layer of the TCP/IP model.
 An HTTP session begins when a client’s browser requests
a resource, such as a web page, from a remote Internet
server.
 When the server responds by sending the page requested,
the HTTP session for that object ends.
Internet Protocols and Utility
Programs
 HyperText Transfer Protocol (HTTP):
 Web pages may have many objects on them—
graphics, sound or video files, frames, and so
forth—each object must be requested by a separate
HTTP message.
Internet Protocols and Utility
Programs
 Simple Mail Transfer Protocol (SMTP):
 E-mail is one of the oldest, most important, and
frequently used Internet services.
 The Internet protocol used to send e-mail to a server.
 SMTP is a relatively simple, text-based protocol that
was developed in the early 1980s.
Internet Protocols and Utility
Programs
 Simple Mail Transfer Protocol (SMTP):
 SMTP handles only the sending of e-mail.
 To retrieve e-mail from a server, the client computer
uses either Post Office Protocol 3 (POP3) or Internet
Message Access Protocol (IMAP).
 IMAP allows users to search, organize, and filter their
mail prior to downloading it from the server.
Internet Protocols and Utility
Programs
 File Transfer Protocol (FTP):
 FTP runs in TCP/IP’s Application Layer and
permits users to transfer files from a server to their
client computer, and vice versa.
 FTP is the fastest and most convenient way to
transfer files larger than 1 megabyte.
Internet Protocols and Utility
Programs
 Telnet:
 A network protocol that also runs in TCP/IP’s
Application Layer.
 To allow remote login on another computer.
 Telnet provides the client part of the protocol and
enables the client to emulate a mainframe computer
terminal.
Internet Protocols and Utility
Programs
 Secure Sockets Layer (SSL)/Transport Layer Security
(TLS):
 They operate between the Transport and Application
Layers of TCP/IP and secure communications between the
client and the server.
 SSL/TLS helps secure e-commerce communications and
payments through a variety of techniques, such as message
encryption and digital signatures.
Internet Protocols and Utility
Programs
 Packet InterNet Groper (Ping):
 A utility program that allows you to check the
connection between a client computer and a TCP/IP
network.
 Ping will also tell you the time it takes for the server
to respond, giving you some idea about the speed of
the server and the Internet at that moment.

Mais conteúdo relacionado

Mais procurados

E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basicsmcatahir947
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computingpurplesea
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration modelsAlan Dix
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
e-commerce architecture
e-commerce architecturee-commerce architecture
e-commerce architecturedeepika kumar
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle Dr Neelesh Jain
 

Mais procurados (20)

E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basics
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
E business- EDI
E business- EDIE business- EDI
E business- EDI
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
The Mobile Ecosystem
The Mobile EcosystemThe Mobile Ecosystem
The Mobile Ecosystem
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration models
 
I way
I wayI way
I way
 
Chapter 3
Chapter 3 Chapter 3
Chapter 3
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
e-commerce architecture
e-commerce architecturee-commerce architecture
e-commerce architecture
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
World wide web
World wide webWorld wide web
World wide web
 
Virtualization
VirtualizationVirtualization
Virtualization
 
SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle
 
Mobile 2.0
Mobile 2.0Mobile 2.0
Mobile 2.0
 

Semelhante a IT_8005_Electronic Commerce_Unit_I

Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce projectsirajislam7
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationChelsea Porter
 
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webEntrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsGorra Narsimhulu
 
Chapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptxChapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptxCarenPelayoJonelas
 
Unit 1 - Introduction.pptx
Unit 1 - Introduction.pptxUnit 1 - Introduction.pptx
Unit 1 - Introduction.pptxBhisandulal
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetFarhanMalik93
 
Chapter 1Into the Internet
Chapter 1Into the InternetChapter 1Into the Internet
Chapter 1Into the InternetPatty Ramsey
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 

Semelhante a IT_8005_Electronic Commerce_Unit_I (20)

Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce project
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Aayush arora
Aayush aroraAayush arora
Aayush arora
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For Communication
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Pranjal Mishra ppt
Pranjal Mishra pptPranjal Mishra ppt
Pranjal Mishra ppt
 
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webEntrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide web
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
COMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdfCOMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdf
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
 
Chapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptxChapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptx
 
Akki
AkkiAkki
Akki
 
Unit 1 - Introduction.pptx
Unit 1 - Introduction.pptxUnit 1 - Introduction.pptx
Unit 1 - Introduction.pptx
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Chapter 1Into the Internet
Chapter 1Into the InternetChapter 1Into the Internet
Chapter 1Into the Internet
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 

Mais de Palani Kumar

CS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLCS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLPalani Kumar
 
CS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingPalani Kumar
 
CS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationCS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationPalani Kumar
 
CS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringCS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringPalani Kumar
 
CS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitectureCS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitecturePalani Kumar
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyPalani Kumar
 

Mais de Palani Kumar (6)

CS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLCS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQL
 
CS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_Computing
 
CS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationCS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_Recommendation
 
CS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringCS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_Clustering
 
CS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitectureCS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_Architecture
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
 

Último

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Último (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

IT_8005_Electronic Commerce_Unit_I

  • 1. IT8005 – Electronic Commerce IV Year / VIII Semester
  • 2. OBJECTIVES  To understand the Technology, infrastructure and Business in E- Commerce.  To learn the E-Commerce Platform and its concepts.  To understand the Security and Challenges in E-Commerce.  To build an Own E-Commerce using Open Source Frameworks.  To know the different business model key components and developing a E-Commerce using platforms.
  • 3. UNIT I INTRODUCTION TO E-COMMERCE AND TECHNOLOGY INFRASTRUCTURE Working of Web - HTML Markup for Structure - Creating simple page - Marking up text - Adding Links - Adding Images - Table Markup - Forms - HTML5.
  • 4. E - Commerce E-commerce involves the use of the Internet, the World Wide Web (Web), and mobile apps and browsers running on mobile devices to transact business.
  • 5. Working of Web  Internet:  An interconnected network of thousands of networks and millions of computers linking businesses, educational institutions, government agencies, and individuals.  The Internet provides services such as e-mail, apps, newsgroups, shopping, research, instant messaging, music, videos, and news.
  • 6. Working of Web  Web:  Internet’s most popular services, providing access to billions, perhaps trillions, of web pages, which are documents created in a programming language called HTML that can contain text, graphics, audio, video, and other objects, as well as “hyperlinks” that permit users to jump easily from one page to another.
  • 7. Trends in E-Commerce Infrastructure  Business:  Mobile devices become the primary access point to social network services and a rapidly expanding social marketing and advertising platform.  create a foundation for location-based web services and business models.  Explosion of Internet content services and mobile access devices.
  • 8. Trends in E-Commerce Infrastructure  Business:  The growth in cloud computing and bandwidth capacity enables new business models for distributing music, movies, and television.  Search becomes more social and local, enabling social and local commerce business models.  Big data creates new business opportunities for firms with the analytic capability.
  • 9. Trends in E-Commerce Infrastructure  Technology:  Mobile devices have become the dominant mode of access to the Internet.  Cloud computing reshapes computing and storage.  The Internet runs out of IPv4 addresses; the transition to IPv6 continues.  The Internet of Things, with millions of sensor-equipped devices connecting to the Internet.
  • 10. Trends in E-Commerce Infrastructure  Technology:  Augmented reality and virtual reality hardware begin to gain grip.  Funding of artificial intelligence technologies explode to consumer-oriented personal assistants.  HTML5: visually rich and lively as native mobile apps.
  • 11. Trends in E-Commerce Infrastructure  Society:  Government control over, and surveillance of, the Internet is expanded in most advanced nations, and in many nations the Internet is nearly completely controlled by government agencies.  The growing infrastructure for tracking online and mobile consumer behavior conflicts with individual claims to privacy and control over personal information
  • 12. Evolution of the Internet  Phases:  Innovation ( 1961 – 1974)  Institutionalization (1975 – 1995)  Commercialization ( 1995 to the present)
  • 13. Evolution of the Internet  Phases - Innovation ( 1961 – 1974):  Introduction of packet-switching hardware, a communications protocol called TCP/ IP, and client/server computing.  The Internet’s original purpose was to link large mainframe computers on different college campuses.
  • 14. Evolution of the Internet  Phases – Institutionalization ( 1975 – 1995):  The U.S. Department of Defense (DoD) and the National Science Foundation (NSF) provided funding and legitimization for the fledging Internet.
  • 15. Evolution of the Internet  Phases – Institutionalization ( 1975 – 1995):  The DoD contributed $1 million to further develop them into a robust military communications system.  In 1986, the NSF assumed responsibility for the development of a civilian Internet.
  • 16. Evolution of the Internet  Phases – Commercialization( 1995 to the present):  Private corporations to take over and expand the Internet backbone as well as local service beyond military installations and college campuses to the rest of the population around the world.
  • 17. Development of the Internet Timeline  1961 - Packet switching is born.  1973 - Client/server computing is invented.  1974 - TCP/IP invented  1984 – hyperlinked introduced  1984 - Domain Name System (DNS) introduced.
  • 18. Development of the Internet Timeline  1989 - HTML pages is born.  1994 - The beginning of e-commerce.  2009 - Internet-enabled smartphones become a major new web access platform.  2013 - The Internet of Things (IoT) starts to become a reality.
  • 19. Webpage, Website, Web Server and Search Engine  Web Page:  A document which can be displayed in a web browser such as Firefox, Google Chrome.  These are also often called just "pages."
  • 20. Webpage, Website, Web Server and Search Engine  Website:  A collection of web pages which are grouped together and usually connected together in various ways. Often called a "web site" or a "site."
  • 21. Webpage, Website, Web Server and Search Engine  Web Server:  A computer that hosts a website on the Internet.  Search Engine:  A web service that helps to find other web pages, such as Google, Bing, Yahoo.  Search engines are normally accessed through a web browser (e.g. perform search engine searches directly in the address bar of Firefox, Chrome, etc.) or through a web page.
  • 22. The Internet: Key Technology Concepts  Internet as a network that uses the IP addressing scheme, supports the Transmission Control Protocol (TCP), and makes services available to users much like a telephone system makes voice and data services available to the public.
  • 23. The Internet: Key Technology Concepts  Packet Switching:  A method of slicing digital messages into discrete units called packets.  Then, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination.
  • 24. The Internet: Key Technology Concepts  Packet Switching:  In packet-switched networks, messages are first broken down into packets.  Appended to each packet are digital codes that indicate a source address (the origination point) and a destination address, as well as sequencing information and error control information for the packet.
  • 25. The Internet: Key Technology Concepts
  • 26. The Internet: Key Technology Concepts  Packet Switching:  In circuit-switched networks such as the telephone system, a complete point-to-point circuit is put together, and then communication can proceed.  “Dedicated” circuit-switching techniques were expensive and wasted available communications capacity.
  • 27. The Internet: Key Technology Concepts  Packet Switching:  Rather than being sent directly to the destination address, in a packet network, the packets travel from computer to computer until they reach their destination. These computers are called routers.  A router is a special purpose computer that interconnects the different computer networks that make up the Internet and routes packets along to their ultimate destination as they travel.
  • 28. The Internet: Key Technology Concepts  Packet Switching:  To ensure that packets take the best available path toward their destination, routers use a computer program called a routing algorithm.  Packet switching makes nearly full use of almost all available communication lines and capacity.  If some lines are disabled or too busy, the packets can be sent on any available line that eventually leads to the destination point.
  • 29. The Internet: Key Technology Concepts Circuit Switching Packet Switching Each data unit know the entire path address which is provided by the source. Each data unit just know the final destination address intermediate path is decided by the routers. Data is processed at source system only Data is processed at all intermediate node including source system. Reserve the entire bandwidth in advance Does not reserve. Circuit switching is more reliable. Packet switching is less reliable. Wastage of resources are more in Circuit Switching Less wastage of resources as compared to Circuit Switching It is not a store and forward technique. It is a store and forward technique.
  • 30. The Internet: Key Technology Concepts  Transmission Control Protocol/Internet Protocol (TCP/IP):  Protocol - a set of rules and standards for data transfer  To govern the formatting, ordering, compressing, and error- checking of messages.  Transmission Control Protocol/Internet Protocol (TCP/IP) has become the core communications protocol for the Internet.
  • 31. The Internet: Key Technology Concepts  Transmission Control Protocol/Internet Protocol (TCP/IP):  TCP establishes the connections among sending and receiving computers, and makes sure that packets sent by one computer are received in the same sequence by the other, without any packets missing.  IP provides the Internet’s addressing scheme and is responsible for the actual delivery of the packets.
  • 32. The Internet: Key Technology Concepts  Transmission Control Protocol/Internet Protocol (TCP/IP):
  • 33. The Internet: Key Technology Concepts  Transmission Control Protocol/Internet Protocol (TCP/IP):  Network Interface Layer: Placing packets on and receiving them from the network medium.  The Internet Layer is responsible for addressing, packaging, and routing messages on the Internet.
  • 34. The Internet: Key Technology Concepts  Transmission Control Protocol/Internet Protocol (TCP/IP):  The Transport Layer is responsible for providing communication with other protocols (applications) within the TCP/IP protocol suite by acknowledging and sequencing the packets to and from the applications.  The Application Layer includes a variety of protocols used to provide user services or exchange data.
  • 35. The Internet: Key Technology Concepts  IP Addresses – Versions:  IPv4 Internet address is a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91.  The first three sets of numbers identify the network and the last number identifies a specific computer.
  • 36. The Internet: Key Technology Concepts  IP Addresses – Versions:  An IPv6 Internet address is 128 bits, so it can support up to 2128 (3.4×1038) addresses, many more than IPv4.
  • 37. The Internet: Key Technology Concepts
  • 38. Domain Names, DNS and URLs  Domain Names:  Domain names are a key part of the Internet infrastructure.  They provide a human-readable address for any web server available on the Internet.  Any Internet-connected computer can be reached through a public IP address, either an IPv4 address or an IPv6 address.
  • 39. Domain Names, DNS and URLs  Domain Names, DNS and URLs:  Computers can handle such addresses easily, but people have a hard time finding out who's running the server or what service the website offers.  IP addresses are hard to remember and might change over time.
  • 40. Domain Names, DNS and URLs Structure of domain names:  A domain name has a simple structure made of several parts, separated by dots and read from right to left: developer.mozilla.org  where, org – TLD, mozilla – label 1, developer – label 2.
  • 41. Domain Names, DNS and URLs Structure of domain names:
  • 42. Domain Names, DNS and URLs Structure of domain names – Top Level Domain:  The general purpose of the service behind the domain name.  TLDs containing .gov are only allowed to be used by government departments.  The .edu TLD is only for use by educational and academic institutions.
  • 43. Domain Names, DNS and URLs Structure of domain names – Label:  A label is a case-insensitive character sequence anywhere from one to sixty-three characters in length.  It contains only the letters A through Z, digits 0 through 9, and the – character.  Example: a, 97 and kncet-it-final-year
  • 44. Domain Names, DNS and URLs  Finding an available domain name  Most of them provide a “whois” service that tells you whether a domain name is available.
  • 45. Domain Names, DNS and URLs  URL:  Uniform Resource Locator  The address used by a web browser to identify the location of content on the Web.  Example:http://www.kongunadu.ac.in/kongunadu- departments/btech-it/profile.html
  • 46. Domain Names, DNS and URLs  URL:  http – protocol - Usually for websites it is the HTTP protocol or its secured version, HTTPS.  www.kongunadu.ac.in – Domain Name, it indicates which Web server is being requested.  /kongunadu-departments/btech-it/profile.html – path to the file.
  • 48. Client/Server Computing  Clients are the typical web user's internet-connected devices and web-accessing software available on those devices.  Servers are computers that store webpages, sites, or apps.  When a client device wants to access a webpage, a copy of the webpage is downloaded from the server onto the client machine to be displayed in the user's web browser.
  • 49. Client/Server Computing  The New Client: The Mobile Platform:  The primary means of accessing the Internet is now through highly portable smartphones and tablet computers, and not traditional desktop or laptop PCs.  The primary platform for e-commerce products and services is also changing to a mobile platform.  Few smartphones use Intel chips, which power 90% of the world’s PCs.
  • 50. Client/Server Computing  Cloud Computing:  A model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet.  These “clouds” of computing resources can be accessed on an as-needed basis from any connected device and location.
  • 51. Client/Server Computing  Cloud Computing – Characteristics:  On-demand self-service - server time or network storage as needed automatically on their own  Ubiquitous network access - Cloud resources can be accessed using standard network and Internet devices, including mobile platforms.
  • 52. Client/Server Computing  Cloud Computing – Characteristics:  Location-independent resource pooling - Computing resources are pooled to serve multiple users, with different virtual resources dynamically assigned according to user demand.  Rapid elasticity - Computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.  Measured service - Charges for cloud resources are based on the amount of resources actually used.
  • 53. Client/Server Computing  Cloud Computing – Services:  Infrastructure as a service (IaaS)  Software as a service (SaaS)  Platform as a service (PaaS)
  • 54. Client/Server Computing  Cloud Computing – Services – IaaS:  Customers use processing, storage, networking, and other computing resources.  Example: Amazon Web Services.  Storage: Simple Storage Service (S3)  Database: SimpleDB  Analytics: Kinesis  Messaging: Simple Email Service, Simple Notification Service
  • 55. Client/Server Computing  Cloud Computing – Services – SaaS:  Customers use software hosted by the vendor on the vendor’s cloud infrastructure and delivered as a service over a network.  Example: Google Apps.
  • 56. Client/Server Computing  Cloud Computing – Services – PaaS:  Customers use infrastructure and programming tools supported by the CSP to develop their own applications.  Example: Windows Azure
  • 57. Client/Server Computing  Cloud Computing – Public Cloud:  It is owned and maintained by CSPs and made available to multiple customers, who pay only for the resources they use.  Organizations purchase their computing services from remote providers and pay only for the amount of computing power they actually use.  Example: Google, Amazon and Microsoft
  • 58. Client/Server Computing  Cloud Computing – Private Cloud:  Private cloud solutions are dedicated to one organization or business, and often have much more specific security controls than a public cloud.  It might be managed by the organization or a third party and hosted either internally or externally.  Like public clouds, private clouds can allocate storage, computing power, or other resources seamlessly to provide computing resources on an as-needed basis.
  • 59. Client/Server Computing  Cloud Computing – Hybrid Cloud:  A blend of public and private clouds.  An example of a hybrid cloud solution is an organization that wants to keep confidential information secured on their private cloud, but make more general, customer-facing content on a public cloud.
  • 60. Internet Protocols and Utility Programs  It provides services to users in the form of Internet applications that run on Internet clients and servers.  These Internet services are based on universally accepted protocols—or standards— that are available to everyone who uses the Internet.
  • 61. Internet Protocols and Utility Programs  HyperText Transfer Protocol (HTTP):  The Internet protocol used to transfer web pages.  HTTP runs in the Application Layer of the TCP/IP model.  An HTTP session begins when a client’s browser requests a resource, such as a web page, from a remote Internet server.  When the server responds by sending the page requested, the HTTP session for that object ends.
  • 62. Internet Protocols and Utility Programs  HyperText Transfer Protocol (HTTP):  Web pages may have many objects on them— graphics, sound or video files, frames, and so forth—each object must be requested by a separate HTTP message.
  • 63. Internet Protocols and Utility Programs  Simple Mail Transfer Protocol (SMTP):  E-mail is one of the oldest, most important, and frequently used Internet services.  The Internet protocol used to send e-mail to a server.  SMTP is a relatively simple, text-based protocol that was developed in the early 1980s.
  • 64. Internet Protocols and Utility Programs  Simple Mail Transfer Protocol (SMTP):  SMTP handles only the sending of e-mail.  To retrieve e-mail from a server, the client computer uses either Post Office Protocol 3 (POP3) or Internet Message Access Protocol (IMAP).  IMAP allows users to search, organize, and filter their mail prior to downloading it from the server.
  • 65. Internet Protocols and Utility Programs  File Transfer Protocol (FTP):  FTP runs in TCP/IP’s Application Layer and permits users to transfer files from a server to their client computer, and vice versa.  FTP is the fastest and most convenient way to transfer files larger than 1 megabyte.
  • 66. Internet Protocols and Utility Programs  Telnet:  A network protocol that also runs in TCP/IP’s Application Layer.  To allow remote login on another computer.  Telnet provides the client part of the protocol and enables the client to emulate a mainframe computer terminal.
  • 67. Internet Protocols and Utility Programs  Secure Sockets Layer (SSL)/Transport Layer Security (TLS):  They operate between the Transport and Application Layers of TCP/IP and secure communications between the client and the server.  SSL/TLS helps secure e-commerce communications and payments through a variety of techniques, such as message encryption and digital signatures.
  • 68. Internet Protocols and Utility Programs  Packet InterNet Groper (Ping):  A utility program that allows you to check the connection between a client computer and a TCP/IP network.  Ping will also tell you the time it takes for the server to respond, giving you some idea about the speed of the server and the Internet at that moment.