Professional Documents
Culture Documents
Unit I 1
Unit I 1
Electronic Commerce:
Traditional commerce and E-commerce, Internet and WWW, Role of WWW, Value Chains,
Strategic Business and Industry Value Chains, Role of E- commerce. Packet Switched Networks,
TCP/IP Protocol Script, Internet Utility Programmes – SGML, HTML and XML, Web Client
and Servers, Web Client/Server Architecture, Intranet and Extranets, Web Based Tools for E-
commerce, Security.
10. Its resource focuses on supply side. Its resource focuses on demand side.
The World Wide Web is the common system for The internet is a public network of network
navigating the internet. It is not the only system that with a maze of wired and wireless connections
can be used for such access, but it is by far the most between separate groups of servers computers
common one. and countless devices from around the world
The World Wide Web is distinguished from other Along with Internters, there also exist the
systems through its use of HTTP (Hypertext Transfer Intranets, which is the same type of
Protocol). It can be safely said that the HTTP is the information network but more privatized in
language of the World Wide Web order to control access.
The HTTP along with being the language of the World The internet is governed by a set of rules and
Wide Web also governs it by dealing with linking of regulations collectively known as Internet
files, documents and other resources Protocol (IP). The IP deals with data
transmitted through the internet.
The invention of the World Wide Web can be credited The first workable prototype of the Internet
to Sir Tim Berners Lee. During his work at the was the ARPANET (Advanced Research
European Organization for Nuclear Research in 1989, Project Agency Network) in the late 1960s.
he had developed the basic idea of the WWW to merge After its adoption on January 1st 1983,
the evolving technologies of computers, data networks researchers began to develop a “network of
and hypertext into a powerful and easy to use global networks” which evolved into the modern
information system. form of the Internet
Role of WWW:
The World Wide Web abbreviated as WWW or the Web. It is an information space where
documents and other web resources are identified by Uniform Resource Locators (URLs),
interlinked by hypertext links, and can be accessed through the Internet.
Scientist Tim Berners Lee invented the World Wide Web in 1989. He introduced the first web
browser computer program in 1990 . the browsers available in general public on the Internet in
August 1991.
WWW Operation:
The World Wide Web is the universe of network-accessible information, an expressionof human
knowledge. All the resources and users on the Internet that are using the Hypertext Transfer
Protocol HTTP.
It is a way of exchanging information between computers on the Internet, tying them together into
a vast collection of interactive multimedia resources.
Web Page:
Webpage is a document commonly written in HyperText Markup Language (HTML) that is
accessible through the Internet or other network using an Internet browser. A web page is accessed
by entering a URL address and may contain text, graphics and hyperlinks to other web pages and
files. The page you are reading now is an example of a web page.
Domain Name:
A domain name is an identification a string that defines a area of administrative autonomy,
authority or control within the Internet. Domain names are formed by the rules and procedures of
the Domain Name System (DNS). Any name registered in the DNS is a domain name. Domain
names are used in various networking backgrounds and application-specific naming and
addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource, such
as a personal computer used to access the Internet, a server computer hosting a web site.
Web Server:
Aweb server is a computer system application that processes requests via HTTP, the basic network
protocol used to distribute information on the World Wide Web. The term can refer to the entire
system, or specifically to the software that accepts and supervises the HTTP requests
Following table describes the most leading web servers available today:
Web Hosting:
Web Facilitating is an administration of give online space to capacity of site pages .These Site
pages are made accessible by means of WWW.The organizations which offer site facilitating are
known as web host
Value Chains:
A value chain is a concept describing the full chain of a business's activities in the creation of a
product or service -- from the initial reception of materials all the way through its delivery to
market, and everything in between.
The value chain framework is made up of five primary activities -- inbound operations,
operations, outbound logistics, marketing and sales, service -- and four secondary activities --
procurement and purchasing, human resource management, technological development and
company infrastructure.
A value chain analysis is when a business identifies its primary and secondary activities and
subactivities, and evaluates the efficiency of each point. A value chain analysis can reveal
linkages, dependencies and other patterns in the value chain.
Strategic Business and Industry Value Chains:
The value chain concept is based on the process view of organizations. It is an idea of considering
a manufacturing (or service) organization as a dynamic system, made up of various subsystems
each with inputs, transformation processes and outputs.
The inputs, transformations, and outputs require the acquisition and consumption of company
resources, such as money, equipment, materials, labor, buildings, land, administration and
management. The management process of carrying out value chain activities determines the costs
and affects the profitability of organizations.
Most of the organizations in the real world engage in hundreds, even thousands of activities while
converting its inputs to outputs. These activities are classified as either primary or support
activities.
Role of E- commerce:
The role of e-commerce in business.
1. The main goal of business to find more customers. The word Electronic means allows an
enterprise to reach more customer base.
2. Another important aim of the business is to gain profit.
3. E-commerce provides very high efficiency in supply chain management.
4. E-commerce makes the cash cycle more fast and efficient.
5. can easily control Business processes
6. E-commerce demands more effort when this is done, it provides many good services.
7. E-commerce is a very vast field… It practically likes rebuilding the distribution chains.
Its main purposes to cover end to end value points.
8. It provides an amazing solution for more complex problems.
Advantages of E-commerce
Low operational cost and provide batter quality products
There is in need of a physical shop or building for business.
It provides an easy way to find products and make shopping processes faster.
Easy to start and manage business
You can easily expand your business.
There is no geographically limitations
Disadvantages of E-commerce
There are lots of security issues.
If your site is crash all businesses will go down.
There is no way to test the product before purchase
There is late delivery of products
There is no privacy.
Some products are difficult to buy online.
There is a tax issue.
The Application layer of the TCP/IP model corresponds to the upper three layers of the
OSI model — that is, the Session, Presentation, and Application layers. Many protocols
can be used at this level. A few of the most popular are HTTP, FTP, Telnet, SMTP, DNS,
and SNMP.
IP
IP is a network layer protocol that is responsible for delivering packets to network devices. The
IP protocol uses logical IP addresses to refer to individual devices rather than physical (MAC)
addresses. A protocol called ARP (for address resolution protocol) handles the task of converting
IP addresses to MAC addresses.
Because IP addresses consist of a network part and a host part, IP is a routable protocol. As a
result, IP can forward a packet to another network if the host is not on the current network. (The
ability to route packets across networks is where IP gets its name. An Internet is a series of two
or more connected TCP/IP networks that can be reached by routing.)
TCP
TCP is a connection-oriented transport layer protocol. TCP lets a device reliably send a packet to
another device on the same network or on a different network.
TCP ensures that each packet is delivered if at all possible. It does so by establishing a
connection with the receiving device and then sending the packets. If a packet doesn’t arrive,
TCP resends the packet. The connection is closed only after the packet has been successfully
delivered or an unrecoverable error condition has occurred.
One key aspect of TCP is that it’s always used for one-to-one communications. In other words,
TCP allows a single network device to exchange data with another single network device. TCP
isn’t used to broadcast messages to multiple network recipients. Instead, the user datagram
protocol (UDP) is used for that purpose.
Many well-known application layer protocols rely on TCP. For example, when a web browser
requests a page, the browser uses HTTP to send a request via TCP to the web server. When the
web server receives the request, it uses HTTP to fulfill the request, again via TCP. Other
Application layer protocols that use TCP include Telnet (for terminal emulation), FTP (for file
exchange), and SMTP (for e-mail).
When you send a web request to a page, one of these server applications handles your request. It
checks if the request made by the client software is valid and whether the requested information
is available on the server or not. Once confirmed, the web server application processes the
request and sends the desired information to the web client.
Next in this article about What is a Web Client and How It Works with Web Server
Applications? is to find out about a web server.
What is a Web Server?
Firstly, a Web Servers are systems that are connected to the internet and store web pages. In
addition it sends out requested data over the web using HTTP. In nutshell, like Apache– the Web
Servers are just like libraries for web pages. They store, process and deliver the web resources to
the client software.
Servers can also use other data transfer protocols such as SMTP and FTP. Mail servers
use SMTP for transferring emails from one user to another. Additionally FTP server is used for
high speed file transfer operations.
Older web servers used to serve the requested documents as is, without any modifications. These
types of servers are known as static servers. Most modern servers today serve dynamic content
instead. Dynamic web servers modify the requested content on the fly.
Features of Web Servers
As the powerhouse of the internet, the web server is responsible for hosting documents and
processing them. Modern web servers feature the following common functionalities:
Support for standard protocols like HTTP, FTP, SMTP, and SSH.
Can serve static content as requested.
Also they can deliver dynamic content on demand.
Logging client information and requests.
Support for virtual hosting.
Ability to authorize or deny website path traversal.
Support for large files, bandwidth throttling, and custom error pages.
Examples of Web Servers
There are different types of server software for delivering web content to end users. Some
popular web servers include Apache, Microsoft IIS(Internet Information Services), lighttpd,
and Nginx.
Apart from these few, there’re also some other choices. However, when choosing a web server
software for your website, try to stick with the popular ones. It’ll help you maintain a stable and
secure website in the long run. Plus, finding support will also be easier.
Terminology Basics
A Client is either a person or an organization using as a service. In the IT context, the client is a
computer/device, also called a Host, that actually uses the service or accepts the information.
Client devices include laptops, workstations, IoT devices, and similar network-friendly devices.
A Server in the IT world is a remote computer that provides access to data and services. Servers
are usually physical devices such as rack servers, though the rise of cloud computing has brought
virtual servers into the equation. The server handles processes like e-mail, application hosting,
Internet connections, printing, and more.
Client-Server Architecture Explained
The client-server architecture refers to a system that hosts, delivers, and manages most of the
resources and services that the client requests. In this model, all requests and services are
delivered over a network, and it is also referred to as the networking computing model or client
server network.
Client-server architecture, alternatively called a client-server model, is a network application that
breaks down tasks and workloads between clients and servers that reside on the same system or
are linked by a computer network.
Client-server architecture typically features multiple users’ workstations, PCs, or other devices,
connected to a central server via an Internet connection or other network. The client sends a
request for data, and the server accepts and accommodates the request, sending the data packets
back to the user who needs them.
This model is also called a client-server network or a network computing model.
To sum it up briefly:
First, the client sends their request via a network-enabled device
Then, the network server accepts and processes the user request
Finally, the server delivers the reply to the client
What’s the Purpose of Client-Server Architecture?
We have already established that technology is constantly evolving and improving, often at a
very rapid pace. As a result, today's businesses increasingly rely on technology, especially IT, to
flourish and stay competitive in an "evolve or die" environment.
Therefore, today's organizations need a system that makes it easy to collect, process, and act on
corporate data, thus increasing business procedure efficiency and ensuring survivability in the
modern world's markets.
The client-server network model brings a higher level of processing that increases the
effectiveness of workstation power, workgroup empowerment, remote network management,
market-driven business, and the preservation of existing investments.
In summary, client-server architecture provides the exact framework that today’s organizations
need to meet the challenges of a rapidly evolving IT world.
Intranet has a limited number of Whereas in the extranet, connected devices are
5.
connected devices. comparable with the intranet.
S.NO Intranet Extranet
Security in e commerce:
Security is an essential part of any transaction that takes place over the internet. Customers will
lose his/her faith in e-business if its security is compromised. Following are the essential
requirements for safe e-payments/transactions −
Confidentiality − Information should not be accessible to an unauthorized person. It should
not be intercepted during the transmission.
Integrity − Information should not be altered during its transmission over the network.
Availability − Information should be available wherever and whenever required within a
time limit specified.
Authenticity − There should be a mechanism to authenticate a user before giving him/her
an access to the required information.
Non-Repudiability − It is the protection against the denial of order or denial of payment.
Once a sender sends a message, the sender should not be able to deny sending the message.
Similarly, the recipient of message should not be able to deny the receipt.
Encryption − Information should be encrypted and decrypted only by an authorized user.
Auditability − Data should be recorded in such a way that it can be audited for integrity
requirements.
Measures to ensure Security
Major security measures are following −
Encryption − It is a very effective and practical way to safeguard the data being transmitted
over the network. Sender of the information encrypts the data using a secret code and only
the specified receiver can decrypt the data using the same or a different secret code.
Digital Signature − Digital signature ensures the authenticity of the information. A digital
signature is an e-signature authenticated through encryption and password.
Security Certificates − Security certificate is a unique digital id used to verify the identity
of an individual website or user.