Professional Documents
Culture Documents
Technical Aspects of E-Commerce Part 2
Technical Aspects of E-Commerce Part 2
Technical Aspects of E-Commerce Part 2
E-Commerce Part 2 of 2
Mort Anvari
Introduction
- Review
- Hardware
- Firewalls
- Networking
- Cryptography
2
Review
PC
Web
Server SQL
Server
PC
PC Internet R FW PC
Mail File PC
Server Server
PC
3
Review
Application: Programs that
CGI Script directly access the
User presentation layer belong
Space at least in part to the
Web Server application layer.
Presentation
Operating Session
System
Space
System Transport
Network
I/O Layer
Software
Motherboard Datalink
Hardware
Physical HD Controller Video Network
World
Hard Drive Card Card
HTML
Physical
Data Pages
4
Hardware
What is it?
- The physical components of a computing
system
- If it can be held in your hand it’s hardware
- If it can’t it’s software
5
Hardware
Application: Programs that
CGI Script directly access the
User presentation layer belong
Space at least in part to the
Web Server application layer.
Presentation
Operating Session
System
Space
System Transport
Network
I/O Layer
Software
Motherboard Datalink
Hardware
Physical HD Controller Current
Video Network
World Topic
Hard Drive Card Card
HTML
Physical
Data Pages
6
Hardware
- Architecture
- Hard Drives
- Backup Systems
- Network Interfaces
- RAM
7
Architecture
- CISC (Complex Instruction Set Comp.)
Can do complex operations
Can do many functions
i.e. 486, Pentium, PowerPC
- RISC (Reduced Instruction Set Comp.)
Can do a few simple operations
Faster than CISC
i.e. SPARC, HP9000
8
Hard Drives
- Single
A regular hard drive
- Mirrored
Fault-Tolerant
Expensive
- Drive Array
Fault-Tolerant
Slower but cheaper than Mirror
9
Hard Drives
10
Backup Systems
11
Backup Systems
- Tape Library
Uses multiple DLTs or DATs
Uses many tapes
Robotic arm changes tapes
12
Network Interfaces
13
Random Access Memory
- Regular
Garden variety memory
- Parity
Checks for memory errors
Stops machine on error
- ECC (Error Checking and Correcting)
Checks for memory errors
Corrects errors
14
Firewall
What is it?
- A special computer system designed to isolate one
area of the network
- All network traffic going into or out of the isolated
area must pass through the firewall
- Only allows traffic to pass that meets a set of
criteria based on company policy
- Like the gate house in a jail
- It’s software
15
Firewall
PC
Web
Server SQL
Server
PC
PC Internet R FW PC
Mail File PC
Server Server
PC
16
Firewall
Application: Programs that
directly access the
User Firewall presentation layer belong
Space Software at least in part to the
application layer.
Presentation
Operating Session
System
Space
System Transport
Network
I/O Layer
Software
Motherboard Datalink
Hardware
Physical HD Controller Current
Video Network
World Topic
Hard Drive Card Card
Logs Physical
Data
17
Networking
What is it?
- A series of devices called nodes
interconnected by communication pathways
- Nodes can be computers or devices that help
the network function
- Networks can be connected or contain sub
networks
- It’s made up of hardware and software
18
Networking
PC
Web
Server SQL
Server
PC
PC Internet R FW PC
Mail File PC
Server Server
PC
19
Networking
Application: Programs that
directly access the
User Power Mail Web presentation layer belong
Space Point Client Client at least in part to the
application layer.
Presentation
Operating Session
System
Space
System Transport
Network
I/O Layer
Software
Motherboard Datalink
Hardware
Physical HD Controller Current
Video Network
World Topic
Hard Drive Card Card
HTML
Physical
Data Pages
20
Networking
21
The OSI Model
22
The OSI Model
23
Application Layer
24
Presentation Layer
A - Data “pre-processed”
P - Compression
S
- SSL
T
N - ASCII Translations
D
P
25
Session Layer
A - Manages connections
P - Initiates
S
- Maintains
T
N - Disconnects
D
P
26
Transport Layer
27
Network Layer
28
Network Layer
A
- If destination is on another network
P host sends data to right router
S - If right router is unknown, data is
T
sent to the Default Router or
N
D Default Gateway
P
29
Data Link Layer
30
Data Link Layer
31
The Physical Layer
32
Physical Layer: Topologies
A Star Topology
P Very Manageable and Reasonably Priced
S
T Computers
N Network Cable
D
P
Hub
33
Physical Layer: Topologies
N
D Computers/Routers
P
34
Physical Layer: Topologies
A Other Topologies
P - Linear Bus
S
- Ring
T
N - Mesh
D - Cell
P
- Torus
35
An Example
Server Client
Send picture to Display picture in
Application client browser Application
Presentation Encrypt using SSL Decrypt using SSL Presentation
Establish Authenticate and
Session connection receive connection Session
Divide picture into Reassemble
Transport tiny packets packets into picture Transport
Send to proper Determine if it’s our
Network network packet and network Network
Format packet and Check for errors
Datalink identify client and if it’s ours Datalink
Transmit packet to Receive packets
Physical client from server Physical
36
An Example
A Packet in Transit
D N T S P Data Fragment D
37
An Example
PC PC
PC
PC PC
PC
Web
Hub Switch Router Hub PC
Server
PC
PC Hub Client
PC PC PC PC
38
Encryption
What is it?
- The conversion of data into a form that cannot
be easily understood by unauthorized people
- The opposite is decryption, that is, changing
the difficult to read form back into the original
- It’s usually software, but can be hardware
39
Cryptography
40
What does it do for me?
41
Symmetric Encryption
42
Asymmetric Encryption
- Uses 2 keys
- Data encrypted with one key can
only be decrypted with the other
- Public key is shared with all
- Public key can be sent In Band
- Private key must be kept secret
- RSA is asymmetric
43
One Way Hash
- A “fingerprint” of data
- Any size data = same size hash
- Tiny changes in data produce
a very different hash
44
Example: Encrypted E-Mail
Small
Plaintext Compression
Plaintext
45
Example: Encrypted E-Mail
Small
Hash Function Fingerprint
Plaintext
46
Example: Encrypted E-Mail
Signature
47
Example: Encrypted E-Mail
Small Ciphertext
Encrypted
Plaintext Random Key with
Random
Key
Signature
48
Example: Encrypted E-Mail
49
Example: Encrypted E-Mail
50
Example: Encrypted E-Mail
51
Example: Encrypted E-Mail
Ciphertext
Small
Encrypted
with Random Key Plaintext
Random
Key
Signature
52
Example: Encrypted E-Mail
53
Example: Encrypted E-Mail
54
Example: Encrypted E-Mail
Small
Plaintext Compression
Plaintext
55